Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 23:18
Behavioral task
behavioral1
Sample
b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe
Resource
win10v2004-20241007-en
General
-
Target
b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe
-
Size
1.9MB
-
MD5
ebb0ab45037d22cf27fad984742b524c
-
SHA1
57657b62190e2926d124a56351aa8a1bd957d4dc
-
SHA256
b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0
-
SHA512
de45c3c300bccd18bbf4f17ca4354a65041b861b551b388ba07aebee4659557190cf4d28953d7652ad32dcb0ee6cad4a969de2b2d7040f304dc19a86de1c3855
-
SSDEEP
24576:cnsJ39LyjbJkQFMhmC+6GD9vMRGJ/qofKc:cnsHyjtk2MYC5GDH1qdc
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Floxif family
-
Xred family
-
Detects Floxif payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0009000000016b17-24.dat floxif -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule behavioral1/files/0x0009000000016b17-24.dat acprotect -
Executes dropped EXE 3 IoCs
Processes:
._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exeSynaptics.exe._cache_Synaptics.exepid Process 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 2412 Synaptics.exe 1140 ._cache_Synaptics.exe -
Loads dropped DLL 13 IoCs
Processes:
b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exeSynaptics.exe._cache_Synaptics.exearp.exeEXCEL.EXEpid Process 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 2412 Synaptics.exe 2412 Synaptics.exe 2412 Synaptics.exe 1140 ._cache_Synaptics.exe 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 1144 arp.exe 2268 EXCEL.EXE 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe._cache_Synaptics.exeb9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Program Files\\system.caca" ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Program Files\\system.caca" ._cache_Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe -
Enumerates connected drives 3 TTPs 12 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe._cache_Synaptics.exedescription ioc Process File opened (read-only) \??\h: ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File opened (read-only) \??\i: ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File opened (read-only) \??\e: ._cache_Synaptics.exe File opened (read-only) \??\k: ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File opened (read-only) \??\h: ._cache_Synaptics.exe File opened (read-only) \??\k: ._cache_Synaptics.exe File opened (read-only) \??\e: ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File opened (read-only) \??\g: ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File opened (read-only) \??\j: ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File opened (read-only) \??\g: ._cache_Synaptics.exe File opened (read-only) \??\i: ._cache_Synaptics.exe File opened (read-only) \??\j: ._cache_Synaptics.exe -
Processes:
arp.exearp.exearp.exearp.exearp.exearp.exearp.exearp.exearp.exepid Process 3008 arp.exe 376 arp.exe 2784 arp.exe 2724 arp.exe 2808 arp.exe 2684 arp.exe 2160 arp.exe 2736 arp.exe 3012 arp.exe -
Processes:
resource yara_rule behavioral1/files/0x00080000000120ff-4.dat upx behavioral1/memory/1236-11-0x0000000004120000-0x000000000413B000-memory.dmp upx behavioral1/memory/2020-26-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/files/0x0009000000016b17-24.dat upx behavioral1/memory/1140-53-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2020-55-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2020-57-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1140-63-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/1144-64-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2020-67-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1140-69-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2268-77-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2020-124-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/1140-127-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2268-129-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2020-131-0x0000000010000000-0x0000000010033000-memory.dmp upx behavioral1/memory/2020-197-0x0000000010000000-0x0000000010033000-memory.dmp upx -
Drops file in Program Files directory 9 IoCs
Processes:
._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe._cache_Synaptics.exedescription ioc Process File created C:\Program Files\system.caca ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File created C:\Program Files\system.caca ._cache_Synaptics.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\gfx.dll ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File created \??\c:\program files\common files\system\symsrv.dll.000 ._cache_Synaptics.exe File created C:\Program Files (x86)\Microsoft Office\Office14\gfx.dll.tmp ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\gfx.dll.dat ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File created C:\Program Files\Common Files\System\symsrv.dll ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File created \??\c:\program files\common files\system\symsrv.dll.000 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe File opened for modification \??\c:\program files\common files\system\symsrv.dll.000 ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exearp.exearp.exe._cache_Synaptics.exeSynaptics.exearp.exearp.exearp.exe._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exearp.exearp.exeEXCEL.EXEarp.exearp.exearp.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arp.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Modifies registry class 11 IoCs
Processes:
._cache_Synaptics.exe._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cacafile\shell\open\command ._cache_Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cacafile\shell\open\command\ = "C:\\Program Files\\Internet Explorer\\WINLOGON.exe" ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.caca ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.caca\ = "cacafile" ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cacafile\shell\open\command ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cacafile\shell ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cacafile\shell\open ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.caca ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cacafile ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cacafile\shell\open\command\ = "C:\\Program Files\\Internet Explorer\\WINLOGON.exe" ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.caca\ = "cacafile" ._cache_Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 2268 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exepid Process 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid Process 476 476 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe._cache_Synaptics.exearp.exeEXCEL.EXEdescription pid Process Token: SeDebugPrivilege 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe Token: SeDebugPrivilege 1140 ._cache_Synaptics.exe Token: SeDebugPrivilege 1144 arp.exe Token: SeDebugPrivilege 2268 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid Process 2268 EXCEL.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exeSynaptics.exedescription pid Process procid_target PID 1236 wrote to memory of 2020 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 30 PID 1236 wrote to memory of 2020 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 30 PID 1236 wrote to memory of 2020 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 30 PID 1236 wrote to memory of 2020 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 30 PID 2020 wrote to memory of 2160 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 31 PID 2020 wrote to memory of 2160 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 31 PID 2020 wrote to memory of 2160 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 31 PID 2020 wrote to memory of 2160 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 31 PID 1236 wrote to memory of 2412 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 34 PID 1236 wrote to memory of 2412 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 34 PID 1236 wrote to memory of 2412 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 34 PID 1236 wrote to memory of 2412 1236 b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 34 PID 2020 wrote to memory of 376 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 33 PID 2020 wrote to memory of 376 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 33 PID 2020 wrote to memory of 376 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 33 PID 2020 wrote to memory of 376 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 33 PID 2020 wrote to memory of 2684 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 35 PID 2020 wrote to memory of 2684 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 35 PID 2020 wrote to memory of 2684 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 35 PID 2020 wrote to memory of 2684 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 35 PID 2020 wrote to memory of 3008 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 36 PID 2020 wrote to memory of 3008 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 36 PID 2020 wrote to memory of 3008 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 36 PID 2020 wrote to memory of 3008 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 36 PID 2020 wrote to memory of 2724 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 37 PID 2020 wrote to memory of 2724 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 37 PID 2020 wrote to memory of 2724 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 37 PID 2020 wrote to memory of 2724 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 37 PID 2020 wrote to memory of 2784 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 39 PID 2020 wrote to memory of 2784 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 39 PID 2020 wrote to memory of 2784 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 39 PID 2020 wrote to memory of 2784 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 39 PID 2020 wrote to memory of 2808 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 40 PID 2020 wrote to memory of 2808 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 40 PID 2020 wrote to memory of 2808 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 40 PID 2020 wrote to memory of 2808 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 40 PID 2020 wrote to memory of 3012 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 41 PID 2020 wrote to memory of 3012 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 41 PID 2020 wrote to memory of 3012 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 41 PID 2020 wrote to memory of 3012 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 41 PID 2020 wrote to memory of 2736 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 42 PID 2020 wrote to memory of 2736 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 42 PID 2020 wrote to memory of 2736 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 42 PID 2020 wrote to memory of 2736 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 42 PID 2412 wrote to memory of 1140 2412 Synaptics.exe 50 PID 2412 wrote to memory of 1140 2412 Synaptics.exe 50 PID 2412 wrote to memory of 1140 2412 Synaptics.exe 50 PID 2412 wrote to memory of 1140 2412 Synaptics.exe 50 PID 2020 wrote to memory of 1144 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 52 PID 2020 wrote to memory of 1144 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 52 PID 2020 wrote to memory of 1144 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 52 PID 2020 wrote to memory of 1144 2020 ._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe"C:\Users\Admin\AppData\Local\Temp\b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe"C:\Users\Admin\AppData\Local\Temp\._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\arp.exearp -a3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2160
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.0.1 13-98-56-2e-a0-3e3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:376
-
-
C:\Windows\SysWOW64\arp.exearp -s 10.127.255.255 bc-4f-a9-09-3a-903⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\arp.exearp -s 37.27.61.181 b3-76-70-52-45-8c3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.22 ba-79-31-4d-2f-c23⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.251 51-8a-9f-b7-2e-de3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\arp.exearp -s 224.0.0.252 d3-c2-bd-e1-61-173⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\arp.exearp -s 239.255.255.250 b9-e0-c5-e3-94-723⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\arp.exearp -s 255.255.255.255 d9-b5-db-39-e2-5b3⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\arp.exearp -d3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2268
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5ebb0ab45037d22cf27fad984742b524c
SHA157657b62190e2926d124a56351aa8a1bd957d4dc
SHA256b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0
SHA512de45c3c300bccd18bbf4f17ca4354a65041b861b551b388ba07aebee4659557190cf4d28953d7652ad32dcb0ee6cad4a969de2b2d7040f304dc19a86de1c3855
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD50031aad4ee238994c3c94adb5f9a39da
SHA1a0ea329135d7dabc26aa0b005d54b227a0c8d9c9
SHA256f724213d3229e00ff3cd9b92a1a64b077029d173de92421c3033b5263b1afc6b
SHA512b300cf4e2da5076e9f19e0648891cc283be44b48eefa1ea3997f11a4c7c41bd701151c76b7fcb6533c1d18707ee1a92d0528b778c350695b3d2aae8b8573b73d
-
Filesize
1.7MB
MD52447a4dd3da3cce886d33f51cd957374
SHA15f84f1940adf8c8c73891fb59133fcca03c01ab2
SHA256835445c5f3a133c24ec2e0fc07e894282b50153017fd53759afa89d1fd6d8231
SHA51209519cba52f502ad10823a5362562422719e33c829c4d9bd04b895aab4112ec23f4212aa597ce0cac45358a34fc271c3ac0387d6e93a35f9be5fb50cc18566f0
-
Filesize
71KB
MD54fcd7574537cebec8e75b4e646996643
SHA1efa59bb9050fb656b90d5d40c942fb2a304f2a8b
SHA2568ea3b17e4b783ffc0bc387b81b823bf87af0d57da74541d88ba85314bb232a5d
SHA5127f1a7ef64d332a735db82506b47d84853af870785066d29ccaf4fdeab114079a9f0db400e01ba574776a0d652a248658fe1e8f9659cdced19ad6eea09644ea3e
-
Filesize
2.0MB
MD5eeb293a5051bde86d2b977c1c2952047
SHA113098ec66c625a8e3f624ce71c11fe8ce3d63fb0
SHA256c50108c72e341aa2776c20dafe494cb5288d16ff3e90b07dbb821285b4daf358
SHA512e9c8750536246a0b4c13861133e079a3e2d216d4ef441768f6c877f00784ee6d7f7399e50ff3478d355477f092e9ab3cd85041432e4b063f33e8b795f5cfaed6
-
\Users\Admin\AppData\Local\Temp\._cache_b9172b102bc725011a574efea752f18d211fe99eef083ac93b8dc9334ffbd8b0.exe
Filesize1.2MB
MD56c06a994695fca714484f634106e0a30
SHA18c2c9a454ca15d3a310e44576ce72db109c12ba3
SHA2564269927cb66ec9c91b41b4c63c19c9d219b6b427a2797720f246ded873829054
SHA5128a34c358fe8d52668b5785583f2e9000dacff2f93d5446561479b9aaa2f20121578649c120ef0673cb91492a0599d2a5a99c549e4b2fffce66ed80d262bcea0c