Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 06:10
Behavioral task
behavioral1
Sample
f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe
Resource
win7-20241010-en
General
-
Target
f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe
-
Size
3.5MB
-
MD5
87e6c698376f457fbceef44ed48c5380
-
SHA1
7293e881ca722da9e024f1053280514e56c86a37
-
SHA256
f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52
-
SHA512
1980a37a795b93a2e10f86f990ea2b4ab583642903ef31b4c8c034d1f3b95a22492cf47beee3234a5e2c29438de76522c247455903a0718dbf16121d5cf035ee
-
SSDEEP
98304:Lnsmtk2aNXzhW148Pd+Tf1mpcOldJQ3/VY:zL6FK4s0TfLOdo/6
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Xred family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe._cache_Synaptics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
spoolsv.exesvchost.exespoolsv.exe._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe._cache_Synaptics.exeexplorer.exeicsys.icn.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_Synaptics.exe -
Executes dropped EXE 9 IoCs
Processes:
._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exeSynaptics.exe._cache_Synaptics.exe._cache_synaptics.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2392 ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 3032 Synaptics.exe 2972 ._cache_Synaptics.exe 1184 ._cache_synaptics.exe 1168 icsys.icn.exe 2976 explorer.exe 900 spoolsv.exe 2488 svchost.exe 1352 spoolsv.exe -
Loads dropped DLL 11 IoCs
Processes:
f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exeSynaptics.exe._cache_Synaptics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exepid process 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 3032 Synaptics.exe 3032 Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 1168 icsys.icn.exe 2976 explorer.exe 900 spoolsv.exe 2488 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe themida behavioral1/memory/2392-18-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2972-38-0x0000000000400000-0x0000000000A16000-memory.dmp themida \Windows\Resources\Themes\icsys.icn.exe themida behavioral1/memory/1168-54-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2972-61-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2392-65-0x0000000000400000-0x0000000000A16000-memory.dmp themida \Windows\Resources\Themes\explorer.exe themida behavioral1/memory/2976-85-0x0000000000400000-0x0000000000A16000-memory.dmp themida \Windows\Resources\spoolsv.exe themida behavioral1/memory/2976-95-0x00000000033E0000-0x00000000039F6000-memory.dmp themida behavioral1/memory/1168-115-0x0000000000400000-0x0000000000A16000-memory.dmp themida \Windows\Resources\svchost.exe themida behavioral1/memory/2488-121-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2976-131-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/1352-132-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/1352-136-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/900-138-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/900-139-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/1168-140-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2976-143-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2488-160-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2488-181-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral1/memory/2976-183-0x0000000000400000-0x0000000000A16000-memory.dmp themida -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exeexplorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Processes:
spoolsv.exe._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe._cache_Synaptics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe._cache_Synaptics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2392 ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 2972 ._cache_Synaptics.exe 1168 icsys.icn.exe 2976 explorer.exe 900 spoolsv.exe 2488 svchost.exe 1352 spoolsv.exe -
Drops file in Windows directory 5 IoCs
Processes:
._cache_Synaptics.exeicsys.icn.exeexplorer.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Synaptics.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
icsys.icn.exeexplorer.exesvchost.exespoolsv.exef7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exeEXCEL.EXEschtasks.exeschtasks.exeSynaptics.exe._cache_Synaptics.exespoolsv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2536 schtasks.exe 864 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2820 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
._cache_Synaptics.exeicsys.icn.exeexplorer.exesvchost.exepid process 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 1168 icsys.icn.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2976 explorer.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2976 explorer.exe 2488 svchost.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
._cache_Synaptics.exeEXCEL.EXEicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 2972 ._cache_Synaptics.exe 2972 ._cache_Synaptics.exe 2820 EXCEL.EXE 1168 icsys.icn.exe 1168 icsys.icn.exe 2976 explorer.exe 2976 explorer.exe 900 spoolsv.exe 900 spoolsv.exe 2488 svchost.exe 2488 svchost.exe 1352 spoolsv.exe 1352 spoolsv.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exeSynaptics.exe._cache_Synaptics.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 2600 wrote to memory of 2392 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe PID 2600 wrote to memory of 2392 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe PID 2600 wrote to memory of 2392 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe PID 2600 wrote to memory of 2392 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe PID 2600 wrote to memory of 3032 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Synaptics.exe PID 2600 wrote to memory of 3032 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Synaptics.exe PID 2600 wrote to memory of 3032 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Synaptics.exe PID 2600 wrote to memory of 3032 2600 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Synaptics.exe PID 3032 wrote to memory of 2972 3032 Synaptics.exe ._cache_Synaptics.exe PID 3032 wrote to memory of 2972 3032 Synaptics.exe ._cache_Synaptics.exe PID 3032 wrote to memory of 2972 3032 Synaptics.exe ._cache_Synaptics.exe PID 3032 wrote to memory of 2972 3032 Synaptics.exe ._cache_Synaptics.exe PID 2972 wrote to memory of 1184 2972 ._cache_Synaptics.exe ._cache_synaptics.exe PID 2972 wrote to memory of 1184 2972 ._cache_Synaptics.exe ._cache_synaptics.exe PID 2972 wrote to memory of 1184 2972 ._cache_Synaptics.exe ._cache_synaptics.exe PID 2972 wrote to memory of 1184 2972 ._cache_Synaptics.exe ._cache_synaptics.exe PID 2972 wrote to memory of 1168 2972 ._cache_Synaptics.exe icsys.icn.exe PID 2972 wrote to memory of 1168 2972 ._cache_Synaptics.exe icsys.icn.exe PID 2972 wrote to memory of 1168 2972 ._cache_Synaptics.exe icsys.icn.exe PID 2972 wrote to memory of 1168 2972 ._cache_Synaptics.exe icsys.icn.exe PID 1168 wrote to memory of 2976 1168 icsys.icn.exe explorer.exe PID 1168 wrote to memory of 2976 1168 icsys.icn.exe explorer.exe PID 1168 wrote to memory of 2976 1168 icsys.icn.exe explorer.exe PID 1168 wrote to memory of 2976 1168 icsys.icn.exe explorer.exe PID 2976 wrote to memory of 900 2976 explorer.exe spoolsv.exe PID 2976 wrote to memory of 900 2976 explorer.exe spoolsv.exe PID 2976 wrote to memory of 900 2976 explorer.exe spoolsv.exe PID 2976 wrote to memory of 900 2976 explorer.exe spoolsv.exe PID 900 wrote to memory of 2488 900 spoolsv.exe svchost.exe PID 900 wrote to memory of 2488 900 spoolsv.exe svchost.exe PID 900 wrote to memory of 2488 900 spoolsv.exe svchost.exe PID 900 wrote to memory of 2488 900 spoolsv.exe svchost.exe PID 2488 wrote to memory of 1352 2488 svchost.exe spoolsv.exe PID 2488 wrote to memory of 1352 2488 svchost.exe spoolsv.exe PID 2488 wrote to memory of 1352 2488 svchost.exe spoolsv.exe PID 2488 wrote to memory of 1352 2488 svchost.exe spoolsv.exe PID 2976 wrote to memory of 1544 2976 explorer.exe Explorer.exe PID 2976 wrote to memory of 1544 2976 explorer.exe Explorer.exe PID 2976 wrote to memory of 1544 2976 explorer.exe Explorer.exe PID 2976 wrote to memory of 1544 2976 explorer.exe Explorer.exe PID 2488 wrote to memory of 2536 2488 svchost.exe schtasks.exe PID 2488 wrote to memory of 2536 2488 svchost.exe schtasks.exe PID 2488 wrote to memory of 2536 2488 svchost.exe schtasks.exe PID 2488 wrote to memory of 2536 2488 svchost.exe schtasks.exe PID 2488 wrote to memory of 864 2488 svchost.exe schtasks.exe PID 2488 wrote to memory of 864 2488 svchost.exe schtasks.exe PID 2488 wrote to memory of 864 2488 svchost.exe schtasks.exe PID 2488 wrote to memory of 864 2488 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe"C:\Users\Admin\AppData\Local\Temp\f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2392
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
PID:1184
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe7⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1352
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 06:12 /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 06:13 /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:864
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe6⤵PID:1544
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2820
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD587e6c698376f457fbceef44ed48c5380
SHA17293e881ca722da9e024f1053280514e56c86a37
SHA256f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52
SHA5121980a37a795b93a2e10f86f990ea2b4ab583642903ef31b4c8c034d1f3b95a22492cf47beee3234a5e2c29438de76522c247455903a0718dbf16121d5cf035ee
-
Filesize
21KB
MD5f9b833379be88e07443d151f58d6bd94
SHA11117b4c054cd54d6e267a5295015d7aa513c83a7
SHA2569bc8440083f4e6972dd4a79cdf3ad2e5cacdfc6a7df8405b949385df62805121
SHA5125e3e4758a4010ee385b36975ee39e1f462866db96ac2a9c8a61f895061a3970d8a6ef79e2ebefa862ae43c899a385838f99fe726cb3275041115c0a3c2e664f7
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\Users\Admin\AppData\Local\Temp\._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe
Filesize2.7MB
MD51255bd40100c5d7b449389360a788d7b
SHA1bdf4375dccb6399df92dfbfdd466584b8e4323c8
SHA2563d0c58bad97ae8f453317f19e713b611e13ed7f661f0b119431cd9f17854197c
SHA5123955a21fef26aa3c991bb2079638d8ceafb5bafd4904c6d20d26a3764ff19847ab60812d9241cc8b6e11e49ea8143c2e9c03b349aa99c852c5c55b72659bf474
-
Filesize
139KB
MD5c30802b4db31df6154dc0d7f4e243915
SHA1d309150998a6f27ea31c34ee061b3ce2dbb39c47
SHA256d3d17298181eec362876e9f05757d2f282dccac7a4074a8e3589158038a97302
SHA512aa6c589158e6d9b684515534df891638a0e32741cd701c46c47fd86040e885eba55804779ce60f5337ea4cd6f52f17c2c39251352678df5b88a74a01b24b0fce
-
Filesize
2.6MB
MD5b2158fae6f9d41923261fa11efd12ff8
SHA1bdacfdb4ec9238e580d68bf58a12845c226857c5
SHA25655d084b53ea484172a0577e4e31d793af4cd72a023d05d5c2c7f96a98d417991
SHA512ff54fd596bb571de9824cd2911c6e8a94b2f3b8ef8261226fe5a7d4d64db667620f72347ed2c36e193b800dae0e2c158c258324f82413a549896f4675856cfe2
-
Filesize
2.6MB
MD526c113e39ae04424e489d2d8dbd1fe5e
SHA13f8cb44f4405bac2f3fcdb24e2f48c2a5bc3c100
SHA256ee8bc585e30d385d8d2541629a7e9d11f9e23023bfeffcb3eafef8b8a57d5687
SHA5125f6599f10ccbfa99dfc77613bf5ac444f09b7073cf1fe2fa002bb4fd21aceda5e4782a9527dd86815fae79fe05c2ff68663e1822570497e47b452a0621e4b375
-
Filesize
2.6MB
MD5d441995607adc3b2db21babfc6d2bcf9
SHA1bc167458902b2c38d5ddf605262882b81011d7f7
SHA25627d8f77202474805850ac140c8fc116ca4df2e68ae6676c8c1b75141cdab81e9
SHA51268eda4d4a36b5ce0f9d7e8af9aa4801e3217807bbcc39e79ec4fe65e3cd665a5848759f1849f4d90ef1de2a04f294ce296803549ebce27448947329013bdce49
-
Filesize
2.6MB
MD59c3b03b83270fef3f70478f4b4d4f1b5
SHA1ff2492f321d6861fb5a0c31544af045236b9535b
SHA256d89c07315cc673629a691d85334d4a9456f63e672ccc8b7a00d44e237fc34b4a
SHA512d877d34d1912e0c6fc12423370a9f374f04b60bd8cf2ac4fbb70f5b7e33a9ff6319f09ab39dba68d91947aff5e7c70c06b8c462e9ec333c3ec3e97a144e77daf