Analysis
-
max time kernel
120s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 05:13
Behavioral task
behavioral1
Sample
7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe
Resource
win10v2004-20241007-en
General
-
Target
7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe
-
Size
2.9MB
-
MD5
7a1a9085e0f549ec511d7d2663099c70
-
SHA1
3b21d3dbc01758bd15fdaab3e3c51513436b6a46
-
SHA256
7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4
-
SHA512
3f0561bcc0583d5b8d68f0666f5de1676e8dbaa817720519a25fa014cc46715ed6c3f2928b976c0e6ab0558939945e6478292a0936f5695d344f4ca58dd6c245
-
SSDEEP
49152:RnsHyjtk2MYC5GDiYBnsHyjtk2MYC5GDTYdnsHyjtk2MYC5GD6Yx:Rnsmtk2a0Bnsmtk2andnsmtk2aox
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Xred family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 20 IoCs
pid Process 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2588 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4n.exe 2368 icsys.icn.exe 596 Synaptics.exe 372 explorer.exe 2096 spoolsv.exe 2976 ._cache_Synaptics.exe 1444 svchost.exe 2792 spoolsv.exe 2008 ._cache_synaptics.exe 308 icsys.icn.exe 1532 Synaptics.exe 1812 ._cache_Synaptics.exe 1392 ._cache_synaptics.exe 2388 icsys.icn.exe 1292 explorer.exe 2492 Synaptics.exe 996 ._cache_Synaptics.exe 2716 icsys.icn.exe 2476 explorer.exe -
Loads dropped DLL 43 IoCs
pid Process 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 372 explorer.exe 372 explorer.exe 596 Synaptics.exe 596 Synaptics.exe 596 Synaptics.exe 2096 spoolsv.exe 2096 spoolsv.exe 1444 svchost.exe 2976 ._cache_Synaptics.exe 2976 ._cache_Synaptics.exe 1444 svchost.exe 2976 ._cache_Synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 1532 Synaptics.exe 1532 Synaptics.exe 1532 Synaptics.exe 1532 Synaptics.exe 1812 ._cache_Synaptics.exe 1812 ._cache_Synaptics.exe 1392 ._cache_synaptics.exe 1812 ._cache_Synaptics.exe 1812 ._cache_Synaptics.exe 2388 icsys.icn.exe 1392 ._cache_synaptics.exe 1392 ._cache_synaptics.exe 2492 Synaptics.exe 2492 Synaptics.exe 2492 Synaptics.exe 2492 Synaptics.exe 996 ._cache_Synaptics.exe 996 ._cache_Synaptics.exe 2716 icsys.icn.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" ._cache_synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" ._cache_synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2748 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 icsys.icn.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 2008 ._cache_synaptics.exe 372 explorer.exe 1444 svchost.exe 372 explorer.exe 372 explorer.exe 1444 svchost.exe 1444 svchost.exe 372 explorer.exe 372 explorer.exe 1444 svchost.exe 372 explorer.exe 1444 svchost.exe 1444 svchost.exe 372 explorer.exe 372 explorer.exe 1444 svchost.exe 372 explorer.exe 1444 svchost.exe 372 explorer.exe 1444 svchost.exe 372 explorer.exe 1444 svchost.exe 372 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 372 explorer.exe 1444 svchost.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 2008 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 1392 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 1392 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 1392 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 1392 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 1392 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 1392 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 1392 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 1392 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 1392 ._cache_synaptics.exe Token: SeSystemProfilePrivilege 1392 ._cache_synaptics.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 2368 icsys.icn.exe 2368 icsys.icn.exe 372 explorer.exe 372 explorer.exe 2976 ._cache_Synaptics.exe 2976 ._cache_Synaptics.exe 2096 spoolsv.exe 2096 spoolsv.exe 1444 svchost.exe 1444 svchost.exe 308 icsys.icn.exe 308 icsys.icn.exe 2792 spoolsv.exe 2792 spoolsv.exe 372 explorer.exe 372 explorer.exe 1812 ._cache_Synaptics.exe 1812 ._cache_Synaptics.exe 2388 icsys.icn.exe 2388 icsys.icn.exe 1292 explorer.exe 1292 explorer.exe 996 ._cache_Synaptics.exe 996 ._cache_Synaptics.exe 2716 icsys.icn.exe 2716 icsys.icn.exe 2476 explorer.exe 2476 explorer.exe 2748 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2704 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 30 PID 2888 wrote to memory of 2704 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 30 PID 2888 wrote to memory of 2704 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 30 PID 2888 wrote to memory of 2704 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 30 PID 2704 wrote to memory of 2588 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 31 PID 2704 wrote to memory of 2588 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 31 PID 2704 wrote to memory of 2588 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 31 PID 2704 wrote to memory of 2588 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 31 PID 2704 wrote to memory of 2368 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 32 PID 2704 wrote to memory of 2368 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 32 PID 2704 wrote to memory of 2368 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 32 PID 2704 wrote to memory of 2368 2704 ._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 32 PID 2888 wrote to memory of 596 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 33 PID 2888 wrote to memory of 596 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 33 PID 2888 wrote to memory of 596 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 33 PID 2888 wrote to memory of 596 2888 7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe 33 PID 2368 wrote to memory of 372 2368 icsys.icn.exe 34 PID 2368 wrote to memory of 372 2368 icsys.icn.exe 34 PID 2368 wrote to memory of 372 2368 icsys.icn.exe 34 PID 2368 wrote to memory of 372 2368 icsys.icn.exe 34 PID 372 wrote to memory of 2096 372 explorer.exe 35 PID 372 wrote to memory of 2096 372 explorer.exe 35 PID 372 wrote to memory of 2096 372 explorer.exe 35 PID 372 wrote to memory of 2096 372 explorer.exe 35 PID 596 wrote to memory of 2976 596 Synaptics.exe 36 PID 596 wrote to memory of 2976 596 Synaptics.exe 36 PID 596 wrote to memory of 2976 596 Synaptics.exe 36 PID 596 wrote to memory of 2976 596 Synaptics.exe 36 PID 2096 wrote to memory of 1444 2096 spoolsv.exe 37 PID 2096 wrote to memory of 1444 2096 spoolsv.exe 37 PID 2096 wrote to memory of 1444 2096 spoolsv.exe 37 PID 2096 wrote to memory of 1444 2096 spoolsv.exe 37 PID 2976 wrote to memory of 2008 2976 ._cache_Synaptics.exe 39 PID 2976 wrote to memory of 2008 2976 ._cache_Synaptics.exe 39 PID 2976 wrote to memory of 2008 2976 ._cache_Synaptics.exe 39 PID 2976 wrote to memory of 2008 2976 ._cache_Synaptics.exe 39 PID 1444 wrote to memory of 2792 1444 svchost.exe 38 PID 1444 wrote to memory of 2792 1444 svchost.exe 38 PID 1444 wrote to memory of 2792 1444 svchost.exe 38 PID 1444 wrote to memory of 2792 1444 svchost.exe 38 PID 2976 wrote to memory of 308 2976 ._cache_Synaptics.exe 40 PID 2976 wrote to memory of 308 2976 ._cache_Synaptics.exe 40 PID 2976 wrote to memory of 308 2976 ._cache_Synaptics.exe 40 PID 2976 wrote to memory of 308 2976 ._cache_Synaptics.exe 40 PID 1444 wrote to memory of 1056 1444 svchost.exe 41 PID 1444 wrote to memory of 1056 1444 svchost.exe 41 PID 1444 wrote to memory of 1056 1444 svchost.exe 41 PID 1444 wrote to memory of 1056 1444 svchost.exe 41 PID 2008 wrote to memory of 1532 2008 ._cache_synaptics.exe 43 PID 2008 wrote to memory of 1532 2008 ._cache_synaptics.exe 43 PID 2008 wrote to memory of 1532 2008 ._cache_synaptics.exe 43 PID 2008 wrote to memory of 1532 2008 ._cache_synaptics.exe 43 PID 1532 wrote to memory of 1812 1532 Synaptics.exe 44 PID 1532 wrote to memory of 1812 1532 Synaptics.exe 44 PID 1532 wrote to memory of 1812 1532 Synaptics.exe 44 PID 1532 wrote to memory of 1812 1532 Synaptics.exe 44 PID 1812 wrote to memory of 1392 1812 ._cache_Synaptics.exe 45 PID 1812 wrote to memory of 1392 1812 ._cache_Synaptics.exe 45 PID 1812 wrote to memory of 1392 1812 ._cache_Synaptics.exe 45 PID 1812 wrote to memory of 1392 1812 ._cache_Synaptics.exe 45 PID 1812 wrote to memory of 2388 1812 ._cache_Synaptics.exe 46 PID 1812 wrote to memory of 2388 1812 ._cache_Synaptics.exe 46 PID 1812 wrote to memory of 2388 1812 ._cache_Synaptics.exe 46 PID 1812 wrote to memory of 2388 1812 ._cache_Synaptics.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe"C:\Users\Admin\AppData\Local\Temp\7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe"C:\Users\Admin\AppData\Local\Temp\._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\users\admin\appdata\local\temp\._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4n.exec:\users\admin\appdata\local\temp\._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4n.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:372 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
C:\Windows\SysWOW64\at.exeat 05:15 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵
- System Location Discovery: System Language Discovery
PID:1056
-
-
C:\Windows\SysWOW64\at.exeat 05:16 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe7⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
\??\c:\users\admin\appdata\local\temp\._cache_synaptics.exec:\users\admin\appdata\local\temp\._cache_synaptics.exe InjUpdate7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1392 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:996 -
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2716 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2476
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2388 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:308
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2748
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD57a1a9085e0f549ec511d7d2663099c70
SHA13b21d3dbc01758bd15fdaab3e3c51513436b6a46
SHA2567b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4
SHA5123f0561bcc0583d5b8d68f0666f5de1676e8dbaa817720519a25fa014cc46715ed6c3f2928b976c0e6ab0558939945e6478292a0936f5695d344f4ca58dd6c245
-
Filesize
1.2MB
MD53bec3aeb9f99dbf9c2b6bb89b4add39a
SHA1f401abce66e942f966607d67a432a628622d6516
SHA256eb717518e0e2a90a3e061792ee5b380ee6634fb982c62682e9c6170af8ca46b8
SHA512cb278d7d83c84fe64bd3bde517d29e52df6fa2c94d063d48a2543c296e4e962763b883317844c08e47e8b9dbaf3505cc27782703608b98603e11d776eb7777b7
-
Filesize
206KB
MD520602f77608fd2bdebecb54d6ddad08f
SHA1bba0a2150a4fea15db48ea7d2398eb1344cf749f
SHA2560b0ac637272ff103bcf0e0e79df4ab4f36307f1d4386dd2c49f39031969dce62
SHA51282beb0f477c5c5eaa7dedd710ab883b377ce55c385aff0d40136ebc45db2e340664325cbffd52e5604fe0716f9cf91453b0e1b8e1ce0fa1f0291930e1f0e8a1b
-
Filesize
206KB
MD554e5e910e9c070e25b78ec5d8ce312f1
SHA127da17c205fcfb29c1ede93b9259d39fe1d58bc8
SHA256e72d7d6e28a668759f712d41c542339a0a387d951e028e1af1403a50569a55cb
SHA512d5042715ce91c971a30a7237132312dbb02ee281805ff82576249bd7a4d10ad5be42e33812aa4d89a059c176bfb1eccfcf15cb22453fdc41ecf877e9050058ce
-
Filesize
206KB
MD59ca2d8133525d19c32ef5d962393bfbe
SHA115e3a7210bd103b8e24fe02b4da04227c4cb4eb4
SHA256000ac8d96f969c67762046b2fc858e9dc7d00354fd3cb5a57b20382b45c5cf5d
SHA512f674f4b1d4b538bd5be4d66d5f758a963ba30ee276201719f2c19f0e2d85756ba2b1245c3dac3003e909a86f438290fa4389ba489fd3e673def8f95b60479f26
-
Filesize
207KB
MD54b80edefec197f9678a6dbcedc2c3967
SHA12eccd8e33b91c13959a785bd1a563eb68e6e58a6
SHA256b4fdde404d2d665069fadf92e9fc7f308aa186c33ca923e3af9fac6c503a59b5
SHA512e1824233eba34f8b02a181f7bf6e4f8f19a4871fac86ef587ba3dccc37172e86bd356b9be20c52d5e1522b930d8fdadf39e3d736e752ddf0e919088e86937072
-
\Users\Admin\AppData\Local\Temp\._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4N.exe
Filesize2.1MB
MD5e3faeb35f56273ecce987a94379d3683
SHA17cb189451c6c4af1efee17453f90c1a6aae2fabb
SHA2564f5f4b955e6659bcf44c5abab6d692f1adf2f9677751035bf422106af8442180
SHA5127d316bad87a9f895311628a3abf7eebd77dd5774f8935044bd317e50961d2dc60983299acb7aff13f4285b141ab352991ba8ebba64fb9d28f60726a3f6e244cf
-
\Users\Admin\AppData\Local\Temp\._cache_7b3d84cf9e2bb957cdf2bde4a694890dfa3b0ee28df8771f21da8fea5323eea4n.exe
Filesize1.9MB
MD568dbfb2c9a0951dac513985e40e89d3a
SHA18083d2cea9e0bf96160b051f19860d2f6e06d65a
SHA25694ca6644e8842c073b9b19ab260214cf9c89bbb4ff65e332d2104ec67b316093
SHA512f7fd4efca17edc8771909b279554e57ed2451db8c41591e8c1dbef2583f24a5e90f9c43a1f16fe874e157b5604ce820cf8f88ee07e8a5ab2010245f18545bebc
-
Filesize
206KB
MD56b8cf6f15399e7a3aa7ed379332c38cf
SHA16091ad876909c7a9ecc3beb123a8b763742c43d6
SHA25649876f4990a593adada35d8fab2887ac5516a781c666feaa12cb2c1f84dbe918
SHA512b9edde13e3ea8cc7e46547648886e6e0cf2a0f08645bd05930cd669d7562e5aea94316a7427e51371bfdbb824f7e37090e02d614d6302246a58a651c413ce1be