Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 23:30
Behavioral task
behavioral1
Sample
71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe
Resource
win7-20240903-en
General
-
Target
71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe
-
Size
4.1MB
-
MD5
87c85bf6a20d7dcc35b94983378f5280
-
SHA1
2515d5eb4479d82338ac8b6da2d7f30a2c8c4f90
-
SHA256
71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1
-
SHA512
1e3b604f5273cd81eaaf827b605a3c919b154ef3986606b65c9c8a725d6be2b79b550c71d807979a56cc120d8ed3bdf231b9e7fdff7a09d9103b9031f3c5cde4
-
SSDEEP
98304:Vnsmtk2aEXzhW148Pd+Tf1mpcOldJQ3/V11v3jypL:pLnFK4s0TfLOdo/HV3epL
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Xred family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe -
Executes dropped EXE 11 IoCs
pid Process 2324 ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 2800 Synaptics.exe 2564 ._cache_Synaptics.exe 2584 ._cache_synaptics.exe 1476 icsys.icn.exe 2304 ._cache_synaptics.exe 744 explorer.exe 1856 spoolsv.exe 3020 ._cache_synaptics.exe 2948 svchost.exe 960 spoolsv.exe -
Loads dropped DLL 11 IoCs
pid Process 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 2800 Synaptics.exe 2800 Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 1476 icsys.icn.exe 744 explorer.exe 1856 spoolsv.exe 2948 svchost.exe -
resource yara_rule behavioral1/files/0x000a0000000122ea-4.dat themida behavioral1/memory/2324-18-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2564-38-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x0007000000016da7-58.dat themida behavioral1/memory/1476-63-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x0007000000018697-71.dat themida behavioral1/memory/744-84-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x0008000000018c44-104.dat themida behavioral1/memory/1856-110-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2324-118-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/files/0x00060000000191f6-130.dat themida behavioral1/memory/2564-136-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2948-137-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/960-149-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/1476-150-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/1856-153-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/1476-157-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2564-156-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/744-160-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2948-163-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/744-196-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/744-226-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2948-227-0x0000000000400000-0x0000000000A16000-memory.dmp themida -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2324 ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 2564 ._cache_Synaptics.exe 1476 icsys.icn.exe 744 explorer.exe 1856 spoolsv.exe 2948 svchost.exe 960 spoolsv.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File created C:\Windows\Logs\CBS\CbsPersist_20241126233037.cab makecab.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Synaptics.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2480 schtasks.exe 2528 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2876 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2584 ._cache_synaptics.exe 2584 ._cache_synaptics.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 1476 icsys.icn.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 744 explorer.exe 2304 ._cache_synaptics.exe 2304 ._cache_synaptics.exe 2948 svchost.exe 2948 svchost.exe 2948 svchost.exe 2948 svchost.exe 2948 svchost.exe 2948 svchost.exe 2948 svchost.exe 2948 svchost.exe 2948 svchost.exe 2948 svchost.exe 2948 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 744 explorer.exe 2948 svchost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2584 ._cache_synaptics.exe Token: SeAssignPrimaryTokenPrivilege 2584 ._cache_synaptics.exe Token: SeIncreaseQuotaPrivilege 2584 ._cache_synaptics.exe Token: 0 2584 ._cache_synaptics.exe Token: SeDebugPrivilege 2304 ._cache_synaptics.exe Token: SeAssignPrimaryTokenPrivilege 2304 ._cache_synaptics.exe Token: SeIncreaseQuotaPrivilege 2304 ._cache_synaptics.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2564 ._cache_Synaptics.exe 2564 ._cache_Synaptics.exe 2876 EXCEL.EXE 1476 icsys.icn.exe 1476 icsys.icn.exe 744 explorer.exe 744 explorer.exe 1856 spoolsv.exe 1856 spoolsv.exe 2948 svchost.exe 2948 svchost.exe 960 spoolsv.exe 960 spoolsv.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2324 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 31 PID 1088 wrote to memory of 2324 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 31 PID 1088 wrote to memory of 2324 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 31 PID 1088 wrote to memory of 2324 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 31 PID 1088 wrote to memory of 2800 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 32 PID 1088 wrote to memory of 2800 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 32 PID 1088 wrote to memory of 2800 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 32 PID 1088 wrote to memory of 2800 1088 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 32 PID 2800 wrote to memory of 2564 2800 Synaptics.exe 33 PID 2800 wrote to memory of 2564 2800 Synaptics.exe 33 PID 2800 wrote to memory of 2564 2800 Synaptics.exe 33 PID 2800 wrote to memory of 2564 2800 Synaptics.exe 33 PID 2564 wrote to memory of 2584 2564 ._cache_Synaptics.exe 35 PID 2564 wrote to memory of 2584 2564 ._cache_Synaptics.exe 35 PID 2564 wrote to memory of 2584 2564 ._cache_Synaptics.exe 35 PID 2564 wrote to memory of 2584 2564 ._cache_Synaptics.exe 35 PID 2564 wrote to memory of 1476 2564 ._cache_Synaptics.exe 36 PID 2564 wrote to memory of 1476 2564 ._cache_Synaptics.exe 36 PID 2564 wrote to memory of 1476 2564 ._cache_Synaptics.exe 36 PID 2564 wrote to memory of 1476 2564 ._cache_Synaptics.exe 36 PID 1476 wrote to memory of 744 1476 icsys.icn.exe 38 PID 1476 wrote to memory of 744 1476 icsys.icn.exe 38 PID 1476 wrote to memory of 744 1476 icsys.icn.exe 38 PID 1476 wrote to memory of 744 1476 icsys.icn.exe 38 PID 744 wrote to memory of 1856 744 explorer.exe 41 PID 744 wrote to memory of 1856 744 explorer.exe 41 PID 744 wrote to memory of 1856 744 explorer.exe 41 PID 744 wrote to memory of 1856 744 explorer.exe 41 PID 1856 wrote to memory of 2948 1856 spoolsv.exe 44 PID 1856 wrote to memory of 2948 1856 spoolsv.exe 44 PID 1856 wrote to memory of 2948 1856 spoolsv.exe 44 PID 1856 wrote to memory of 2948 1856 spoolsv.exe 44 PID 2948 wrote to memory of 960 2948 svchost.exe 45 PID 2948 wrote to memory of 960 2948 svchost.exe 45 PID 2948 wrote to memory of 960 2948 svchost.exe 45 PID 2948 wrote to memory of 960 2948 svchost.exe 45 PID 744 wrote to memory of 880 744 explorer.exe 46 PID 744 wrote to memory of 880 744 explorer.exe 46 PID 744 wrote to memory of 880 744 explorer.exe 46 PID 744 wrote to memory of 880 744 explorer.exe 46 PID 2948 wrote to memory of 2480 2948 svchost.exe 47 PID 2948 wrote to memory of 2480 2948 svchost.exe 47 PID 2948 wrote to memory of 2480 2948 svchost.exe 47 PID 2948 wrote to memory of 2480 2948 svchost.exe 47 PID 2948 wrote to memory of 2528 2948 svchost.exe 51 PID 2948 wrote to memory of 2528 2948 svchost.exe 51 PID 2948 wrote to memory of 2528 2948 svchost.exe 51 PID 2948 wrote to memory of 2528 2948 svchost.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe"C:\Users\Admin\AppData\Local\Temp\71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exe"c:\users\admin\appdata\local\temp\._cache_synaptics.exe " InjUpdate5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exe"c:\users\admin\appdata\local\temp\._cache_synaptics.exe " /TI/ InjUpdate6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe7⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:32 /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2480
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:33 /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2528
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe6⤵PID:880
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2876
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20241126233037.log C:\Windows\Logs\CBS\CbsPersist_20241126233037.cab1⤵
- Drops file in Windows directory
PID:1636
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD587c85bf6a20d7dcc35b94983378f5280
SHA12515d5eb4479d82338ac8b6da2d7f30a2c8c4f90
SHA25671ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1
SHA5121e3b604f5273cd81eaaf827b605a3c919b154ef3986606b65c9c8a725d6be2b79b550c71d807979a56cc120d8ed3bdf231b9e7fdff7a09d9103b9031f3c5cde4
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
25KB
MD5d5c0165d31fb3813f8646555a5758881
SHA1f517870ae53ddc77512d36debb44468da3edbd8e
SHA2566916a5d078c6daf3db977ae55853cc4eef93e24328c8e8ef955220d10c7052b9
SHA51221fa61a736ce0dd802aae7c81efeb5ae2f2319f34aadee941ea87dfeda3431f36a278513fbab6e33a028e6b7ee024cd51333fd31ce645dd92598e078e3313219
-
Filesize
86KB
MD52cc29be38bd5a1e14386c7186a7f6959
SHA1858df624a55d519b8f1e597850c867b97cbcbc7b
SHA2561f8a85d2720b2cbeeadfb92ac471a3902c128f13cf04e0d59bbff54f786943a0
SHA5120a39e8dbf9dad26e085de227679447586f3923fc3d2d3df219e9b837723cbc026af592d30ae25195338b627c1526b114f98527e37d51072a48083213915b0cbe
-
\Users\Admin\AppData\Local\Temp\._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe
Filesize3.3MB
MD5923d00022b92bfbc27f875cf19f03e10
SHA15b015ccd1eaf741ef16dc1d7bc97d53dc8cfca98
SHA25626902e46a1dda71d501c54d348dc242adf97032c630199307f8b432eed4afde6
SHA512274011c0320b7f242a5e7aac066b7a8b10f4d08b657b4cc348630d7e84dc7e9c2fd260f6d1e818cdcb9eedb30ca374d8f0a6717b95e0388e12fdac96fd6dfb38
-
Filesize
771KB
MD5fe260da05d0512b65eec3e4cec4ea17c
SHA18915d023e9a5dfbba722b6d9678cbafe6a3b3630
SHA2569dd559318f745949f4b68015033866a5ff02afea3fce22fca28e5bc33de40fc8
SHA512bf875821c7b4bd21b458e248d657a23378493066a77113786c67ac94d8632f90fcb2da183ab842c5fab1ecedb80e2b143c0ffb24dc864264f3386eff3f929f5b
-
Filesize
2.6MB
MD544315d1c5b56a9c8bc3adff6780edadd
SHA1d1f0828e8dd35574f0bd23496c5b05163dd0f878
SHA2565b8b5611997a19440bad55968879c33e00691e91721d6bada932ef3d98372476
SHA512b1c7af94e11395ca1ebc6d83014c9ecaa655c90164f43cb1fb3c4b66b0aa393653549899535e7590def4fc4a73256ef002c3ecd043070faf42883eacccb01cce
-
Filesize
2.6MB
MD502da612c2a12a61524dd5b95f1ad1f0f
SHA1672ef806475880f58483b111acc7cf8bfd77ce6c
SHA256d3b0de7c01802869be2c1233a491a2b94945e2fc82a3c3719365a9746477a24d
SHA5120a4c32617c2a94d7eba6435a72e0b718f2e37ac80b67414bec0d60f8a2df43fb902bc682aa585d03fa04cab145236fe42d541b7d60cee796619c9523fbb322d8
-
Filesize
2.6MB
MD5d8b5fc05dae4a7fb06e17a417218d66b
SHA14094289b5185681011aac0ac751480ec793045f7
SHA256ab6134d8dd7103070cf395b6205a820ef93a70045700f7f0003c37c6eb8b0464
SHA512c5303f2c3cde27acaa168b45b892576e7620b705a9136e3e0ee8d1c3446b7904dd1762b26ad378e34096afc4332e69fcb6dc17b17a89f44da4116ad70ac2ae95
-
Filesize
2.6MB
MD5a0903bd8e2f5ceb7ed026ff8cb991301
SHA11877e19490d2cd79dd2ae88cc2a0211710fdac93
SHA256cac7d0a7de2590a99b987ab5a895fe3eb9c3154dc4e0e1d8c353747fe7a46ad5
SHA512f56559596d5c905f058643d64882ea6a64b3f1a09884c1501f96abf7fa439713ec6ce6322da81d9317a6f43c92628eaf4e4b2fbaa47f8564969fcf40c952add7