Analysis
-
max time kernel
118s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 21:34
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe
-
Size
3.6MB
-
MD5
a9c2d5309c9857b744a916ccfebdf934
-
SHA1
1ee77cb17ce8e3ca56ca97a8b0fc744375a0750d
-
SHA256
b9e28fad46c8b07ca6c9e244e9979f2ce1a734869e4279fa84cad2a8654546bd
-
SHA512
dda48337ec029bc37eb42dc0861ac9786fa3c959d639f9b2671a138c9e3217bdd5f7237dec637418e8eb76a9c6db3176f982621afd0da60fee91f7961d3a1e23
-
SSDEEP
98304:eZNVWg4AxEfkzA8OU/jIEeQfoR/IuOFVjUu5:8Nsg4AMgA8FIF0wu
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 572 powershell.exe 1964 powershell.exe 2788 powershell.exe 3004 powershell.exe -
Executes dropped EXE 7 IoCs
pid Process 1540 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 532 Synaptics.exe 612 Synaptics.exe 1052 Synaptics.exe 1356 Synaptics.exe 1784 Synaptics.exe 1244 Synaptics.exe -
Loads dropped DLL 2 IoCs
pid Process 2828 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2828 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2392 set thread context of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2968 schtasks.exe 1624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 3004 powershell.exe 2788 powershell.exe 1540 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 1964 powershell.exe 572 powershell.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe 532 Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 1540 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 532 Synaptics.exe Token: SeDebugPrivilege 1964 powershell.exe Token: SeDebugPrivilege 572 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2788 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 31 PID 2392 wrote to memory of 2788 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 31 PID 2392 wrote to memory of 2788 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 31 PID 2392 wrote to memory of 2788 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 31 PID 2392 wrote to memory of 3004 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 33 PID 2392 wrote to memory of 3004 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 33 PID 2392 wrote to memory of 3004 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 33 PID 2392 wrote to memory of 3004 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 33 PID 2392 wrote to memory of 1624 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 35 PID 2392 wrote to memory of 1624 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 35 PID 2392 wrote to memory of 1624 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 35 PID 2392 wrote to memory of 1624 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 35 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2392 wrote to memory of 2828 2392 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2828 wrote to memory of 1540 2828 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 38 PID 2828 wrote to memory of 1540 2828 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 38 PID 2828 wrote to memory of 1540 2828 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 38 PID 2828 wrote to memory of 1540 2828 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 38 PID 2828 wrote to memory of 532 2828 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 39 PID 2828 wrote to memory of 532 2828 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 39 PID 2828 wrote to memory of 532 2828 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 39 PID 2828 wrote to memory of 532 2828 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 39 PID 532 wrote to memory of 572 532 Synaptics.exe 40 PID 532 wrote to memory of 572 532 Synaptics.exe 40 PID 532 wrote to memory of 572 532 Synaptics.exe 40 PID 532 wrote to memory of 572 532 Synaptics.exe 40 PID 532 wrote to memory of 1964 532 Synaptics.exe 42 PID 532 wrote to memory of 1964 532 Synaptics.exe 42 PID 532 wrote to memory of 1964 532 Synaptics.exe 42 PID 532 wrote to memory of 1964 532 Synaptics.exe 42 PID 532 wrote to memory of 2968 532 Synaptics.exe 44 PID 532 wrote to memory of 2968 532 Synaptics.exe 44 PID 532 wrote to memory of 2968 532 Synaptics.exe 44 PID 532 wrote to memory of 2968 532 Synaptics.exe 44 PID 532 wrote to memory of 1052 532 Synaptics.exe 46 PID 532 wrote to memory of 1052 532 Synaptics.exe 46 PID 532 wrote to memory of 1052 532 Synaptics.exe 46 PID 532 wrote to memory of 1052 532 Synaptics.exe 46 PID 532 wrote to memory of 612 532 Synaptics.exe 47 PID 532 wrote to memory of 612 532 Synaptics.exe 47 PID 532 wrote to memory of 612 532 Synaptics.exe 47 PID 532 wrote to memory of 612 532 Synaptics.exe 47 PID 532 wrote to memory of 1356 532 Synaptics.exe 48 PID 532 wrote to memory of 1356 532 Synaptics.exe 48 PID 532 wrote to memory of 1356 532 Synaptics.exe 48 PID 532 wrote to memory of 1356 532 Synaptics.exe 48 PID 532 wrote to memory of 1784 532 Synaptics.exe 49 PID 532 wrote to memory of 1784 532 Synaptics.exe 49 PID 532 wrote to memory of 1784 532 Synaptics.exe 49 PID 532 wrote to memory of 1784 532 Synaptics.exe 49 PID 532 wrote to memory of 1244 532 Synaptics.exe 50 PID 532 wrote to memory of 1244 532 Synaptics.exe 50 PID 532 wrote to memory of 1244 532 Synaptics.exe 50 PID 532 wrote to memory of 1244 532 Synaptics.exe 50 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4818.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1540
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC053.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2968
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1052
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:612
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1356
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1784
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1244
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a9c2d5309c9857b744a916ccfebdf934
SHA11ee77cb17ce8e3ca56ca97a8b0fc744375a0750d
SHA256b9e28fad46c8b07ca6c9e244e9979f2ce1a734869e4279fa84cad2a8654546bd
SHA512dda48337ec029bc37eb42dc0861ac9786fa3c959d639f9b2671a138c9e3217bdd5f7237dec637418e8eb76a9c6db3176f982621afd0da60fee91f7961d3a1e23
-
Filesize
1KB
MD5a10b8219549c030a3aad7f93cb3a4484
SHA1db96d25d42e6eb861f0d24b27585ba55de73cd51
SHA256a04f41695892207bc2cc1c4d8f8cb45fa0735bc7a88c409487fa59ca46c664c8
SHA512444179e7f1dfd9855ad784a78c944872512376a1002e1d105afafc4f85f0aa1cec9b5e2f682174fc42186ebdc403180dd6c9ea3532f332c1f79882e9cb37ac9a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DSBJITZW3EIX4CD0RPZG.temp
Filesize7KB
MD58371057ed3778e902a2b1681c150f623
SHA141d9e59c889ef88eaf6dc292e7df84d0da923d4c
SHA2564d3516eecd009af3df50f1c352f6881c13171dc18c4f08c34648256e1f632d70
SHA512819c37056747f4b2da9f65fde025b77cdadf02ae9e0b01b93ddf50978bf833dc869a0592af9433336d7dd3435300fae291ca6d90bfff7db0b00d31ecedec061a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD52ee60420f0a29a0c42d1fc52cf5ba7da
SHA19345b9f2162f273acdd23139841487ea1b1b76e9
SHA256439c5ed4d6b28ae648e395da5432c0d1dd0cc60558824e95ea0d1f91b6f6a707
SHA51271c83d10a51e14520ef634536d6672aa6d9ea2b57a03daec926239a158ee7f8fb29d6724ef62aecc1ff1e539cab54f648f37eacc09f8c7be45f347f20528d568
-
\Users\Admin\AppData\Local\Temp\._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe
Filesize91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b