Overview
overview
10Static
static
10Razer Syna...st.rar
windows7-x64
7Razer Syna...st.rar
windows10-2004-x64
8Razer Syna...35.exe
windows7-x64
7Razer Syna...35.exe
windows10-2004-x64
8��~��(v.pyc
windows7-x64
��~��(v.pyc
windows10-2004-x64
Razer Syna...ean.py
windows7-x64
3Razer Syna...ean.py
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 09:47
Behavioral task
behavioral1
Sample
Razer Synapse 3 Host.rar
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Razer Synapse 3 Host.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Razer Synapse 3 Host/RazerSynapseInstaller_V1.19.0.635.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Razer Synapse 3 Host/RazerSynapseInstaller_V1.19.0.635.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
��~��(v.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
��~��(v.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Razer Synapse 3 Host/clean.py
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Razer Synapse 3 Host/clean.py
Resource
win10v2004-20241007-en
General
-
Target
Razer Synapse 3 Host/clean.py
-
Size
2KB
-
MD5
4e777936ca7fd8fa2bae957b084a33d9
-
SHA1
bda7bba90b9f769b1d2ca3648831f31983e4261e
-
SHA256
2a6f17f9f747afd690f8134ee06cbc120d952d09a8d855214fa84e1d80e43e0e
-
SHA512
3c1fadc4bc7d7944a933eccd0d507127572b1b6ce1f4cf0b945134c109fe100852e8b95f6fea7066d9c773125328461a33a6569bfd750d2ad5994e76d202b65d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2928 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2928 AcroRd32.exe 2928 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 684 wrote to memory of 2088 684 cmd.exe 31 PID 684 wrote to memory of 2088 684 cmd.exe 31 PID 684 wrote to memory of 2088 684 cmd.exe 31 PID 2088 wrote to memory of 2928 2088 rundll32.exe 33 PID 2088 wrote to memory of 2928 2088 rundll32.exe 33 PID 2088 wrote to memory of 2928 2088 rundll32.exe 33 PID 2088 wrote to memory of 2928 2088 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Razer Synapse 3 Host\clean.py"1⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Razer Synapse 3 Host\clean.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Razer Synapse 3 Host\clean.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5093cde255527c951310ca9d68faf1546
SHA1e192e74c3adaa5af6fb7cbba9f838c1634dca91a
SHA25694fef6a00ca57b09bc389c8e9792944189b7f2be6a4b126f49fd393c04489d2c
SHA512545ca6dc18f2b3b11a64585a178481aaa62c5a9d8f060c372dacbd2dfe0db2f4cdbcf25adf3d386931a72838699601b658b39bf2b17fe976c64e4f4070c66b1b