Analysis
-
max time kernel
1562s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 17:04
Behavioral task
behavioral1
Sample
SynapseLauncher.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SynapseLauncher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
info.cmd
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
info.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
redeem.cmd
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
redeem.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
resethwid.cmd
Resource
win7-20240903-en
General
-
Target
info.cmd
-
Size
41B
-
MD5
f630c5e22556db1310faeab5ff373f78
-
SHA1
5b9fe06eba28a87d1d2d80118f987de099a243ba
-
SHA256
de78474fd346b5ec79f577b312a252de8615ec8a1c10fe13a43c979224785106
-
SHA512
83650868dd62522df60f2ff1f73a1752fbafe5deb8dd8d83c105ecf1accf23d6f957c654e188cf5a7679baf115ce208c180e4eb0e5fe21c1418efd3eb28978b7
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
SynapseLauncher.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SynapseLauncher.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
SynapseLauncher.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SynapseLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SynapseLauncher.exe -
Processes:
resource yara_rule behavioral3/memory/1684-0-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral3/memory/2912-1-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral3/memory/2912-3-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral3/memory/2912-4-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral3/memory/2912-5-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral3/memory/2912-7-0x0000000140000000-0x0000000140CDE000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
SynapseLauncher.exepid process 2912 SynapseLauncher.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1684 wrote to memory of 2912 1684 cmd.exe SynapseLauncher.exe PID 1684 wrote to memory of 2912 1684 cmd.exe SynapseLauncher.exe PID 1684 wrote to memory of 2912 1684 cmd.exe SynapseLauncher.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\info.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exeSynapseLauncher.exe info2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2912
-