Analysis
-
max time kernel
125s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 21:25
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe
-
Size
3.6MB
-
MD5
a9c2d5309c9857b744a916ccfebdf934
-
SHA1
1ee77cb17ce8e3ca56ca97a8b0fc744375a0750d
-
SHA256
b9e28fad46c8b07ca6c9e244e9979f2ce1a734869e4279fa84cad2a8654546bd
-
SHA512
dda48337ec029bc37eb42dc0861ac9786fa3c959d639f9b2671a138c9e3217bdd5f7237dec637418e8eb76a9c6db3176f982621afd0da60fee91f7961d3a1e23
-
SSDEEP
98304:eZNVWg4AxEfkzA8OU/jIEeQfoR/IuOFVjUu5:8Nsg4AMgA8FIF0wu
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2824 powershell.exe 2772 powershell.exe 2208 powershell.exe 2264 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 1556 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 1192 Synaptics.exe 872 Synaptics.exe 1340 ._cache_Synaptics.exe -
Loads dropped DLL 4 IoCs
pid Process 2856 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2856 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 872 Synaptics.exe 872 Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 reallyfreegeoip.org 9 reallyfreegeoip.org 19 reallyfreegeoip.org 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2444 set thread context of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 1192 set thread context of 872 1192 Synaptics.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2500 schtasks.exe 2336 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1772 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 2772 powershell.exe 2824 powershell.exe 1556 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 1192 Synaptics.exe 1192 Synaptics.exe 1192 Synaptics.exe 1192 Synaptics.exe 1192 Synaptics.exe 1192 Synaptics.exe 1192 Synaptics.exe 1192 Synaptics.exe 2208 powershell.exe 2264 powershell.exe 1192 Synaptics.exe 1340 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 1556 ._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 1192 Synaptics.exe Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeDebugPrivilege 1340 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1772 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2824 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 31 PID 2444 wrote to memory of 2824 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 31 PID 2444 wrote to memory of 2824 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 31 PID 2444 wrote to memory of 2824 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 31 PID 2444 wrote to memory of 2772 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 33 PID 2444 wrote to memory of 2772 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 33 PID 2444 wrote to memory of 2772 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 33 PID 2444 wrote to memory of 2772 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 33 PID 2444 wrote to memory of 2500 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 35 PID 2444 wrote to memory of 2500 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 35 PID 2444 wrote to memory of 2500 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 35 PID 2444 wrote to memory of 2500 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 35 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2444 wrote to memory of 2856 2444 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 37 PID 2856 wrote to memory of 1556 2856 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 38 PID 2856 wrote to memory of 1556 2856 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 38 PID 2856 wrote to memory of 1556 2856 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 38 PID 2856 wrote to memory of 1556 2856 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 38 PID 2856 wrote to memory of 1192 2856 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 39 PID 2856 wrote to memory of 1192 2856 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 39 PID 2856 wrote to memory of 1192 2856 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 39 PID 2856 wrote to memory of 1192 2856 2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe 39 PID 1192 wrote to memory of 2208 1192 Synaptics.exe 40 PID 1192 wrote to memory of 2208 1192 Synaptics.exe 40 PID 1192 wrote to memory of 2208 1192 Synaptics.exe 40 PID 1192 wrote to memory of 2208 1192 Synaptics.exe 40 PID 1192 wrote to memory of 2264 1192 Synaptics.exe 42 PID 1192 wrote to memory of 2264 1192 Synaptics.exe 42 PID 1192 wrote to memory of 2264 1192 Synaptics.exe 42 PID 1192 wrote to memory of 2264 1192 Synaptics.exe 42 PID 1192 wrote to memory of 2336 1192 Synaptics.exe 44 PID 1192 wrote to memory of 2336 1192 Synaptics.exe 44 PID 1192 wrote to memory of 2336 1192 Synaptics.exe 44 PID 1192 wrote to memory of 2336 1192 Synaptics.exe 44 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 1192 wrote to memory of 872 1192 Synaptics.exe 46 PID 872 wrote to memory of 1340 872 Synaptics.exe 47 PID 872 wrote to memory of 1340 872 Synaptics.exe 47 PID 872 wrote to memory of 1340 872 Synaptics.exe 47 PID 872 wrote to memory of 1340 872 Synaptics.exe 47 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3D5E.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB616.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2336
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1340
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1772
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5a9c2d5309c9857b744a916ccfebdf934
SHA11ee77cb17ce8e3ca56ca97a8b0fc744375a0750d
SHA256b9e28fad46c8b07ca6c9e244e9979f2ce1a734869e4279fa84cad2a8654546bd
SHA512dda48337ec029bc37eb42dc0861ac9786fa3c959d639f9b2671a138c9e3217bdd5f7237dec637418e8eb76a9c6db3176f982621afd0da60fee91f7961d3a1e23
-
Filesize
26KB
MD57003c1546258ce20fcaef42fb31b6382
SHA1b27340d00a49bcacec158e6111b1eecdcf9a28e6
SHA2561dcffd53dab99f75b3556a9affcac9b777f036eee4db511043acfc86824518e8
SHA51255ea3b7aa221965f511894de1d2e777c52517b26601ea1567dc6208aec4ad42deaedddbce901d93a12ca02b7e697773df23601399b5b203b6483bc82d456d7a5
-
Filesize
29KB
MD514a2aee6a56aedf027bbe1c1cd1427f7
SHA1e24cb2673feca2b55d3d97c4dd4cbedc07b7fdda
SHA2564a920652be84bb1e9dbd903de294d4c9c86d00d2bec74a9e1bef56d65fa1d6b7
SHA512f1efb111fbedfb704c747e1e5c7f7987dde29c53427f7d3360df5f88011b65a4908e236edf1fa3d8ac880c984ef0f1cf6a3d32d7bd299f611000f394d4809d25
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD5613b0985dd398601b2651eacca3a0294
SHA157c202fc1d2725407fe7d7be920592c7ce43f1b8
SHA256198a0d78f86bee9caebd245bb3dbcd2c3a9eaa209b1837975619472e03f4f17d
SHA51211db21043f68130c6efdae9da7b839f04ee822545b04b166c202646179ee1cfbebfa63bee944da04f1c5a152782934993078fb187ca84d49ac43bc0dfc3a5e18
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VRHIHKIZLPWC1H5XXP5G.temp
Filesize7KB
MD520913661f05f4e7d0bda7d6d4854dfec
SHA176a9ae2bc0a7b34656f913e51ec11d1ca6cf0fb3
SHA25685af402c6159849499cc8c4eade46e8f84244c78b8be1e44256d87317401ac22
SHA512c159a9934f78cf6bbad13708bec01c1cb0ad3702fbaf5c3d5fefd261b6af03e2f82b3d080e6aa01de06bae3b4fab59558f93c5d3b37dafd581cf21f2a6b7a792
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d1ed5b29bb7d79f5cb2d053f811d7210
SHA19c16e6cd90db3f99c7d532adb31c5b323402a808
SHA2568ba4f74a83dbab33a83e843d2e55442c8c86524a0d580753b4402392777ba12a
SHA51259caa4895e1aa1255d6adb8c277effa8e96bf6b24d41941a841f9048e60b34dd213b155d6fa03afec3644b17582738cb7be952fcad25d9e35864eac349d93566
-
\Users\Admin\AppData\Local\Temp\._cache_2025-02-03_a9c2d5309c9857b744a916ccfebdf934_avoslocker_hijackloader_luca-stealer.exe
Filesize91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b