Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
SynovaX-Bootstrapper.exe
Resource
win7-20241010-en
General
-
Target
SynovaX-Bootstrapper.exe
-
Size
89KB
-
MD5
ed78d35bb29ca31c513323b193fcb58d
-
SHA1
5ecfc87ce1aec3a0ff03515789640c61632e423a
-
SHA256
1daa72ef555a8d914176f0f4050b77de7b9d1cebd4c39aebea2443648313cfe2
-
SHA512
3766de02821291c540ebb62abf737b453fae85279c57b11a5c16fa9e7e61f26b47b584831d1237a355fa412a7ad38205e4a24ab3ee787f52d92a6042f16ddddf
-
SSDEEP
1536:z7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfowiOr:v7DhdC6kzWypvaQ0FxyNTBfow
Malware Config
Signatures
-
pid Process 2864 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SynovaX-Bootstrapper.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2864 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2856 2808 SynovaX-Bootstrapper.exe 30 PID 2808 wrote to memory of 2856 2808 SynovaX-Bootstrapper.exe 30 PID 2808 wrote to memory of 2856 2808 SynovaX-Bootstrapper.exe 30 PID 2808 wrote to memory of 2856 2808 SynovaX-Bootstrapper.exe 30 PID 2856 wrote to memory of 2864 2856 cmd.exe 31 PID 2856 wrote to memory of 2864 2856 cmd.exe 31 PID 2856 wrote to memory of 2864 2856 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\SynovaX-Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SynovaX-Bootstrapper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\F622.tmp\F623.tmp\F624.bat C:\Users\Admin\AppData\Local\Temp\SynovaX-Bootstrapper.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& {Invoke-WebRequest -Uri 'https://github.com/SynovaX/release/releases/download/Normal/SynovaX.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\SynovaX.exe'}"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD50cb29fcb019c1b175c3aaaa1d1e9bcce
SHA192d97120d070734fa7c58f7248b2fc0aed35bdcc
SHA256c8dc0ac37f1b3033e4b02c34106595e7395fe8db755961a62ff96151964e9eff
SHA5120ef2d2de6f853443b25894d88beec870734fb39b821ee2c03b361686728479a21765a79919cd093c6b43f86eb9964f94e430f766aecd7df8a251dae0b1e89ccf