Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 20:22
Behavioral task
behavioral1
Sample
f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe
Resource
win10v2004-20241007-en
General
-
Target
f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe
-
Size
1.5MB
-
MD5
92fc1b64d702ebee25b1cabea2a81ae0
-
SHA1
1d3d5ec151eae49d8186d755db49c0d2b1df1a76
-
SHA256
f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730
-
SHA512
ac8ad02121c75db44ce5c67c4e7ec7cfdcb2fdcb5577c2675d8c7c63fca27c86626ee45e92c8ec58efedfb35bf9e863b76d482e45eb4dd1427b9a88c73e1981d
-
SSDEEP
24576:ansJ39LyjbJkQFMhmC+6GD9u5xolYQY6dp7gAVKzar5:ansHyjtk2MYC5GDjYmp7gAVK2
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Xred family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Executes dropped EXE 12 IoCs
pid Process 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 2276 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730n.exe 2840 Synaptics.exe 2984 icsys.icn.exe 2948 explorer.exe 2648 spoolsv.exe 1284 svchost.exe 1820 ._cache_Synaptics.exe 756 spoolsv.exe 1516 ._cache_synaptics.exe 2924 icsys.icn.exe 2932 explorer.exe -
Loads dropped DLL 23 IoCs
pid Process 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 2984 icsys.icn.exe 2984 icsys.icn.exe 2948 explorer.exe 2948 explorer.exe 2648 spoolsv.exe 2648 spoolsv.exe 2840 Synaptics.exe 2840 Synaptics.exe 2840 Synaptics.exe 1284 svchost.exe 1284 svchost.exe 1820 ._cache_Synaptics.exe 1820 ._cache_Synaptics.exe 1820 ._cache_Synaptics.exe 2924 icsys.icn.exe 2924 icsys.icn.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2372 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2984 icsys.icn.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 1284 svchost.exe 2948 explorer.exe 1284 svchost.exe 2948 explorer.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 1284 svchost.exe 2948 explorer.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe 1284 svchost.exe 2948 explorer.exe 2948 explorer.exe 1284 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1284 svchost.exe 2948 explorer.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 2984 icsys.icn.exe 2984 icsys.icn.exe 2948 explorer.exe 2948 explorer.exe 2648 spoolsv.exe 2648 spoolsv.exe 1284 svchost.exe 1284 svchost.exe 1820 ._cache_Synaptics.exe 756 spoolsv.exe 1820 ._cache_Synaptics.exe 756 spoolsv.exe 2948 explorer.exe 2948 explorer.exe 2924 icsys.icn.exe 2924 icsys.icn.exe 2372 EXCEL.EXE 2932 explorer.exe 2932 explorer.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1684 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 30 PID 2120 wrote to memory of 1684 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 30 PID 2120 wrote to memory of 1684 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 30 PID 2120 wrote to memory of 1684 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 30 PID 1684 wrote to memory of 2276 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 31 PID 1684 wrote to memory of 2276 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 31 PID 1684 wrote to memory of 2276 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 31 PID 1684 wrote to memory of 2276 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 31 PID 2120 wrote to memory of 2840 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 32 PID 2120 wrote to memory of 2840 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 32 PID 2120 wrote to memory of 2840 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 32 PID 2120 wrote to memory of 2840 2120 f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 32 PID 1684 wrote to memory of 2984 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 33 PID 1684 wrote to memory of 2984 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 33 PID 1684 wrote to memory of 2984 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 33 PID 1684 wrote to memory of 2984 1684 ._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe 33 PID 2984 wrote to memory of 2948 2984 icsys.icn.exe 34 PID 2984 wrote to memory of 2948 2984 icsys.icn.exe 34 PID 2984 wrote to memory of 2948 2984 icsys.icn.exe 34 PID 2984 wrote to memory of 2948 2984 icsys.icn.exe 34 PID 2948 wrote to memory of 2648 2948 explorer.exe 35 PID 2948 wrote to memory of 2648 2948 explorer.exe 35 PID 2948 wrote to memory of 2648 2948 explorer.exe 35 PID 2948 wrote to memory of 2648 2948 explorer.exe 35 PID 2648 wrote to memory of 1284 2648 spoolsv.exe 36 PID 2648 wrote to memory of 1284 2648 spoolsv.exe 36 PID 2648 wrote to memory of 1284 2648 spoolsv.exe 36 PID 2648 wrote to memory of 1284 2648 spoolsv.exe 36 PID 2840 wrote to memory of 1820 2840 Synaptics.exe 37 PID 2840 wrote to memory of 1820 2840 Synaptics.exe 37 PID 2840 wrote to memory of 1820 2840 Synaptics.exe 37 PID 2840 wrote to memory of 1820 2840 Synaptics.exe 37 PID 1284 wrote to memory of 756 1284 svchost.exe 38 PID 1284 wrote to memory of 756 1284 svchost.exe 38 PID 1284 wrote to memory of 756 1284 svchost.exe 38 PID 1284 wrote to memory of 756 1284 svchost.exe 38 PID 1820 wrote to memory of 1516 1820 ._cache_Synaptics.exe 40 PID 1820 wrote to memory of 1516 1820 ._cache_Synaptics.exe 40 PID 1820 wrote to memory of 1516 1820 ._cache_Synaptics.exe 40 PID 1820 wrote to memory of 1516 1820 ._cache_Synaptics.exe 40 PID 1820 wrote to memory of 2924 1820 ._cache_Synaptics.exe 41 PID 1820 wrote to memory of 2924 1820 ._cache_Synaptics.exe 41 PID 1820 wrote to memory of 2924 1820 ._cache_Synaptics.exe 41 PID 1820 wrote to memory of 2924 1820 ._cache_Synaptics.exe 41 PID 2924 wrote to memory of 2932 2924 icsys.icn.exe 42 PID 2924 wrote to memory of 2932 2924 icsys.icn.exe 42 PID 2924 wrote to memory of 2932 2924 icsys.icn.exe 42 PID 2924 wrote to memory of 2932 2924 icsys.icn.exe 42 PID 1284 wrote to memory of 1972 1284 svchost.exe 43 PID 1284 wrote to memory of 1972 1284 svchost.exe 43 PID 1284 wrote to memory of 1972 1284 svchost.exe 43 PID 1284 wrote to memory of 1972 1284 svchost.exe 43 PID 1284 wrote to memory of 1560 1284 svchost.exe 47 PID 1284 wrote to memory of 1560 1284 svchost.exe 47 PID 1284 wrote to memory of 1560 1284 svchost.exe 47 PID 1284 wrote to memory of 1560 1284 svchost.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe"C:\Users\Admin\AppData\Local\Temp\f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\users\admin\appdata\local\temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730n.exec:\users\admin\appdata\local\temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730n.exe3⤵
- Executes dropped EXE
PID:2276
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:756
-
-
C:\Windows\SysWOW64\at.exeat 20:24 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\SysWOW64\at.exeat 20:25 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
PID:1516
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2932
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD592fc1b64d702ebee25b1cabea2a81ae0
SHA11d3d5ec151eae49d8186d755db49c0d2b1df1a76
SHA256f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730
SHA512ac8ad02121c75db44ce5c67c4e7ec7cfdcb2fdcb5577c2675d8c7c63fca27c86626ee45e92c8ec58efedfb35bf9e863b76d482e45eb4dd1427b9a88c73e1981d
-
C:\Users\Admin\AppData\Local\Temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730n.exe
Filesize587KB
MD51799da063f7a1b0c93ea50bc000097f1
SHA1362877bf4f45e2552524fde912a2e6ced309a1a5
SHA2562e41ff11d78405149f88dd9a02347cb94eb044ce4ff4c5001c9e990f53d6e4ae
SHA512cc6878d14930d2419eea813877e7e197441295d00d22f400b8f4354c57157742048c2954469eeb68381c6377dcc3d326480c15e24beb8429e67ed73da636efae
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
206KB
MD5c7f25895435384843a1ac89bea6ac604
SHA13450edcb2b6f2f61851bcf9c7ee77257e8a6ddc7
SHA2566f777d397b138ebca5cfb9d2e638d7a99fbf5a6119246fdca8ec2d4802eacf15
SHA512d653ed0d2a58ff11e39dc3e22176a9341c233dff4dae135539ce077ac6a26d1c3335b74752461edbbb6f858ef9bdaef4a8cfa044246eeecc73d219e04469bcd2
-
Filesize
207KB
MD52a1ce10398410e156941fa35c088c19f
SHA179e0b444887ce4f0dde994c49808c9e03ed664ce
SHA256b9f7411ba0d3c7dc4817b0dbeafa59330a4cbd7e7fa5422c928bcaac5fe801a5
SHA5120ee024221d6e27cceb2b85aff1482b7ead2591abe01f6aebf0ee8882920d87ad09e0703a20c61ef3c54aff0db01f94b163176d658a36d9fdceab6869d44f6a5e
-
Filesize
206KB
MD5e5905bf52292e8d7d7c95b04c241330c
SHA1851ed3d6297199da45be559371436a15cecbe101
SHA256139f80e990971765973294409c3a22175f79c56f7f3f22111c18d390b69979f3
SHA512aa328bc4bffbbeb2b330d75cae9206c4c163392a94a2cfabbaa34db2aeafea20e616e068929af38f70b2d99ae2592322e1c0cbd1b63561105d7d6c5a6a64b5b9
-
Filesize
206KB
MD594a22a20e54326e679f066f6cc1eec91
SHA1b6e5d8981c87184ac850a15d4afe5a8b8b2c5051
SHA256af60ccc6ce8874499ae4032973bc8b90a36a27b7ede0ec435baabf3e1be92730
SHA512c8bab2c2fc8edce1a1ade0162ad86ad27ee2439e5edb29fe99f086cb52fee406f294a4d82fec3a716af891b6c8d3be3509c5705640c99bb286d6f7502b89d6ba
-
Filesize
206KB
MD534a4e56b76b7a84797188bdc281c99ac
SHA1a40b57f5ecaa1770f15be361a4f97468f054eaa5
SHA256210a6be7ccb3a097ff5e26d97c242bfec0e87927e9a539a65e5613b0a2723b87
SHA512ce505811c995b1b7f8e7451aad6768e0e2e552d6f7e7e577dafa2d4ed3c1543b60ea998e687d46f2ac2135d9b1aab9e41d2a5fd70c4b0976d2ee345a0864ece6
-
\Users\Admin\AppData\Local\Temp\._cache_f1c82a831b4dbcc5869fe60ea8879f073902d358f80b3525fa2682a895715730N.exe
Filesize794KB
MD5020e3a7e3dea3fa0efc7dfd92eec9b74
SHA141b784857d38376f5c56aed0fa8181e5810192ef
SHA2560ca516bbce57427d0819d15a1d02f46cbdbe0729d8d79d8321176e91e3444e57
SHA5122f68fef8d0bc9cea789a8963cf10dfe51ea6313c8cc2b862dde9c3b9da1fa55d787de28e8f076c56be7541f99624e80103c44b44dcfa0e81fb18f633bea68f53