Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 03:44
Behavioral task
behavioral1
Sample
Razer Synapse 3 Host/RazerSynapseInstaller_V1.19.0.635.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Razer Synapse 3 Host/RazerSynapseInstaller_V1.19.0.635.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Razer Synapse 3 Host/clean.py
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Razer Synapse 3 Host/clean.py
Resource
win10v2004-20241007-en
General
-
Target
Razer Synapse 3 Host/clean.py
-
Size
2KB
-
MD5
4e777936ca7fd8fa2bae957b084a33d9
-
SHA1
bda7bba90b9f769b1d2ca3648831f31983e4261e
-
SHA256
2a6f17f9f747afd690f8134ee06cbc120d952d09a8d855214fa84e1d80e43e0e
-
SHA512
3c1fadc4bc7d7944a933eccd0d507127572b1b6ce1f4cf0b945134c109fe100852e8b95f6fea7066d9c773125328461a33a6569bfd750d2ad5994e76d202b65d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2620 AcroRd32.exe 2620 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2796 2672 cmd.exe 31 PID 2672 wrote to memory of 2796 2672 cmd.exe 31 PID 2672 wrote to memory of 2796 2672 cmd.exe 31 PID 2796 wrote to memory of 2620 2796 rundll32.exe 32 PID 2796 wrote to memory of 2620 2796 rundll32.exe 32 PID 2796 wrote to memory of 2620 2796 rundll32.exe 32 PID 2796 wrote to memory of 2620 2796 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Razer Synapse 3 Host\clean.py"1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Razer Synapse 3 Host\clean.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Razer Synapse 3 Host\clean.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e41f4457fefa53234a2b710827aceb60
SHA15e92ba2d071c4cfc5b319c95ded72a59f670de17
SHA2568929fc5f0d82339e0abad0e857b3a7dba82b54c5c159f362dc3cc24344c84b6f
SHA51253bd7ee435113de1ea9b68d45b8e56c8128e051c70d3802003a55d3f40d14d0f07aeea9124600767b5c8c54f9cd05e6cb881ec88c758d88cc5917a84038dfa42