Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-02-2025 20:59
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe
-
Size
6.4MB
-
MD5
48245c77b542f34da1e454a462ada162
-
SHA1
ab18508160b133b49d0f47dcc1aa795b54823709
-
SHA256
6e80d8e4275dddd3ea245b33aa1cc9f3c4cf6d22398e70a8bdac9c73dfcdd838
-
SHA512
8b303fc594160a824482433046951d06ce909e1851f019672f50c5706b1d08491420f7bbf77884686faffbf0cc908966f7863233f73fdf015be0691bf732b41f
-
SSDEEP
196608:4Nsg4AMgA2Nsg4AMgAANsg4AMgA8FIF0wu3:4Gg4aBGg4anGg4aD3
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2816 powershell.exe 2912 powershell.exe 988 powershell.exe 1300 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 536 ._cache_2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1744 Synaptics.exe 1972 Synaptics.exe 1900 ._cache_Synaptics.exe -
Loads dropped DLL 4 IoCs
pid Process 2568 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 2568 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1972 Synaptics.exe 1972 Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 reallyfreegeoip.org 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1868 set thread context of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1744 set thread context of 1972 1744 Synaptics.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2404 schtasks.exe 2388 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2436 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 2816 powershell.exe 2912 powershell.exe 1744 Synaptics.exe 1744 Synaptics.exe 1744 Synaptics.exe 1744 Synaptics.exe 536 ._cache_2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 1744 Synaptics.exe 1744 Synaptics.exe 1744 Synaptics.exe 1744 Synaptics.exe 988 powershell.exe 1744 Synaptics.exe 1300 powershell.exe 1900 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 536 ._cache_2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 1744 Synaptics.exe Token: SeDebugPrivilege 988 powershell.exe Token: SeDebugPrivilege 1300 powershell.exe Token: SeDebugPrivilege 1900 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2436 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2816 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 31 PID 1868 wrote to memory of 2816 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 31 PID 1868 wrote to memory of 2816 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 31 PID 1868 wrote to memory of 2816 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 31 PID 1868 wrote to memory of 2912 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 33 PID 1868 wrote to memory of 2912 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 33 PID 1868 wrote to memory of 2912 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 33 PID 1868 wrote to memory of 2912 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 33 PID 1868 wrote to memory of 2388 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 35 PID 1868 wrote to memory of 2388 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 35 PID 1868 wrote to memory of 2388 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 35 PID 1868 wrote to memory of 2388 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 35 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 1868 wrote to memory of 2568 1868 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 37 PID 2568 wrote to memory of 536 2568 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 38 PID 2568 wrote to memory of 536 2568 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 38 PID 2568 wrote to memory of 536 2568 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 38 PID 2568 wrote to memory of 536 2568 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 38 PID 2568 wrote to memory of 1744 2568 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 39 PID 2568 wrote to memory of 1744 2568 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 39 PID 2568 wrote to memory of 1744 2568 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 39 PID 2568 wrote to memory of 1744 2568 2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe 39 PID 1744 wrote to memory of 988 1744 Synaptics.exe 40 PID 1744 wrote to memory of 988 1744 Synaptics.exe 40 PID 1744 wrote to memory of 988 1744 Synaptics.exe 40 PID 1744 wrote to memory of 988 1744 Synaptics.exe 40 PID 1744 wrote to memory of 1300 1744 Synaptics.exe 42 PID 1744 wrote to memory of 1300 1744 Synaptics.exe 42 PID 1744 wrote to memory of 1300 1744 Synaptics.exe 42 PID 1744 wrote to memory of 1300 1744 Synaptics.exe 42 PID 1744 wrote to memory of 2404 1744 Synaptics.exe 43 PID 1744 wrote to memory of 2404 1744 Synaptics.exe 43 PID 1744 wrote to memory of 2404 1744 Synaptics.exe 43 PID 1744 wrote to memory of 2404 1744 Synaptics.exe 43 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1744 wrote to memory of 1972 1744 Synaptics.exe 46 PID 1972 wrote to memory of 1900 1972 Synaptics.exe 47 PID 1972 wrote to memory of 1900 1972 Synaptics.exe 47 PID 1972 wrote to memory of 1900 1972 Synaptics.exe 47 PID 1972 wrote to memory of 1900 1972 Synaptics.exe 47 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5F21.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDA0A.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2404
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1900
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2436
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.4MB
MD548245c77b542f34da1e454a462ada162
SHA1ab18508160b133b49d0f47dcc1aa795b54823709
SHA2566e80d8e4275dddd3ea245b33aa1cc9f3c4cf6d22398e70a8bdac9c73dfcdd838
SHA5128b303fc594160a824482433046951d06ce909e1851f019672f50c5706b1d08491420f7bbf77884686faffbf0cc908966f7863233f73fdf015be0691bf732b41f
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-20_48245c77b542f34da1e454a462ada162_avoslocker_hijackloader_luca-stealer.exe
Filesize91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b
-
Filesize
26KB
MD5ff1f761f6d7b6492753f8ac3d84f579b
SHA1cf7942bbc58ae3d1527df91118b5a0244b99c157
SHA256e5f2924ff6e9d6d66de71701a6c2cd539650d85ad1f929bf630b8cf70413bec3
SHA51200ff3550235fb4fa5853ce8e9581de162e962d24b16809c0b7dff20b49e5e951505a4cf3d2e903758e67faebac0caa228542fe0cfa97ea04eb4c9b91d90a6697
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
29KB
MD5a38d2678781d72da770f5268aa6ed3c0
SHA1ae7691a327a0dcfe24b7f37580235167c6b91077
SHA2569d10fa5619b01457ea80bb960609dad282eca079a7fcce7b76d3a0ffd04c92e9
SHA512fe7b49abf6ad914018750e79310f8cf94d741eb246d0bc00528069b63ef1d8b4e75bb2e83a074bdf2e7dd5cff790ea35c29ef818ad0dde54b26b090980fadcf8
-
Filesize
29KB
MD56301541e6f776b9a4e17928967861316
SHA1f0c740ea7e24b8ad2884c9ac5342cbbad814b559
SHA256f57d23f10e10f60c0ac1ae83f8284430ec8e2b58a21a5217902dcb72d7c2bcba
SHA5126e84f454695ad8402c0e7a3189d25f85ae0bf2b4e6448f2459386533c0bc0e1063f548462416777c8d6dfa096644070142a31ff6950d4ed011a1998f365521ff
-
Filesize
30KB
MD56db9e78b68389613d33199544743a640
SHA16c9e1af4cfdd49a8b44f47bb65c06fa7d48e71fc
SHA256ada80cc1fb09082f52e27e6c813bec10eae73b268188e67084020590cd8873de
SHA51209d70666b18134d5d9c7366e728045e2680840b5d880e92da97e0bbebb75a1d2620d9de7a3d7124708a1df4e5554d322cfb78c4502ac6e2093b4152501168296
-
Filesize
1KB
MD51a6f091575e68f2f425396e53a9effc9
SHA124b391e2e075a4ab0e587ecc098d9750486a220a
SHA2560366be5662d005ef118b923e5eebdadc839beeb6e3af6b6c78e856963015eb7d
SHA512a876c85a51459376f3d68f55741ed4d503760d9949aa7eada0ff5e12f4a688b378f01c1e2f3d252e58fb0a638c3206e788c18e6431bcf13e976da557cb3e81df
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LJYELQ4PJHZAQHM3CD0G.temp
Filesize7KB
MD5beb92e1ed42afec01b1f9ddc5dd809ad
SHA156b5c58c3d5a0294744e6f567314a41f67f00b97
SHA256514aff6c379cdbe33b20df6e56e67d1e286c41e5e70763f1d557ba5ee71bfc08
SHA5129d4aa72a56c158abff1dd7619672a240b515595ff559c0a79cd1f3f6c42724771cdc2848d7bcf41b8935b683240761d6c1666ee7e34a3a9643268199789a756b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD549fe6c6d0d8af17a1a0f54d8834ee864
SHA1aac50a0759cb2896b012f992ac4b48d7ff48068c
SHA2564e6819a4e004f947e4e42eb57b7b8aefd3436fe94de5a6398f08b3dfa8bf9129
SHA5126651fb23698b43d063c7ba78019ccb3f07d9dd42bf464214eb3d067c6e423a1dd84d6505d94f891c2c379d517bd3f9ba2366eabf06d03fa754afefe6b29462fd