Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 06:10
Behavioral task
behavioral1
Sample
f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe
Resource
win7-20241010-en
General
-
Target
f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe
-
Size
3.5MB
-
MD5
87e6c698376f457fbceef44ed48c5380
-
SHA1
7293e881ca722da9e024f1053280514e56c86a37
-
SHA256
f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52
-
SHA512
1980a37a795b93a2e10f86f990ea2b4ab583642903ef31b4c8c034d1f3b95a22492cf47beee3234a5e2c29438de76522c247455903a0718dbf16121d5cf035ee
-
SSDEEP
98304:Lnsmtk2aNXzhW148Pd+Tf1mpcOldJQ3/VY:zL6FK4s0TfLOdo/6
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Xred family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ icsys.icn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion icsys.icn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ._cache_Synaptics.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 9 IoCs
pid Process 4160 ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 2184 Synaptics.exe 3020 ._cache_Synaptics.exe 1900 ._cache_synaptics.exe 740 icsys.icn.exe 1980 explorer.exe 2736 spoolsv.exe 3824 svchost.exe 2584 spoolsv.exe -
resource yara_rule behavioral2/files/0x000c000000023b7e-5.dat themida behavioral2/memory/4160-71-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/3020-192-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0007000000023c75-210.dat themida behavioral2/memory/740-211-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0008000000023c7a-219.dat themida behavioral2/memory/1980-220-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0008000000023c7d-229.dat themida behavioral2/memory/2736-231-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/files/0x0008000000023c81-240.dat themida behavioral2/memory/3824-241-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/2584-246-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/740-271-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/2736-275-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/3020-274-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/2584-269-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/4160-295-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1980-306-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/3824-312-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/3824-311-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1980-357-0x0000000000400000-0x0000000000A16000-memory.dmp themida behavioral2/memory/1980-361-0x0000000000400000-0x0000000000A16000-memory.dmp themida -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.icn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spoolsv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4160 ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 3020 ._cache_Synaptics.exe 740 icsys.icn.exe 1980 explorer.exe 2736 spoolsv.exe 3824 svchost.exe 2584 spoolsv.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe ._cache_Synaptics.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 224 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe 740 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1980 explorer.exe 3824 svchost.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 3020 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 224 EXCEL.EXE 224 EXCEL.EXE 740 icsys.icn.exe 740 icsys.icn.exe 224 EXCEL.EXE 224 EXCEL.EXE 1980 explorer.exe 1980 explorer.exe 2736 spoolsv.exe 2736 spoolsv.exe 3824 svchost.exe 3824 svchost.exe 224 EXCEL.EXE 224 EXCEL.EXE 2584 spoolsv.exe 2584 spoolsv.exe 224 EXCEL.EXE 224 EXCEL.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4160 4708 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 82 PID 4708 wrote to memory of 4160 4708 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 82 PID 4708 wrote to memory of 4160 4708 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 82 PID 4708 wrote to memory of 2184 4708 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 83 PID 4708 wrote to memory of 2184 4708 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 83 PID 4708 wrote to memory of 2184 4708 f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe 83 PID 2184 wrote to memory of 3020 2184 Synaptics.exe 84 PID 2184 wrote to memory of 3020 2184 Synaptics.exe 84 PID 2184 wrote to memory of 3020 2184 Synaptics.exe 84 PID 3020 wrote to memory of 1900 3020 ._cache_Synaptics.exe 86 PID 3020 wrote to memory of 1900 3020 ._cache_Synaptics.exe 86 PID 3020 wrote to memory of 740 3020 ._cache_Synaptics.exe 87 PID 3020 wrote to memory of 740 3020 ._cache_Synaptics.exe 87 PID 3020 wrote to memory of 740 3020 ._cache_Synaptics.exe 87 PID 740 wrote to memory of 1980 740 icsys.icn.exe 89 PID 740 wrote to memory of 1980 740 icsys.icn.exe 89 PID 740 wrote to memory of 1980 740 icsys.icn.exe 89 PID 1980 wrote to memory of 2736 1980 explorer.exe 90 PID 1980 wrote to memory of 2736 1980 explorer.exe 90 PID 1980 wrote to memory of 2736 1980 explorer.exe 90 PID 2736 wrote to memory of 3824 2736 spoolsv.exe 91 PID 2736 wrote to memory of 3824 2736 spoolsv.exe 91 PID 2736 wrote to memory of 3824 2736 spoolsv.exe 91 PID 3824 wrote to memory of 2584 3824 svchost.exe 92 PID 3824 wrote to memory of 2584 3824 svchost.exe 92 PID 3824 wrote to memory of 2584 3824 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe"C:\Users\Admin\AppData\Local\Temp\f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4160
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
PID:1900
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:740 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe7⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2584
-
-
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:224
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD587e6c698376f457fbceef44ed48c5380
SHA17293e881ca722da9e024f1053280514e56c86a37
SHA256f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52
SHA5121980a37a795b93a2e10f86f990ea2b4ab583642903ef31b4c8c034d1f3b95a22492cf47beee3234a5e2c29438de76522c247455903a0718dbf16121d5cf035ee
-
C:\Users\Admin\AppData\Local\Temp\._cache_f7387b4786b8bea31862a530138090626a467b39a9c1e7e082d1a6fa7fa8ad52N.exe
Filesize2.7MB
MD51255bd40100c5d7b449389360a788d7b
SHA1bdf4375dccb6399df92dfbfdd466584b8e4323c8
SHA2563d0c58bad97ae8f453317f19e713b611e13ed7f661f0b119431cd9f17854197c
SHA5123955a21fef26aa3c991bb2079638d8ceafb5bafd4904c6d20d26a3764ff19847ab60812d9241cc8b6e11e49ea8143c2e9c03b349aa99c852c5c55b72659bf474
-
Filesize
21KB
MD5e4659b795f20c5a5e3ae7051d4c4b424
SHA1914304a5bd8e8fc7c1ff1f4b4f8b6461c7ae5dab
SHA2562e9fec212fac1164d1d39c3c924bfbf337c708e76b9aebea4f670a1d435fa13e
SHA512eb7a415fc6f96eb4195a8b64f35654e7715118497270d8a2786e3b3b95d5a860cad02ccb3182421888ebae0b9bd256a7c5dca02970ca4bbcf30ca5184db33f92
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
2.6MB
MD526c113e39ae04424e489d2d8dbd1fe5e
SHA13f8cb44f4405bac2f3fcdb24e2f48c2a5bc3c100
SHA256ee8bc585e30d385d8d2541629a7e9d11f9e23023bfeffcb3eafef8b8a57d5687
SHA5125f6599f10ccbfa99dfc77613bf5ac444f09b7073cf1fe2fa002bb4fd21aceda5e4782a9527dd86815fae79fe05c2ff68663e1822570497e47b452a0621e4b375
-
Filesize
2.6MB
MD558c81bba50a84dd543855d71cec52d49
SHA122e95a7706a7a31cd7b2c2922519f790bcde4078
SHA2565b422cf1d550ad5810cd34df7aa707f9102567efd401e8c2cbb8dff9f12d0c16
SHA5121c66aa7c1101a20c71cde2b696e52b2b6eacd69285710e32dfa5d4730fc2745aa1be9ca6c2ac48062ca22e817f415a8b9f4aa8bfc0915b344a052db3df21eccd
-
Filesize
139KB
MD5c30802b4db31df6154dc0d7f4e243915
SHA1d309150998a6f27ea31c34ee061b3ce2dbb39c47
SHA256d3d17298181eec362876e9f05757d2f282dccac7a4074a8e3589158038a97302
SHA512aa6c589158e6d9b684515534df891638a0e32741cd701c46c47fd86040e885eba55804779ce60f5337ea4cd6f52f17c2c39251352678df5b88a74a01b24b0fce
-
Filesize
2.6MB
MD55944d51c19794441b0c41f4b611d703c
SHA124011b6cffa26616d0b120a40fa975f3a50c7a55
SHA2568a748233e2c0fda3d1fa17c26dfc8214b1ff62e8b33a6cf392be937d23827bc6
SHA512981766c79fdde7c1c0358106ca21d74d1186173a6bfb672f9b5c30d3f8c7f8e5feb7db06b3873a57dc9604e463ec79aefbd8140ec577fcfdac8b07c538ee4c8d
-
Filesize
2.6MB
MD52d022f2ef10c3e3fc05eb1903691afbc
SHA1d7c2d2005bfa0b6bdc05ceefc1d195baab982e60
SHA2567cdeadfe4a14feb189cae74f4653dbc8db83866db291111065c42dd50a4e7399
SHA5126ba445d86d153aedd97fcb25b7e9b44ce1f09ca0e64ece4436726dc885dce1253857a84536c093959341381bd45a8cdf3ac9c40afcefb9101aebe2eb41df086a