Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 10:29
Behavioral task
behavioral1
Sample
sinthetic.cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sinthetic.cc.exe
Resource
win10v2004-20241007-en
General
-
Target
sinthetic.cc.exe
-
Size
9.8MB
-
MD5
8f755ce390c155b31dbe5e995b391c8b
-
SHA1
72710435b811d5c98dc4cd47409c97bd1f9fc9ed
-
SHA256
80654a91c5b99c1da02c9443d4bdffa363bfd6e5e76df1980e721734a7ae12bb
-
SHA512
7d9f4f30890505fc63f28a9024f0a4277b39cbee703f9006b6ea171b79c9362e7a3de00b8df084ef1d6fa59793333dffcf8a5f641f4e57b2f768af672f1edce5
-
SSDEEP
196608:yAJekY+CZ6d+KwfI9jUCzi4H1qSiXLGVi7DMgpZYHQ0VMwICEc/jW:E3ZtIHziK1piXLGVE4U2w0VJC
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2800 sinthetic.cc.exe 2800 sinthetic.cc.exe 2800 sinthetic.cc.exe 2800 sinthetic.cc.exe 2800 sinthetic.cc.exe 2800 sinthetic.cc.exe 2800 sinthetic.cc.exe -
resource yara_rule behavioral1/files/0x000500000001a0ab-74.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2800 3060 sinthetic.cc.exe 31 PID 3060 wrote to memory of 2800 3060 sinthetic.cc.exe 31 PID 3060 wrote to memory of 2800 3060 sinthetic.cc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\sinthetic.cc.exe"C:\Users\Admin\AppData\Local\Temp\sinthetic.cc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\sinthetic.cc.exe"C:\Users\Admin\AppData\Local\Temp\sinthetic.cc.exe"2⤵
- Loads dropped DLL
PID:2800
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5a6776c201baae1dd6f88048d7747d14c
SHA1646119d2e440e6dad0ffb0fe449ab4fc27f09fbe
SHA256ee99af71c347ff53c4e15109cb597759e657a3e859d9530680eeea8bb0540112
SHA512a9137af8529fd96dbba22c5179a16d112ec0bfab9792babe0a9f1cca27408eff73ba89f498cb5f941a5aa44555529ee10484e6ca4a3fbf1627523acfde622b45
-
Filesize
1.8MB
MD56ef5d2f77064df6f2f47af7ee4d44f0f
SHA10003946454b107874aa31839d41edcda1c77b0af
SHA256ab7c640f044d2eb7f4f0a4dfe5e719dfd9e5fcd769943233f5cece436870e367
SHA5121662cc02635d63b8114b41d11ec30a2af4b0b60209196aac937c2a608588fee47c6e93163ea6bf958246c32759ac5c82a712ea3d690e796e2070ac0ff9104266
-
Filesize
1.1MB
MD53b337c2d41069b0a1e43e30f891c3813
SHA1ebee2827b5cb153cbbb51c9718da1549fa80fc5c
SHA256c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7
SHA512fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499
-
Filesize
21KB
MD54a060eec454c222a5381cd359dc00b81
SHA121e1bc115d04a74779e955ea16a16bd71454d9bb
SHA256e6b2b05e14a6c6f5381e8f4c7f4fd28a499246fb4c8eafe1f08014b9273d70df
SHA51216fb1f4ccdad05d07feb62e0cd078401f4023f9fab0fb15e52b927ca413e65eb32c2932ba59dbfa7f7ee0e8a8053748e27f2757e82e600db812271aa44a9433c
-
Filesize
20KB
MD550abf0a7ee67f00f247bada185a7661c
SHA10cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1
SHA256f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7
SHA512c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528
-
Filesize
21KB
MD54c26932f8f1f490017add31f5ec0a533
SHA10da01a7c89b506fe3fd939344bb51b976efb3207
SHA256dd3843c2e46b4e926c36150d614efe02ca0ebc1f767f64f471568adc35c2ef23
SHA512eb2b87d187991fdc8e3a6577f20622d2d4a2a994dd375d8c27e1434ce786596533eacfbde8714db9959d88d6bcb91fdc8079c60c23f0eb920ba45c546a44e523
-
Filesize
21KB
MD510d466341e7ece8cf75b5d026105741b
SHA131d1e9b9a4511156695b5aa33d65b6a36f8139c2
SHA2565ce391edb33c7055e724a4c3cecc64d16ba2aa4724cb99cd5aed00b0cecfbc82
SHA5128778fd10c7360bd87db048a2b2ca6603455fd8cb4d0e18709f106b55db7cc92e7d6dc45385ff9def445b368376462e7d253442728d5e759faa97299b67a59e21