Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 03:00
Behavioral task
behavioral1
Sample
8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe
Resource
win10v2004-20241007-en
General
-
Target
8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe
-
Size
794KB
-
MD5
87fec7ddf77186a30de03851878e056f
-
SHA1
87d60c1f5be6c44207374fda0f363d01584a8f58
-
SHA256
8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980
-
SHA512
30815f470ea6ba48a057e9d16529234a233a2d7dd455cb5849c7ad7afcabb2b62c8ea449606f7e135662e58132737060b1d4f9feffadbb45ebca079fdde6c29a
-
SSDEEP
12288:WMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Qln2M:WnsJ39LyjbJkQFMhmC+6GD9un9
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 26 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe -
Executes dropped EXE 27 IoCs
pid Process 3584 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 3380 Synaptics.exe 1436 ._cache_Synaptics.exe 1424 ._cache_Synaptics.exe 4860 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 748 ._cache_Synaptics.exe 4684 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 4012 ._cache_Synaptics.exe 3412 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 4064 ._cache_Synaptics.exe 2428 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 4480 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 1596 ._cache_Synaptics.exe 5072 ._cache_Synaptics.exe 3752 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 2228 ._cache_Synaptics.exe 5076 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 1944 ._cache_Synaptics.exe 3804 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 3912 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 2924 ._cache_Synaptics.exe 184 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 456 ._cache_Synaptics.exe 3888 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 3316 ._cache_Synaptics.exe 4764 ._cache_Synaptics.exe 4352 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe -
resource yara_rule behavioral2/files/0x000c000000023bbe-5.dat upx behavioral2/memory/3584-65-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3584-191-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1436-195-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3584-236-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1436-234-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1424-284-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4860-285-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1424-312-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4860-314-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4684-319-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/748-318-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4684-347-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/748-345-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3412-342-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4012-350-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3412-352-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4012-374-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3412-376-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4064-379-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/2428-382-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/2428-404-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4064-409-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4480-411-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1596-414-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/5072-448-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/4480-450-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1596-447-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/5072-462-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3752-464-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/5072-488-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3752-486-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/2228-492-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/5076-493-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/2228-517-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/5076-519-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3804-524-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1944-523-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/1944-551-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3804-550-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3912-555-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/2924-556-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3912-579-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/2924-582-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/184-584-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/456-586-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/184-605-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/456-607-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3888-609-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3316-612-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3888-632-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral2/memory/3316-634-0x0000000000400000-0x0000000000417000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2904 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 EXCEL.EXE 2904 EXCEL.EXE 2904 EXCEL.EXE 2904 EXCEL.EXE 2904 EXCEL.EXE 2904 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3728 wrote to memory of 3584 3728 8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 83 PID 3728 wrote to memory of 3584 3728 8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 83 PID 3728 wrote to memory of 3584 3728 8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 83 PID 3728 wrote to memory of 3380 3728 8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 84 PID 3728 wrote to memory of 3380 3728 8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 84 PID 3728 wrote to memory of 3380 3728 8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 84 PID 3380 wrote to memory of 1436 3380 Synaptics.exe 85 PID 3380 wrote to memory of 1436 3380 Synaptics.exe 85 PID 3380 wrote to memory of 1436 3380 Synaptics.exe 85 PID 3584 wrote to memory of 4860 3584 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 98 PID 3584 wrote to memory of 4860 3584 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 98 PID 3584 wrote to memory of 4860 3584 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 98 PID 1436 wrote to memory of 1424 1436 ._cache_Synaptics.exe 99 PID 1436 wrote to memory of 1424 1436 ._cache_Synaptics.exe 99 PID 1436 wrote to memory of 1424 1436 ._cache_Synaptics.exe 99 PID 1424 wrote to memory of 748 1424 ._cache_Synaptics.exe 110 PID 1424 wrote to memory of 748 1424 ._cache_Synaptics.exe 110 PID 1424 wrote to memory of 748 1424 ._cache_Synaptics.exe 110 PID 4860 wrote to memory of 4684 4860 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 111 PID 4860 wrote to memory of 4684 4860 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 111 PID 4860 wrote to memory of 4684 4860 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 111 PID 748 wrote to memory of 4012 748 ._cache_Synaptics.exe 115 PID 748 wrote to memory of 4012 748 ._cache_Synaptics.exe 115 PID 748 wrote to memory of 4012 748 ._cache_Synaptics.exe 115 PID 4684 wrote to memory of 3412 4684 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 116 PID 4684 wrote to memory of 3412 4684 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 116 PID 4684 wrote to memory of 3412 4684 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 116 PID 4012 wrote to memory of 4064 4012 ._cache_Synaptics.exe 117 PID 4012 wrote to memory of 4064 4012 ._cache_Synaptics.exe 117 PID 4012 wrote to memory of 4064 4012 ._cache_Synaptics.exe 117 PID 3412 wrote to memory of 2428 3412 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 118 PID 3412 wrote to memory of 2428 3412 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 118 PID 3412 wrote to memory of 2428 3412 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 118 PID 2428 wrote to memory of 4480 2428 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 119 PID 2428 wrote to memory of 4480 2428 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 119 PID 2428 wrote to memory of 4480 2428 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 119 PID 4064 wrote to memory of 1596 4064 ._cache_Synaptics.exe 120 PID 4064 wrote to memory of 1596 4064 ._cache_Synaptics.exe 120 PID 4064 wrote to memory of 1596 4064 ._cache_Synaptics.exe 120 PID 1596 wrote to memory of 5072 1596 ._cache_Synaptics.exe 121 PID 1596 wrote to memory of 5072 1596 ._cache_Synaptics.exe 121 PID 1596 wrote to memory of 5072 1596 ._cache_Synaptics.exe 121 PID 4480 wrote to memory of 3752 4480 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 122 PID 4480 wrote to memory of 3752 4480 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 122 PID 4480 wrote to memory of 3752 4480 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 122 PID 5072 wrote to memory of 2228 5072 ._cache_Synaptics.exe 123 PID 5072 wrote to memory of 2228 5072 ._cache_Synaptics.exe 123 PID 5072 wrote to memory of 2228 5072 ._cache_Synaptics.exe 123 PID 3752 wrote to memory of 5076 3752 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 124 PID 3752 wrote to memory of 5076 3752 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 124 PID 3752 wrote to memory of 5076 3752 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 124 PID 2228 wrote to memory of 1944 2228 ._cache_Synaptics.exe 125 PID 2228 wrote to memory of 1944 2228 ._cache_Synaptics.exe 125 PID 2228 wrote to memory of 1944 2228 ._cache_Synaptics.exe 125 PID 5076 wrote to memory of 3804 5076 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 126 PID 5076 wrote to memory of 3804 5076 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 126 PID 5076 wrote to memory of 3804 5076 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 126 PID 3804 wrote to memory of 3912 3804 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 127 PID 3804 wrote to memory of 3912 3804 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 127 PID 3804 wrote to memory of 3912 3804 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 127 PID 1944 wrote to memory of 2924 1944 ._cache_Synaptics.exe 128 PID 1944 wrote to memory of 2924 1944 ._cache_Synaptics.exe 128 PID 1944 wrote to memory of 2924 1944 ._cache_Synaptics.exe 128 PID 3912 wrote to memory of 184 3912 ._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:184 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe"14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4352
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:456 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
794KB
MD587fec7ddf77186a30de03851878e056f
SHA187d60c1f5be6c44207374fda0f363d01584a8f58
SHA2568b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980
SHA51230815f470ea6ba48a057e9d16529234a233a2d7dd455cb5849c7ad7afcabb2b62c8ea449606f7e135662e58132737060b1d4f9feffadbb45ebca079fdde6c29a
-
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.cfg
Filesize349B
MD5e075ebba74c587c898af6245f3ec31fe
SHA1b4288c1964d023522e288cc6c2f4826eb4a90e51
SHA256a6d74e4fe64b38da2d9a9cfccaba79da3db2b6e49d0b19b65cc52458883c6919
SHA5121dbc26e568706e43bd42280d2600ec8ad5c590eefa3570a58f5a4b76607b5bb9333ea868c0d62965c3317034bd804fc01dd77e47ce72fd0589d2c6743dbf96f7
-
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.cfg
Filesize349B
MD5e3d1e3087fe72aed13e88c24342f15b4
SHA17f0a2b46a726db414555758e0603a5e7a0e3f33a
SHA256037bd3d79ef9f1a43c42ed437c8b029025118d5e7b26a80c1e78a7e9afbd5d9c
SHA512d75cccc129bac978508573555f1218b5727731a3f3b00ce81cee2a2986083788e5d421337f4bc75900920a54198602b5d30efecbe2449c72dfaf115a598a7086
-
C:\Users\Admin\AppData\Local\Temp\._cache_8b480d332e58e3f53d16189e9dcbbeaa044a8157aa124a34ed516c4e2e66f980.exe
Filesize40KB
MD51dccc7cb738029a6f264f07b748b36a4
SHA14c42ce1f07447dd95c28e8a7b4965c66a9d3ae69
SHA2562361dd3272c2ca4046b3733cf464fc2b285a5b9d68b03ec8d43d874f4ce8276a
SHA5129679405c74401fcb062de6669dc72bbe892b7ba1555cab76397c0c30d0cccc2d0d03250a111d84ba4b4a57b76e5cecf266d6e4182cf166768ae531b9bbcdfa14
-
Filesize
27KB
MD5a7cf9001acb8fceb0cb832b959c06fa9
SHA17f6909a35e8accf09e7f36ec6a011e23e381c313
SHA2569043a6f34f1bb9b8648c561a86a41aec7b45906fd407f818387d18970d81aff9
SHA512ebd510bcfba3ec9e43ccfe9527979959281ab305b0f40132794dc860244772903c523ae067fa52e86cc1a6933c7456592cd1d48390e889ce1f060efaca93f8f0
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04