Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 21:10
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe
-
Size
3.6MB
-
MD5
609aa444e275197568336bbb4f690caf
-
SHA1
c7b17dc65916e9c0d1a821f37cc09d7874806aaf
-
SHA256
45007a1ad8e1290288e20c88b836ea1e9d2b55d90f08ea14850bb456fceb113b
-
SHA512
b01954515201153924c6ae852bd0397de8f02ef33cdd977f8762712bdd4296d520b9238bc27d2176dd85928db1a0d57f8e4c4551f61f2caa9d3202166730b60f
-
SSDEEP
98304:eZNVWg4AxEfkzA8OU/jIEeQfoR/IuOFVjUu5h:8Nsg4AMgA8FIF0wub
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2428 powershell.exe 2704 powershell.exe 2364 powershell.exe 2264 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 2080 ._cache_2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 1708 Synaptics.exe 1988 Synaptics.exe 1964 ._cache_Synaptics.exe -
Loads dropped DLL 4 IoCs
pid Process 2872 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2872 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 1988 Synaptics.exe 1988 Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 reallyfreegeoip.org 19 reallyfreegeoip.org 4 checkip.dyndns.org 8 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2604 set thread context of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 1708 set thread context of 1988 1708 Synaptics.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe 2412 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1572 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 2428 powershell.exe 2704 powershell.exe 2080 ._cache_2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 1708 Synaptics.exe 1708 Synaptics.exe 1708 Synaptics.exe 1708 Synaptics.exe 1708 Synaptics.exe 1708 Synaptics.exe 1708 Synaptics.exe 1708 Synaptics.exe 2364 powershell.exe 2264 powershell.exe 1708 Synaptics.exe 1964 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 2080 ._cache_2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 1708 Synaptics.exe Token: SeDebugPrivilege 2364 powershell.exe Token: SeDebugPrivilege 2264 powershell.exe Token: SeDebugPrivilege 1964 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1572 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2428 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 29 PID 2604 wrote to memory of 2428 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 29 PID 2604 wrote to memory of 2428 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 29 PID 2604 wrote to memory of 2428 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 29 PID 2604 wrote to memory of 2704 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 31 PID 2604 wrote to memory of 2704 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 31 PID 2604 wrote to memory of 2704 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 31 PID 2604 wrote to memory of 2704 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 31 PID 2604 wrote to memory of 2820 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 33 PID 2604 wrote to memory of 2820 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 33 PID 2604 wrote to memory of 2820 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 33 PID 2604 wrote to memory of 2820 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 33 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2604 wrote to memory of 2872 2604 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 35 PID 2872 wrote to memory of 2080 2872 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 36 PID 2872 wrote to memory of 2080 2872 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 36 PID 2872 wrote to memory of 2080 2872 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 36 PID 2872 wrote to memory of 2080 2872 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 36 PID 2872 wrote to memory of 1708 2872 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 37 PID 2872 wrote to memory of 1708 2872 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 37 PID 2872 wrote to memory of 1708 2872 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 37 PID 2872 wrote to memory of 1708 2872 2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe 37 PID 1708 wrote to memory of 2364 1708 Synaptics.exe 38 PID 1708 wrote to memory of 2364 1708 Synaptics.exe 38 PID 1708 wrote to memory of 2364 1708 Synaptics.exe 38 PID 1708 wrote to memory of 2364 1708 Synaptics.exe 38 PID 1708 wrote to memory of 2264 1708 Synaptics.exe 40 PID 1708 wrote to memory of 2264 1708 Synaptics.exe 40 PID 1708 wrote to memory of 2264 1708 Synaptics.exe 40 PID 1708 wrote to memory of 2264 1708 Synaptics.exe 40 PID 1708 wrote to memory of 2412 1708 Synaptics.exe 42 PID 1708 wrote to memory of 2412 1708 Synaptics.exe 42 PID 1708 wrote to memory of 2412 1708 Synaptics.exe 42 PID 1708 wrote to memory of 2412 1708 Synaptics.exe 42 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1708 wrote to memory of 1988 1708 Synaptics.exe 44 PID 1988 wrote to memory of 1964 1988 Synaptics.exe 45 PID 1988 wrote to memory of 1964 1988 Synaptics.exe 45 PID 1988 wrote to memory of 1964 1988 Synaptics.exe 45 PID 1988 wrote to memory of 1964 1988 Synaptics.exe 45 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFBBD.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp822B.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2412
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1964
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1572
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5609aa444e275197568336bbb4f690caf
SHA1c7b17dc65916e9c0d1a821f37cc09d7874806aaf
SHA25645007a1ad8e1290288e20c88b836ea1e9d2b55d90f08ea14850bb456fceb113b
SHA512b01954515201153924c6ae852bd0397de8f02ef33cdd977f8762712bdd4296d520b9238bc27d2176dd85928db1a0d57f8e4c4551f61f2caa9d3202166730b60f
-
Filesize
21KB
MD5f0d98bbc30bf6b0a63f1c1140d220acd
SHA190e127d22428cb96340090be08aeac0efbb1410b
SHA256fd31a35873318f717ee28f5fedc52a0139d88c2effc6523cdb4b84bf95921321
SHA512067ece49ec6950c5009025594428ab3e3934418cc7dbc73537517b4d6209e3a71631362a5e16928cec501ed67e92dd5d6509004c57627a995a1ed5c6cd0e8034
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD5abdd7ecd00f7b2a0b28a101a6c2f6341
SHA1348a8fb9fa765cf3d7d212403bc825239465fa2a
SHA256998fb2c1432a18dcffa62687a8f240917739b40290d6847a135ea81c9b751a47
SHA51239ee5c5d26804e4c332f7e684987f5da605c0a2854a8c28547bb186f30a7091390fd027f77289eafc89e630e520ddf46599ffba9e0b2637bae96728c14be56d5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5f890acb8484eef040356b9f5a6443995
SHA106f39e96bfc827120cb00e0e4a9260a2b67de79b
SHA256342c6ee49935cf613e2993382967e3495c99544487901d6fc23d8f0e79d2b5bc
SHA512b71dce9320f39db96dc076c37f71f46dcbf871102fea99d70e1d27469c76d23c9e7e6a5bcc5660e5ad6f2364ef8637c9096a0c91a1ab812f328c4de881360dfe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5285a595a0b007d81d8c828ffac2f04da
SHA10aaee04c5029135e2c87c4ea977d0f67cf0ea852
SHA2565187c8f773b7acb2e51d1a043cd076c9e707c22efcf7ac47d295085d6002aaf3
SHA5129e3991ef2fafcd5bb39f4417326287fb19050836250e475111438934d53b00387d51ae966ca31534519fafdf9fd2b5bc7abdf6cd2218baa2b8393d3998047032
-
\Users\Admin\AppData\Local\Temp\._cache_2025-02-19_609aa444e275197568336bbb4f690caf_avoslocker_hijackloader_luca-stealer.exe
Filesize91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b