Overview
overview
10Static
static
3SynapseZ C...er.exe
windows7-x64
1SynapseZ C...er.exe
windows10-2004-x64
10SynapseZ C...Ek.exe
windows7-x64
3SynapseZ C...Ek.exe
windows10-2004-x64
3SynapseZ C...re.dll
windows7-x64
3SynapseZ C...re.dll
windows10-2004-x64
3SynapseZ C...ss.exe
windows7-x64
3SynapseZ C...ss.exe
windows10-2004-x64
3SynapseZ C...re.dll
windows7-x64
3SynapseZ C...re.dll
windows10-2004-x64
3SynapseZ C...pf.dll
windows7-x64
3SynapseZ C...pf.dll
windows10-2004-x64
3SynapseZ C...rp.dll
windows7-x64
3SynapseZ C...rp.dll
windows10-2004-x64
3SynapseZ C...r.html
windows7-x64
3SynapseZ C...r.html
windows10-2004-x64
3SynapseZ C...tt.exe
windows7-x64
3SynapseZ C...tt.exe
windows10-2004-x64
3SynapseZ C...or.dll
windows7-x64
9SynapseZ C...or.dll
windows10-2004-x64
9SynapseZ C...lf.dll
windows7-x64
3SynapseZ C...lf.dll
windows10-2004-x64
3SynapseZ C...47.dll
windows10-2004-x64
3SynapseZ C...GL.dll
windows7-x64
3SynapseZ C...GL.dll
windows10-2004-x64
3SynapseZ C...v2.dll
windows7-x64
3SynapseZ C...v2.dll
windows10-2004-x64
3SynapseZ C...mp.exe
windows7-x64
9SynapseZ C...mp.exe
windows10-2004-x64
9Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
SynapseZ Cracked V5.2/Synapse X Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SynapseZ Cracked V5.2/Synapse X Launcher.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
SynapseZ Cracked V5.2/bin/359k6u5HUNL4tEk.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
SynapseZ Cracked V5.2/bin/359k6u5HUNL4tEk.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
SynapseZ Cracked V5.2/bin/CefSharp.BrowserSubprocess.Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SynapseZ Cracked V5.2/bin/CefSharp.BrowserSubprocess.Core.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
SynapseZ Cracked V5.2/bin/CefSharp.BrowserSubprocess.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SynapseZ Cracked V5.2/bin/CefSharp.BrowserSubprocess.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
SynapseZ Cracked V5.2/bin/CefSharp.Core.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
SynapseZ Cracked V5.2/bin/CefSharp.Core.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
SynapseZ Cracked V5.2/bin/CefSharp.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
SynapseZ Cracked V5.2/bin/CefSharp.Wpf.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
SynapseZ Cracked V5.2/bin/CefSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
SynapseZ Cracked V5.2/bin/CefSharp.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
SynapseZ Cracked V5.2/bin/Editor.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
SynapseZ Cracked V5.2/bin/Editor.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
SynapseZ Cracked V5.2/bin/OoxIi8qtt.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
SynapseZ Cracked V5.2/bin/OoxIi8qtt.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
SynapseZ Cracked V5.2/bin/SynapseInjector.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
SynapseZ Cracked V5.2/bin/SynapseInjector.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
SynapseZ Cracked V5.2/bin/chrome_elf.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
SynapseZ Cracked V5.2/bin/chrome_elf.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
SynapseZ Cracked V5.2/bin/d3dcompiler_47.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral24
Sample
SynapseZ Cracked V5.2/bin/libEGL.dll
Resource
win7-20241023-en
Behavioral task
behavioral25
Sample
SynapseZ Cracked V5.2/bin/libEGL.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral26
Sample
SynapseZ Cracked V5.2/bin/libGLESv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
SynapseZ Cracked V5.2/bin/libGLESv2.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral28
Sample
SynapseZ Cracked V5.2/bin/lua-decomp.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
SynapseZ Cracked V5.2/bin/lua-decomp.exe
Resource
win10v2004-20250217-en
General
-
Target
SynapseZ Cracked V5.2/Synapse X Launcher.exe
-
Size
67.0MB
-
MD5
29ee8465e6188465ac4d025efc6ae0c3
-
SHA1
2efe3da40797f5c24550d488bf76962607ef3729
-
SHA256
90685135a29b77bb7488ae2c4c83f856334cb5665a771973e299bc636f7f9c0f
-
SHA512
37f159d6a2e985f9386845f145ef716e30ed6f165cf360f95cf9f90de2c893a000d5c2e5fc0595ee799dfefe1134cf5d639b7727225af4df752fe9a09b64ffa9
-
SSDEEP
393216:j4TPZVLWruiFVks+9j54GXvitZQLCO5SXDqQu58EISEhoIaE2FShABZDv25PPa24:jKRVQxhu0P8Lq1LEvxOOx5Sq
Malware Config
Extracted
xworm
5.0
week-dictionary.gl.at.ply.gg:12466
WIHzy7HOqD8TiFlq
-
Install_directory
%AppData%
-
install_file
PowerShell.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000700000001e44f-3.dat family_xworm behavioral2/memory/4220-6-0x0000000000F70000-0x0000000000F7E000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation appe7248d9d.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerShell.lnk appe7248d9d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerShell.lnk appe7248d9d.exe -
Executes dropped EXE 4 IoCs
pid Process 4220 appe7248d9d.exe 2652 PowerShell.exe 4964 PowerShell.exe 1560 PowerShell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4184 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4220 appe7248d9d.exe Token: SeDebugPrivilege 2652 PowerShell.exe Token: SeDebugPrivilege 4964 PowerShell.exe Token: SeDebugPrivilege 1560 PowerShell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3184 wrote to memory of 4220 3184 Synapse X Launcher.exe 87 PID 3184 wrote to memory of 4220 3184 Synapse X Launcher.exe 87 PID 4220 wrote to memory of 4184 4220 appe7248d9d.exe 95 PID 4220 wrote to memory of 4184 4220 appe7248d9d.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SynapseZ Cracked V5.2\Synapse X Launcher.exe"C:\Users\Admin\AppData\Local\Temp\SynapseZ Cracked V5.2\Synapse X Launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\TempAppba6bb38d\appe7248d9d.exeC:\Users\Admin\AppData\Local\Temp\TempAppba6bb38d\appe7248d9d.exe2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "PowerShell" /tr "C:\Users\Admin\AppData\Roaming\PowerShell.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4184
-
-
-
C:\Users\Admin\AppData\Roaming\PowerShell.exeC:\Users\Admin\AppData\Roaming\PowerShell.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
C:\Users\Admin\AppData\Roaming\PowerShell.exeC:\Users\Admin\AppData\Roaming\PowerShell.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
C:\Users\Admin\AppData\Roaming\PowerShell.exeC:\Users\Admin\AppData\Roaming\PowerShell.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
34KB
MD5df4465e6693e489c6db32a427bbd93ec
SHA1ea8ef0ae2b517e10f934b66ebefa71e2d9007aa5
SHA2560c5031bae18c7e5b294b89b4b82e30c3862d1e5e4aa5fd664d7a04451dc83847
SHA5124d569c1c29adadf32ff28ba53378493189c99e6e1734e1c896e52e6df89358cbfc6525a96ae1d5cbd99a909ffb7d8e88b075674f679a448a54fef961cdc16f5d