Analysis
-
max time kernel
1790s -
max time network
1561s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 17:04
Behavioral task
behavioral1
Sample
SynapseLauncher.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SynapseLauncher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
info.cmd
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
info.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
redeem.cmd
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
redeem.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
resethwid.cmd
Resource
win7-20240903-en
General
-
Target
resethwid.cmd
-
Size
46B
-
MD5
01860cb9ef68521cb490de8492cddff7
-
SHA1
608399da35b7506a05eb949b8e0778cba937c780
-
SHA256
dbbc8d693171130722551524d75edb17a31221cecfe28755c2e10d7d0ca8256f
-
SHA512
08018e4b9b8902f5dbd73f02864bdd40e467e573f88eaa20530ef2262f1c5fb7ce96a144f8c83ed100fcd00a55ae4dcfacb6210a28ffb6e2bb9ee21fe7466166
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
SynapseLauncher.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SynapseLauncher.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
SynapseLauncher.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SynapseLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SynapseLauncher.exe -
Processes:
resource yara_rule behavioral7/memory/2496-0-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral7/memory/2508-1-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral7/memory/2508-3-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral7/memory/2508-5-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral7/memory/2508-4-0x0000000140000000-0x0000000140CDE000-memory.dmp themida behavioral7/memory/2508-6-0x0000000140000000-0x0000000140CDE000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
SynapseLauncher.exepid process 2508 SynapseLauncher.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2496 wrote to memory of 2508 2496 cmd.exe SynapseLauncher.exe PID 2496 wrote to memory of 2508 2496 cmd.exe SynapseLauncher.exe PID 2496 wrote to memory of 2508 2496 cmd.exe SynapseLauncher.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\resethwid.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\SynapseLauncher.exeSynapseLauncher.exe resethwid2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2508
-