Overview
overview
10Static
static
3SynapseZ C...er.exe
windows11-21h2-x64
10SynapseZ C...7c.bin
windows11-21h2-x64
3SynapseZ C...Ek.exe
windows11-21h2-x64
3SynapseZ C...re.dll
windows11-21h2-x64
3SynapseZ C...ss.exe
windows11-21h2-x64
3SynapseZ C...re.dll
windows11-21h2-x64
3SynapseZ C...pf.dll
windows11-21h2-x64
3SynapseZ C...rp.dll
windows11-21h2-x64
3SynapseZ C...r.html
windows11-21h2-x64
3SynapseZ C...tt.exe
windows11-21h2-x64
3SynapseZ C...or.dll
windows11-21h2-x64
9SynapseZ C...lf.dll
windows11-21h2-x64
3SynapseZ C...47.dll
windows11-21h2-x64
3SynapseZ C...GL.dll
windows11-21h2-x64
3SynapseZ C...v2.dll
windows11-21h2-x64
3SynapseZ C...mp.exe
windows11-21h2-x64
9Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-11-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
SynapseZ Cracked V5.2/Synapse X Launcher.exe
Resource
win11-20241023-en
Behavioral task
behavioral2
Sample
SynapseZ Cracked V5.2/auth/internal/3132e54eb7c.bin
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
SynapseZ Cracked V5.2/bin/359k6u5HUNL4tEk.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
SynapseZ Cracked V5.2/bin/CefSharp.BrowserSubprocess.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
SynapseZ Cracked V5.2/bin/CefSharp.BrowserSubprocess.exe
Resource
win11-20241023-en
Behavioral task
behavioral6
Sample
SynapseZ Cracked V5.2/bin/CefSharp.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
SynapseZ Cracked V5.2/bin/CefSharp.Wpf.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
SynapseZ Cracked V5.2/bin/CefSharp.dll
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
SynapseZ Cracked V5.2/bin/Editor.html
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
SynapseZ Cracked V5.2/bin/OoxIi8qtt.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
SynapseZ Cracked V5.2/bin/SynapseInjector.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
SynapseZ Cracked V5.2/bin/chrome_elf.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
SynapseZ Cracked V5.2/bin/d3dcompiler_47.dll
Resource
win11-20241023-en
Behavioral task
behavioral14
Sample
SynapseZ Cracked V5.2/bin/libEGL.dll
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
SynapseZ Cracked V5.2/bin/libGLESv2.dll
Resource
win11-20241007-en
General
-
Target
SynapseZ Cracked V5.2/bin/chrome_elf.dll
-
Size
788KB
-
MD5
6499ea6b92ab4971886bd06c12625819
-
SHA1
5ebb75eeca7625b9511233158a02f50a92867a39
-
SHA256
6820f276c0d71557a0c7b997fd2f4a3ac6a45c86454c4dc3bcfa29843b5c470b
-
SHA512
e57703730e42eb9d80e762337e08176705b349f54fbd429edc657d44c9dc3a1f9ccfa594bc3ef622798aebb5bc69b225abb266b00f9b350ae59f734c2f31f63d
-
SSDEEP
12288:bCr6Tisy+fUv6cwQhl0j+iBQIR+ybWlkkswiS1cVlqoKe9+nIMQbNt:Wr6Tisy+fUv6cwQhlcbWFi8iDjD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 332 wrote to memory of 4304 332 rundll32.exe 80 PID 332 wrote to memory of 4304 332 rundll32.exe 80 PID 332 wrote to memory of 4304 332 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\SynapseZ Cracked V5.2\bin\chrome_elf.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\SynapseZ Cracked V5.2\bin\chrome_elf.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:4304
-