Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 22:47
Behavioral task
behavioral1
Sample
cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe
Resource
win7-20241010-en
General
-
Target
cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe
-
Size
3.5MB
-
MD5
470e9fe6c02e6aa4cb615bb5e27a3901
-
SHA1
24d99a93454eabbb4fa12358e281daad7969e48b
-
SHA256
cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41
-
SHA512
2bef2f5dc44e0cd1792dca5c9ca422504ccaddda316f7dddfa1430abb7dc431f404eef92336cfd7d5f2f34715fb9bd1d28a20697462e2d617c15cb580d5349ab
-
SSDEEP
98304:Lnsmtk2aNXzhW148Pd+Tf1mpcOldJQ3/VY:zL6FK4s0TfLOdo/K
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Xred family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
resource behavioral1/files/0x0006000000019820-166.dat behavioral1/files/0x0006000000019d62-179.dat behavioral1/files/0x0008000000019820-190.dat -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Executes dropped EXE 9 IoCs
pid Process 2448 ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 2864 Synaptics.exe 2752 ._cache_Synaptics.exe 2356 ._cache_synaptics.exe 2808 icsys.icn.exe 3020 explorer.exe 2036 spoolsv.exe 1148 svchost.exe 2424 spoolsv.exe -
Loads dropped DLL 11 IoCs
pid Process 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 2864 Synaptics.exe 2864 Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2808 icsys.icn.exe 3020 explorer.exe 2036 spoolsv.exe 1148 svchost.exe -
resource yara_rule behavioral1/files/0x000a00000001225c-6.dat themida behavioral1/memory/2448-18-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/840-17-0x0000000005180000-0x0000000005796000-memory.dmp themida behavioral1/memory/2752-38-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x0009000000018b71-63.dat themida behavioral1/memory/2808-68-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2448-69-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x000600000001998d-89.dat themida behavioral1/memory/3020-96-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x0006000000019bf9-114.dat themida behavioral1/memory/2036-119-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2752-123-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x0006000000019d61-129.dat themida behavioral1/memory/1148-134-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2424-147-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2808-150-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2808-149-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/3020-152-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2752-151-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2808-155-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2036-157-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/1148-208-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/1148-210-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/3020-211-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/3020-265-0x0000000000400000-0x0000000000A16000-memory.dmp themida -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2448 ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 2752 ._cache_Synaptics.exe 2808 icsys.icn.exe 3020 explorer.exe 2036 spoolsv.exe 1148 svchost.exe 2424 spoolsv.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Synaptics.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1716 schtasks.exe 2612 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2880 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3020 explorer.exe 1148 svchost.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2880 EXCEL.EXE 2752 ._cache_Synaptics.exe 2752 ._cache_Synaptics.exe 2808 icsys.icn.exe 2808 icsys.icn.exe 3020 explorer.exe 3020 explorer.exe 2036 spoolsv.exe 2036 spoolsv.exe 1148 svchost.exe 1148 svchost.exe 2424 spoolsv.exe 2424 spoolsv.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 840 wrote to memory of 2448 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 29 PID 840 wrote to memory of 2448 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 29 PID 840 wrote to memory of 2448 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 29 PID 840 wrote to memory of 2448 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 29 PID 840 wrote to memory of 2864 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 30 PID 840 wrote to memory of 2864 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 30 PID 840 wrote to memory of 2864 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 30 PID 840 wrote to memory of 2864 840 cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe 30 PID 2864 wrote to memory of 2752 2864 Synaptics.exe 31 PID 2864 wrote to memory of 2752 2864 Synaptics.exe 31 PID 2864 wrote to memory of 2752 2864 Synaptics.exe 31 PID 2864 wrote to memory of 2752 2864 Synaptics.exe 31 PID 2752 wrote to memory of 2356 2752 ._cache_Synaptics.exe 33 PID 2752 wrote to memory of 2356 2752 ._cache_Synaptics.exe 33 PID 2752 wrote to memory of 2356 2752 ._cache_Synaptics.exe 33 PID 2752 wrote to memory of 2356 2752 ._cache_Synaptics.exe 33 PID 2752 wrote to memory of 2808 2752 ._cache_Synaptics.exe 34 PID 2752 wrote to memory of 2808 2752 ._cache_Synaptics.exe 34 PID 2752 wrote to memory of 2808 2752 ._cache_Synaptics.exe 34 PID 2752 wrote to memory of 2808 2752 ._cache_Synaptics.exe 34 PID 2808 wrote to memory of 3020 2808 icsys.icn.exe 35 PID 2808 wrote to memory of 3020 2808 icsys.icn.exe 35 PID 2808 wrote to memory of 3020 2808 icsys.icn.exe 35 PID 2808 wrote to memory of 3020 2808 icsys.icn.exe 35 PID 3020 wrote to memory of 2036 3020 explorer.exe 36 PID 3020 wrote to memory of 2036 3020 explorer.exe 36 PID 3020 wrote to memory of 2036 3020 explorer.exe 36 PID 3020 wrote to memory of 2036 3020 explorer.exe 36 PID 2036 wrote to memory of 1148 2036 spoolsv.exe 37 PID 2036 wrote to memory of 1148 2036 spoolsv.exe 37 PID 2036 wrote to memory of 1148 2036 spoolsv.exe 37 PID 2036 wrote to memory of 1148 2036 spoolsv.exe 37 PID 1148 wrote to memory of 2424 1148 svchost.exe 38 PID 1148 wrote to memory of 2424 1148 svchost.exe 38 PID 1148 wrote to memory of 2424 1148 svchost.exe 38 PID 1148 wrote to memory of 2424 1148 svchost.exe 38 PID 3020 wrote to memory of 2056 3020 explorer.exe 39 PID 3020 wrote to memory of 2056 3020 explorer.exe 39 PID 3020 wrote to memory of 2056 3020 explorer.exe 39 PID 3020 wrote to memory of 2056 3020 explorer.exe 39 PID 1148 wrote to memory of 1716 1148 svchost.exe 40 PID 1148 wrote to memory of 1716 1148 svchost.exe 40 PID 1148 wrote to memory of 1716 1148 svchost.exe 40 PID 1148 wrote to memory of 1716 1148 svchost.exe 40 PID 1148 wrote to memory of 2612 1148 svchost.exe 44 PID 1148 wrote to memory of 2612 1148 svchost.exe 44 PID 1148 wrote to memory of 2612 1148 svchost.exe 44 PID 1148 wrote to memory of 2612 1148 svchost.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe"C:\Users\Admin\AppData\Local\Temp\cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe"C:\Users\Admin\AppData\Local\Temp\._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
PID:2356
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe7⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 22:50 /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1716
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 22:51 /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2612
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe6⤵PID:2056
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5470e9fe6c02e6aa4cb615bb5e27a3901
SHA124d99a93454eabbb4fa12358e281daad7969e48b
SHA256cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41
SHA5122bef2f5dc44e0cd1792dca5c9ca422504ccaddda316f7dddfa1430abb7dc431f404eef92336cfd7d5f2f34715fb9bd1d28a20697462e2d617c15cb580d5349ab
-
C:\Users\Admin\AppData\Local\Temp\._cache_cc474b2294467921e1156d5c72461ca57de5bfcd931d6525b3d4bd74150a0d41.exe
Filesize2.7MB
MD51255bd40100c5d7b449389360a788d7b
SHA1bdf4375dccb6399df92dfbfdd466584b8e4323c8
SHA2563d0c58bad97ae8f453317f19e713b611e13ed7f661f0b119431cd9f17854197c
SHA5123955a21fef26aa3c991bb2079638d8ceafb5bafd4904c6d20d26a3764ff19847ab60812d9241cc8b6e11e49ea8143c2e9c03b349aa99c852c5c55b72659bf474
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
21KB
MD5d8da761d022d1831e86059e84ff8eac5
SHA1431c3f585914e06cd525e315e3c7dfe327616f75
SHA256fa368a82653f8dfe3b2447de9185d665dd1d8ae2867c31c8a0ebaa4d74a80cf3
SHA512fcc68a3d5ce18d1c272fbb7f6495a8a4c6d94b0bdbbdf23fe185a541d3abe7c6662a4613b8e2fcebd2ce6afc19b6ab0c1db94b6ab09fdaf662d190a539597619
-
Filesize
27KB
MD5320af4fc17e6dbb06e5e22dceb4f178e
SHA1cf57eae902ee47b5ff7cbd921d7067031a943534
SHA256777d43e4218ed75fbda3827d43797a3f688b58ff4f55539d1ea4a7ff3a08d5d0
SHA512220a345a1cac526dd15025b61851d92b15b0cb6f0575738b1b6505f8e4c7ffd8a67fa8330928c99ee132c5665d63b0db6f897e9fd4d01bc8188ea3ae3aa6375f
-
Filesize
25KB
MD5593574933ef9aaa23b4d558c52969cd9
SHA142a8da722612e8919d4e927a14ec413584bf72d6
SHA2567895425103fd853f55a050087e64dcf287281af51fd10cbb01503472b512caec
SHA512a77010f179ecc65877b0f0eb059076328a0c4ebe36e44082c931a50973f5bd524609ed03a7f908454b2bd2f3bcafd7fd36bd73f4818bf1fc82e0d4e17cd17eaa
-
Filesize
24KB
MD5a93ca0b31feb005eb6dc7fe2d7ad1eeb
SHA1f8b48a80455595abd71b3341bd67c3e8652c010f
SHA2568b16f5b84c3d35d72d9e541fd6e3a4b8eba4d4c2abc5cb49e5696909b9e4698d
SHA5124cc7a19208f4377aec01ed15304025cee975e2dcd059bcde4cffbe1c56a5121dabd874324803d727c6aaaa6c55689bf0001c0f72cdac5f09f91d77ce06c98df2
-
Filesize
23KB
MD5ec61ec77f5db530ecd28532982f27f2b
SHA1ec6f9cb1deedd05306ad2d1320f2e50e5904b5b3
SHA25631fca2e26c69c60b99b9129862e6bf67b76c568e2b78060fa39c5bfc331bddeb
SHA512644ae4e947052e7c7a853097751ad082171d67ad6e970ade9bb5fe64d42fcf1e3dd26307352cb49fe3262d44e8ac5e9fbaf818602407190098bd37aaefea6e4e
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
139KB
MD5c30802b4db31df6154dc0d7f4e243915
SHA1d309150998a6f27ea31c34ee061b3ce2dbb39c47
SHA256d3d17298181eec362876e9f05757d2f282dccac7a4074a8e3589158038a97302
SHA512aa6c589158e6d9b684515534df891638a0e32741cd701c46c47fd86040e885eba55804779ce60f5337ea4cd6f52f17c2c39251352678df5b88a74a01b24b0fce
-
Filesize
2.6MB
MD526f1cda567bb4a89a5355f0b2962d2d4
SHA11bda712e8b9c62eedd6d3d0fef48ce557fc166ac
SHA2567d280ccd0f0ff6447e1c41b7ce037f961c5e8e99dd6d752252f6b4aa6201d4e2
SHA512a18741bb84cfb3e41abcc069c5be218c326f086b2992604c96f8ae94d065d70108e4aca9759d51060f3a520ee13db43739969787e2a898c283ee712355e99e1e
-
Filesize
2.6MB
MD526c113e39ae04424e489d2d8dbd1fe5e
SHA13f8cb44f4405bac2f3fcdb24e2f48c2a5bc3c100
SHA256ee8bc585e30d385d8d2541629a7e9d11f9e23023bfeffcb3eafef8b8a57d5687
SHA5125f6599f10ccbfa99dfc77613bf5ac444f09b7073cf1fe2fa002bb4fd21aceda5e4782a9527dd86815fae79fe05c2ff68663e1822570497e47b452a0621e4b375
-
Filesize
2.6MB
MD55fe071a3da9ca186c50b1cbce7c6b361
SHA1c80d8be5bca96a01fc2e0e0b8f65005e37424c2c
SHA256d2bcb3fe3f930636dd409b9ada839241ed1f678aa1f7a73b1a39a7f2e287a094
SHA51293ce1d647360caa44b21834273025c230d0251277ba436f37822b45d61ec8bc1ef314fe025c75aa9d6717fa88c39a0b1c24beff1434ae000f6f439710b7fddd1
-
Filesize
2.6MB
MD5c1f7c264f78843ce01c26a9668726980
SHA128b6d2f104d8ae1a17cd5124fc0daa03f018035e
SHA256d3c85b6d45017c7caef283903ad591b4904db2f339ee7254c9b62afd660fbabe
SHA5128dac2209b8a58c40e1595fb3832c19e1df1e4676b9a813350d4ffcd234954e57a399b10e69a526e62ee5d7c6120d0b0d2a2f29f6cfd53ae17c828e182cadba02