Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 09:14
Behavioral task
behavioral1
Sample
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe
Resource
win7-20240903-en
General
-
Target
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe
-
Size
6.4MB
-
MD5
8e332e917f3d6c75acc6a7bccc89bf7b
-
SHA1
b8d85ffc16bcf890e7dd04f0001b2c086d97d24e
-
SHA256
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d
-
SHA512
5f1ebad01ab356be07aed2abc1873e54f09e1a03623f06dd50f67c5d87a2624a641b8b18eacaa2991bf389004c7f363f5e8219f43870663ca047e944063e44bd
-
SSDEEP
196608:Q4yL7Ql90yZsnUHha87/2uARAucSAucUhDKu:oQ5Zxl7/2XAXaDb
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\240619625.bat family_gh0strat -
Gh0strat family
-
Xred family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240619625.bat" look2.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeSynaptics.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 6 IoCs
Processes:
look2.exeHD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeSynaptics.exe._cache_Synaptics.exesvchcst.exepid process 4604 look2.exe 1412 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 1312 Synaptics.exe 1396 ._cache_Synaptics.exe 3028 svchcst.exe -
Loads dropped DLL 3 IoCs
Processes:
look2.exesvchost.exesvchcst.exepid process 4604 look2.exe 940 svchost.exe 3028 svchcst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe -
Drops file in System32 directory 4 IoCs
Processes:
look2.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe File created C:\Windows\SysWOW64\240619625.bat look2.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe upx behavioral2/memory/3120-120-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-122-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-118-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-116-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-114-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-112-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-110-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-108-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-106-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-105-0x0000000000400000-0x00000000008CB000-memory.dmp upx behavioral2/memory/3120-103-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-101-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-99-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-143-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-141-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-138-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-132-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-128-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-126-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-124-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-279-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-283-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-282-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-277-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-273-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-271-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-269-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-267-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-265-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-275-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1396-264-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3120-361-0x0000000000400000-0x00000000008CB000-memory.dmp upx behavioral2/memory/1396-367-0x0000000000400000-0x00000000008CB000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
Processes:
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exelook2.exesvchost.exeHD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeSynaptics.exe._cache_Synaptics.exesvchcst.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language look2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeSynaptics.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4552 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exepid process 856 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 856 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_Synaptics.exedescription pid process Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 1396 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 1396 ._cache_Synaptics.exe Token: 33 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Token: SeIncBasePriorityPrivilege 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe._cache_Synaptics.exeEXCEL.EXEpid process 856 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 856 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 3120 ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe 1396 ._cache_Synaptics.exe 1396 ._cache_Synaptics.exe 1396 ._cache_Synaptics.exe 4552 EXCEL.EXE 4552 EXCEL.EXE 4552 EXCEL.EXE 4552 EXCEL.EXE 4552 EXCEL.EXE 4552 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeHD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeSynaptics.exesvchost.exedescription pid process target process PID 856 wrote to memory of 4604 856 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe look2.exe PID 856 wrote to memory of 4604 856 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe look2.exe PID 856 wrote to memory of 4604 856 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe look2.exe PID 856 wrote to memory of 1412 856 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 856 wrote to memory of 1412 856 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 856 wrote to memory of 1412 856 ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 1412 wrote to memory of 3120 1412 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 1412 wrote to memory of 3120 1412 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 1412 wrote to memory of 3120 1412 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe ._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe PID 1412 wrote to memory of 1312 1412 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Synaptics.exe PID 1412 wrote to memory of 1312 1412 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Synaptics.exe PID 1412 wrote to memory of 1312 1412 HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe Synaptics.exe PID 1312 wrote to memory of 1396 1312 Synaptics.exe ._cache_Synaptics.exe PID 1312 wrote to memory of 1396 1312 Synaptics.exe ._cache_Synaptics.exe PID 1312 wrote to memory of 1396 1312 Synaptics.exe ._cache_Synaptics.exe PID 940 wrote to memory of 3028 940 svchost.exe svchcst.exe PID 940 wrote to memory of 3028 940 svchost.exe svchcst.exe PID 940 wrote to memory of 3028 940 svchost.exe svchcst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe"C:\Users\Admin\AppData\Local\Temp\ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exeC:\Users\Admin\AppData\Local\Temp\HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3120
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1396
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:3624
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240619625.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4552
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe
Filesize4.4MB
MD5a8b58b62400156169c08e476d49f93d5
SHA14e0fda6f2a04400834d9e627f2a1fba83a060bfe
SHA25683010a66416ee369595a5cc25579ed4872821609c33a9899cd36ad7abc372af0
SHA512310dca2b11792871f2788ed55ba0cc7e56fd01ff06d987d1ce92ea7a1b447b70be37408d18e1c83330c7634f690c3cffc5c095fac47bd40ddf7475d6dde5c2d9
-
Filesize
22KB
MD53d670beef59fecd095e622920458004b
SHA10d600edd86bc5e1bc1442781c6e29809eaa13e09
SHA256df60e914d948e29a5b9aa6b0970392210c5b3ad8e0111a438384fe5b10ad220c
SHA512fbaed6f1c37b4357a182681aa69a47705da034c96b53f937cab8a9ea18c2857fc912b506c91a3c31cd1cd3286ebcc8af12e9a4515869eca29858772dc820647e
-
Filesize
1.2MB
MD5c571f838e2d8712dc164e10202d2e804
SHA1f9178df311c54de126c1b9d8a82db5e19a9dbd81
SHA256d894014ff299db4dc489733c784fa71b6c6bcf6b4e19ca44409da97627e0aea5
SHA51243255dd2be91e0c6b95c9fb304d123b3bd437eb766d37580b42cbc8f408db477bce7f420752a4a19077355debfe8095982c5d32b858f646f7fc0e8876a9e5fd7
-
C:\Users\Admin\AppData\Local\Temp\HD_ca4d39469bbf4c84ccee380d2cb03d15b7fbcb76e640b3714ffc15baf6a0145d.exe
Filesize5.2MB
MD5ead6353ec80c02989ad2e1bb1eee149c
SHA1e9ae278b098f3bc7f42ef17043e34b83db5dcc2b
SHA25619f47345fb52b753612911750f87dfc67b69887cf3e1154b6e2829390976e597
SHA51206a0b27ce95cc21e5e92fba87590c62d38226fbe5fdfe43df2a3ad134ce8181ecc200a12fe1e575c2cd31a9192aace17183628cd0b92209f838915a3115e4dcd
-
Filesize
337KB
MD5fb66e1e31fa1e6dfb21a50ccd11e0409
SHA16c45a0a115ec896eb14a531a44809b2a22cf8934
SHA2565ea8c5455f0ebe884ed98834e78ead8b6c68814bbb1723370299fa44b88c0faa
SHA51258ee149f70438296a67d5ae5cbd6cb9f5b2510a0381466b8f09eec3835be1ce7cad6903ca8fbc9273105132e85952208e78c59f776416c5449b86cc62111154b
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
51KB
MD52726b5ee09ddc8f443445a347b14186d
SHA17b8fb44a470b3c66393defe23a367120999c4046
SHA256b767b73261c664e8a8e439593db291d31009d931033414b9ec75d3825a6ec520
SHA51225349176b344830f2fb921bf5bceee938978b653119525fa423c2883392d07fa53cc7c890be09d597a06483a9d954e8b86642e1374fbbfbe4af1adccbb1885b6
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641