Analysis
-
max time kernel
1563s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 17:04
Behavioral task
behavioral1
Sample
SynapseLauncher.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SynapseLauncher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
info.cmd
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
info.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
redeem.cmd
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
redeem.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
resethwid.cmd
Resource
win7-20240903-en
General
-
Target
redeem.cmd
-
Size
43B
-
MD5
6c7844cefb607abaed7207a6234eda71
-
SHA1
37902ed907569d60dfab37f2b4a137975ef47978
-
SHA256
fd66f408540d64c25248487c6380430b21672eace2782d2b3039a2ce1e766aef
-
SHA512
c127a21bf7ef1dc5c34c4fdcf6b11790d6130e3c903e8b0a3b60280bd499879ae9abad3c97722a4859e17cf0639809456a186a3c0f2590cfebf4adb226bcb385
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SynapseLauncher.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SynapseLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SynapseLauncher.exe -
resource yara_rule behavioral5/memory/1668-0-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral5/memory/2052-1-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral5/memory/2052-3-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral5/memory/2052-5-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral5/memory/2052-4-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral5/memory/2052-6-0x0000000140000000-0x0000000140CDE000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2052 SynapseLauncher.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2052 1668 cmd.exe 32 PID 1668 wrote to memory of 2052 1668 cmd.exe 32 PID 1668 wrote to memory of 2052 1668 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\redeem.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exeSynapseLauncher.exe redeem2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2052
-