Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 23:30
Behavioral task
behavioral1
Sample
71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe
Resource
win7-20240903-en
General
-
Target
71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe
-
Size
4.1MB
-
MD5
87c85bf6a20d7dcc35b94983378f5280
-
SHA1
2515d5eb4479d82338ac8b6da2d7f30a2c8c4f90
-
SHA256
71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1
-
SHA512
1e3b604f5273cd81eaaf827b605a3c919b154ef3986606b65c9c8a725d6be2b79b550c71d807979a56cc120d8ed3bdf231b9e7fdff7a09d9103b9031f3c5cde4
-
SSDEEP
98304:Vnsmtk2aEXzhW148Pd+Tf1mpcOldJQ3/V11v3jypL:pLnFK4s0TfLOdo/HV3epL
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Xred family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 11 IoCs
pid Process 2024 ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 616 Synaptics.exe 4944 ._cache_Synaptics.exe 4284 ._cache_synaptics.exe 916 icsys.icn.exe 4564 explorer.exe 1540 ._cache_synaptics.exe 3056 spoolsv.exe 4324 svchost.exe 844 ._cache_synaptics.exe 2876 spoolsv.exe -
resource yara_rule behavioral2/files/0x000c000000023b17-5.dat themida behavioral2/memory/2024-70-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4944-192-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x000a000000023b7e-216.dat themida behavioral2/memory/916-218-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x000c000000023b83-226.dat themida behavioral2/memory/4564-227-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x000b000000023b87-244.dat themida behavioral2/memory/3056-245-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x000b000000023b8c-255.dat themida behavioral2/memory/4324-256-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/2876-269-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/2876-292-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/3056-293-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/916-295-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4944-297-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/2024-298-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4564-326-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4324-331-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4564-347-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4324-348-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4564-377-0x0000000000400000-0x0000000000A16000-memory.dmp themida -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2024 ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 4944 ._cache_Synaptics.exe 916 icsys.icn.exe 4564 explorer.exe 3056 spoolsv.exe 4324 svchost.exe 2876 spoolsv.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Synaptics.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@%SystemRoot%\System32\ndfapi.dll,-40001 = "Windows Network Diagnostics" ._cache_synaptics.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1368 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 4284 ._cache_synaptics.exe 4284 ._cache_synaptics.exe 4284 ._cache_synaptics.exe 4284 ._cache_synaptics.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe 916 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4564 explorer.exe 4324 svchost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4284 ._cache_synaptics.exe Token: SeAssignPrimaryTokenPrivilege 4284 ._cache_synaptics.exe Token: SeIncreaseQuotaPrivilege 4284 ._cache_synaptics.exe Token: 0 4284 ._cache_synaptics.exe Token: SeDebugPrivilege 1540 ._cache_synaptics.exe Token: SeAssignPrimaryTokenPrivilege 1540 ._cache_synaptics.exe Token: SeIncreaseQuotaPrivilege 1540 ._cache_synaptics.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 4944 ._cache_Synaptics.exe 4944 ._cache_Synaptics.exe 1368 EXCEL.EXE 1368 EXCEL.EXE 916 icsys.icn.exe 916 icsys.icn.exe 1368 EXCEL.EXE 4564 explorer.exe 4564 explorer.exe 1368 EXCEL.EXE 3056 spoolsv.exe 3056 spoolsv.exe 4324 svchost.exe 4324 svchost.exe 1368 EXCEL.EXE 1368 EXCEL.EXE 2876 spoolsv.exe 2876 spoolsv.exe 1368 EXCEL.EXE 1368 EXCEL.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2024 1036 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 83 PID 1036 wrote to memory of 2024 1036 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 83 PID 1036 wrote to memory of 2024 1036 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 83 PID 1036 wrote to memory of 616 1036 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 84 PID 1036 wrote to memory of 616 1036 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 84 PID 1036 wrote to memory of 616 1036 71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe 84 PID 616 wrote to memory of 4944 616 Synaptics.exe 85 PID 616 wrote to memory of 4944 616 Synaptics.exe 85 PID 616 wrote to memory of 4944 616 Synaptics.exe 85 PID 4944 wrote to memory of 4284 4944 ._cache_Synaptics.exe 87 PID 4944 wrote to memory of 4284 4944 ._cache_Synaptics.exe 87 PID 4944 wrote to memory of 4284 4944 ._cache_Synaptics.exe 87 PID 4944 wrote to memory of 916 4944 ._cache_Synaptics.exe 88 PID 4944 wrote to memory of 916 4944 ._cache_Synaptics.exe 88 PID 4944 wrote to memory of 916 4944 ._cache_Synaptics.exe 88 PID 916 wrote to memory of 4564 916 icsys.icn.exe 91 PID 916 wrote to memory of 4564 916 icsys.icn.exe 91 PID 916 wrote to memory of 4564 916 icsys.icn.exe 91 PID 4564 wrote to memory of 3056 4564 explorer.exe 93 PID 4564 wrote to memory of 3056 4564 explorer.exe 93 PID 4564 wrote to memory of 3056 4564 explorer.exe 93 PID 3056 wrote to memory of 4324 3056 spoolsv.exe 95 PID 3056 wrote to memory of 4324 3056 spoolsv.exe 95 PID 3056 wrote to memory of 4324 3056 spoolsv.exe 95 PID 4324 wrote to memory of 2876 4324 svchost.exe 97 PID 4324 wrote to memory of 2876 4324 svchost.exe 97 PID 4324 wrote to memory of 2876 4324 svchost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe"C:\Users\Admin\AppData\Local\Temp\71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2024
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4284 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exe"c:\users\admin\appdata\local\temp\._cache_synaptics.exe " InjUpdate5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exe"c:\users\admin\appdata\local\temp\._cache_synaptics.exe " /TI/ InjUpdate6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:844
-
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe7⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1368
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD587c85bf6a20d7dcc35b94983378f5280
SHA12515d5eb4479d82338ac8b6da2d7f30a2c8c4f90
SHA25671ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1
SHA5121e3b604f5273cd81eaaf827b605a3c919b154ef3986606b65c9c8a725d6be2b79b550c71d807979a56cc120d8ed3bdf231b9e7fdff7a09d9103b9031f3c5cde4
-
C:\Users\Admin\AppData\Local\Temp\._cache_71ed567d690dd83de676f2a897a362794642d64d7d3e06960f1d09d43f2a97e1N.exe
Filesize3.3MB
MD5923d00022b92bfbc27f875cf19f03e10
SHA15b015ccd1eaf741ef16dc1d7bc97d53dc8cfca98
SHA25626902e46a1dda71d501c54d348dc242adf97032c630199307f8b432eed4afde6
SHA512274011c0320b7f242a5e7aac066b7a8b10f4d08b657b4cc348630d7e84dc7e9c2fd260f6d1e818cdcb9eedb30ca374d8f0a6717b95e0388e12fdac96fd6dfb38
-
Filesize
771KB
MD5fe260da05d0512b65eec3e4cec4ea17c
SHA18915d023e9a5dfbba722b6d9678cbafe6a3b3630
SHA2569dd559318f745949f4b68015033866a5ff02afea3fce22fca28e5bc33de40fc8
SHA512bf875821c7b4bd21b458e248d657a23378493066a77113786c67ac94d8632f90fcb2da183ab842c5fab1ecedb80e2b143c0ffb24dc864264f3386eff3f929f5b
-
Filesize
22KB
MD57bf106f9e2d81429554131b61cfdc48f
SHA1d619960f9928380e95345882124985a4a9f6963a
SHA256910f2330d627f876b2d04de4ddafc6039c33b2ac2faac879735ab294da261526
SHA5120433c1387bc34dda6d33ceae5d280ce800705337ba0fb9933a98f02f0dec64e62e6ed1e0308d1dafd3a64d61f28c0c3d0e007e1cd68d80dcfa03065696a42ef2
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
2.6MB
MD502da612c2a12a61524dd5b95f1ad1f0f
SHA1672ef806475880f58483b111acc7cf8bfd77ce6c
SHA256d3b0de7c01802869be2c1233a491a2b94945e2fc82a3c3719365a9746477a24d
SHA5120a4c32617c2a94d7eba6435a72e0b718f2e37ac80b67414bec0d60f8a2df43fb902bc682aa585d03fa04cab145236fe42d541b7d60cee796619c9523fbb322d8
-
Filesize
2.6MB
MD5fef7f382642daa919a3a0209335d3702
SHA141d90d29b9cda9d417d8fbc0dbe7aa5584d22c7b
SHA256a25cc547000d1dbd0ff9fc9b4aabdea190a0a987a37dcb95eb5d3f4f768f8502
SHA5129addc4d73012ac931fbf74b58b901176deec8a3d0d78b009cb42d279529309b9bd20734fdf5c1dba3cdae6164f042ff180a3ffa6a33a3b1686cde98cd11eae23
-
Filesize
25KB
MD5d5c0165d31fb3813f8646555a5758881
SHA1f517870ae53ddc77512d36debb44468da3edbd8e
SHA2566916a5d078c6daf3db977ae55853cc4eef93e24328c8e8ef955220d10c7052b9
SHA51221fa61a736ce0dd802aae7c81efeb5ae2f2319f34aadee941ea87dfeda3431f36a278513fbab6e33a028e6b7ee024cd51333fd31ce645dd92598e078e3313219
-
Filesize
86KB
MD52cc29be38bd5a1e14386c7186a7f6959
SHA1858df624a55d519b8f1e597850c867b97cbcbc7b
SHA2561f8a85d2720b2cbeeadfb92ac471a3902c128f13cf04e0d59bbff54f786943a0
SHA5120a39e8dbf9dad26e085de227679447586f3923fc3d2d3df219e9b837723cbc026af592d30ae25195338b627c1526b114f98527e37d51072a48083213915b0cbe
-
Filesize
2.6MB
MD5a0903bd8e2f5ceb7ed026ff8cb991301
SHA11877e19490d2cd79dd2ae88cc2a0211710fdac93
SHA256cac7d0a7de2590a99b987ab5a895fe3eb9c3154dc4e0e1d8c353747fe7a46ad5
SHA512f56559596d5c905f058643d64882ea6a64b3f1a09884c1501f96abf7fa439713ec6ce6322da81d9317a6f43c92628eaf4e4b2fbaa47f8564969fcf40c952add7
-
Filesize
2.6MB
MD54572a695cdb4a29a3a61bc36c40df75b
SHA11b1fee0b97cc9a651bb0a240b45fca1e05223389
SHA256ef803b7e28295b9205f3e727bf41fca93a729d7abe82ee406c2b88a1342a4ba5
SHA51276942f254c3cc67a3de7bd9830388d52b37bc80c2867447c4336c1f68474d540a3d674a6f0daafd704a1338676e21ba30d09575df79c894b9598b96b160df58a