Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 09:14
Behavioral task
behavioral1
Sample
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe
Resource
win7-20240903-en
General
-
Target
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe
-
Size
6.4MB
-
MD5
8e332e917f3d6c75acc6a7bccc89bf7b
-
SHA1
b8d85ffc16bcf890e7dd04f0001b2c086d97d24e
-
SHA256
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d
-
SHA512
5f1ebad01ab356be07aed2abc1873e54f09e1a03623f06dd50f67c5d87a2624a641b8b18eacaa2991bf389004c7f363f5e8219f43870663ca047e944063e44bd
-
SSDEEP
196608:Q4yL7Ql90yZsnUHha87/2uARAucSAucUhDKu:oQ5Zxl7/2XAXaDb
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259422502.bat family_gh0strat -
Gh0strat family
-
Xred family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\259422502.bat" look2.exe -
Processes:
resource C:\Users\Admin\AppData\Local\Temp\eIOzeaIb.xlsm C:\Users\Admin\AppData\Local\Temp\eIOzeaIb.xlsm C:\Users\Admin\AppData\Local\Temp\eIOzeaIb.xlsm -
Executes dropped EXE 6 IoCs
Processes:
look2.exeHD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeSynaptics.exe._cache_Synaptics.exesvchcst.exepid process 1812 look2.exe 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2788 Synaptics.exe 2256 ._cache_Synaptics.exe 560 svchcst.exe -
Loads dropped DLL 15 IoCs
Processes:
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exelook2.exesvchost.exeHD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeSynaptics.exesvchcst.exepid process 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 1812 look2.exe 2292 svchost.exe 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2788 Synaptics.exe 2788 Synaptics.exe 2788 Synaptics.exe 2292 svchost.exe 560 svchcst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe -
Drops file in System32 directory 4 IoCs
Processes:
svchost.exelook2.exedescription ioc process File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe File created C:\Windows\SysWOW64\259422502.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe upx behavioral1/memory/2336-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-101-0x0000000000400000-0x00000000008CB000-memory.dmp upx behavioral1/memory/2336-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2336-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2256-168-0x0000000000400000-0x00000000008CB000-memory.dmp upx behavioral1/memory/2256-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2256-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2256-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2256-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2256-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2256-133-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2256-131-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2256-129-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2256-127-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2256-126-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2788-125-0x0000000005B60000-0x000000000602B000-memory.dmp upx behavioral1/memory/2336-256-0x0000000000400000-0x00000000008CB000-memory.dmp upx behavioral1/memory/2256-259-0x0000000000400000-0x00000000008CB000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
Processes:
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exeSynaptics.exeEXCEL.EXElook2.exeHD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_Synaptics.exesvchcst.execa4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language look2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2332 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exepid process 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_Synaptics.exedescription pid process Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2256 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 2256 ._cache_Synaptics.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_Synaptics.exeEXCEL.EXEpid process 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2336 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 2256 ._cache_Synaptics.exe 2256 ._cache_Synaptics.exe 2256 ._cache_Synaptics.exe 2332 EXCEL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeHD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeSynaptics.exesvchost.exedescription pid process target process PID 2320 wrote to memory of 1812 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe look2.exe PID 2320 wrote to memory of 1812 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe look2.exe PID 2320 wrote to memory of 1812 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe look2.exe PID 2320 wrote to memory of 1812 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe look2.exe PID 2320 wrote to memory of 2784 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 2320 wrote to memory of 2784 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 2320 wrote to memory of 2784 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 2320 wrote to memory of 2784 2320 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 2784 wrote to memory of 2336 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 2784 wrote to memory of 2336 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 2784 wrote to memory of 2336 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 2784 wrote to memory of 2336 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 2784 wrote to memory of 2788 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Synaptics.exe PID 2784 wrote to memory of 2788 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Synaptics.exe PID 2784 wrote to memory of 2788 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Synaptics.exe PID 2784 wrote to memory of 2788 2784 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Synaptics.exe PID 2788 wrote to memory of 2256 2788 Synaptics.exe ._cache_Synaptics.exe PID 2788 wrote to memory of 2256 2788 Synaptics.exe ._cache_Synaptics.exe PID 2788 wrote to memory of 2256 2788 Synaptics.exe ._cache_Synaptics.exe PID 2788 wrote to memory of 2256 2788 Synaptics.exe ._cache_Synaptics.exe PID 2292 wrote to memory of 560 2292 svchost.exe svchcst.exe PID 2292 wrote to memory of 560 2292 svchost.exe svchcst.exe PID 2292 wrote to memory of 560 2292 svchost.exe svchcst.exe PID 2292 wrote to memory of 560 2292 svchost.exe svchcst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe"C:\Users\Admin\AppData\Local\Temp\ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeC:\Users\Admin\AppData\Local\Temp\HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2256
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:2280
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\259422502.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:560
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c571f838e2d8712dc164e10202d2e804
SHA1f9178df311c54de126c1b9d8a82db5e19a9dbd81
SHA256d894014ff299db4dc489733c784fa71b6c6bcf6b4e19ca44409da97627e0aea5
SHA51243255dd2be91e0c6b95c9fb304d123b3bd437eb766d37580b42cbc8f408db477bce7f420752a4a19077355debfe8095982c5d32b858f646f7fc0e8876a9e5fd7
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
22KB
MD57a2ca9ac908358df1416f851886d17a0
SHA1d0ad14a32b9b306edc27a1505b1882bdfde40a87
SHA256a15b68aa267c21db2b13ae13de6106f3258197f03228d5c2162c850b96d5d874
SHA512b93f0a034c87aeb038eae0c86a5e4e79cf5fca7028ea4f2c167b43fca97b4f51174995a91262a01f49ee879def4f6349d63a39da71b7b26eb3506c03c303100d
-
Filesize
23KB
MD55ee9e19e79e9e3861718dd6ea3d58313
SHA106346fe0b520facbd8496c120c4a2bb09faf88ef
SHA2569042175e7bb6960af6ee1323b3fb19f08dcdc09a11fc77908cb5869d55026d43
SHA5129fc321ffe488ec8872729b4ef06c9c4541bcf71a944c0c89bb15a4427f0e966b493f26119deb18108c3abc53c1c862cd35912ee590c031b13e97ccbccf89acde
-
Filesize
26KB
MD5ae4e394d148a95c3dfebbec80421ac89
SHA14b2b06b2394ffc74df3bcb5e75704a6fd10f0b16
SHA2568af3bceca02751df04ba60cf2913ee13bd137790f26e09ed0952a24ff40699b2
SHA5129bd810902ead1bc58575ef727e74edac026fdfa89809553bf00dd7fe4bee078b85c485ef797436b73d2df7c56c850e4cd6cf4317e317ab9eb90c34e09ec4b8d2
-
Filesize
24KB
MD5e6fdf984a07a5eb62b6526c235bb8f62
SHA121a552eccfacbe7fd740e5461de4158e8f61dca3
SHA256df54390e3818dc07c0a3ea8433a976a58c0e096d0c7f32c429d9fe1f6c32e944
SHA5128e80ac7f09d95ed0ff00425f42129faf0589b68535e5f292b4958e5e2804f364c885dce5b35fe683aa0fb22b8c33c16b1e2e7fc7f84c6114c19da5e6c1b76ad7
-
Filesize
337KB
MD5fb66e1e31fa1e6dfb21a50ccd11e0409
SHA16c45a0a115ec896eb14a531a44809b2a22cf8934
SHA2565ea8c5455f0ebe884ed98834e78ead8b6c68814bbb1723370299fa44b88c0faa
SHA51258ee149f70438296a67d5ae5cbd6cb9f5b2510a0381466b8f09eec3835be1ce7cad6903ca8fbc9273105132e85952208e78c59f776416c5449b86cc62111154b
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
\Users\Admin\AppData\Local\Temp\._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe
Filesize4.4MB
MD5a8b58b62400156169c08e476d49f93d5
SHA14e0fda6f2a04400834d9e627f2a1fba83a060bfe
SHA25683010a66416ee369595a5cc25579ed4872821609c33a9899cd36ad7abc372af0
SHA512310dca2b11792871f2788ed55ba0cc7e56fd01ff06d987d1ce92ea7a1b447b70be37408d18e1c83330c7634f690c3cffc5c095fac47bd40ddf7475d6dde5c2d9
-
\Users\Admin\AppData\Local\Temp\HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe
Filesize5.2MB
MD5ead6353ec80c02989ad2e1bb1eee149c
SHA1e9ae278b098f3bc7f42ef17043e34b83db5dcc2b
SHA25619f47345fb52b753612911750f87dfc67b69887cf3e1154b6e2829390976e597
SHA51206a0b27ce95cc21e5e92fba87590c62d38226fbe5fdfe43df2a3ad134ce8181ecc200a12fe1e575c2cd31a9192aace17183628cd0b92209f838915a3115e4dcd
-
Filesize
51KB
MD52726b5ee09ddc8f443445a347b14186d
SHA17b8fb44a470b3c66393defe23a367120999c4046
SHA256b767b73261c664e8a8e439593db291d31009d931033414b9ec75d3825a6ec520
SHA51225349176b344830f2fb921bf5bceee938978b653119525fa423c2883392d07fa53cc7c890be09d597a06483a9d954e8b86642e1374fbbfbe4af1adccbb1885b6