Overview
overview
10Static
static
10de1299d65e...07.exe
windows7-x64
10de1299d65e...07.exe
windows10-2004-x64
10de3206bd13...8d.exe
windows7-x64
8de3206bd13...8d.exe
windows10-2004-x64
8de41dac906...f2.exe
windows7-x64
10de41dac906...f2.exe
windows10-2004-x64
10de55ad6fba...fe.exe
windows7-x64
10de55ad6fba...fe.exe
windows10-2004-x64
10de7c6ded50...6f.exe
windows7-x64
10de7c6ded50...6f.exe
windows10-2004-x64
10de85b03beb...f7.exe
windows7-x64
10de85b03beb...f7.exe
windows10-2004-x64
10de8984199c...45.exe
windows7-x64
10de8984199c...45.exe
windows10-2004-x64
10deb9b3528e...91.exe
windows7-x64
10deb9b3528e...91.exe
windows10-2004-x64
10dec0fc30b5...d0.exe
windows7-x64
10dec0fc30b5...d0.exe
windows10-2004-x64
10ded424937a...b5.exe
windows7-x64
10ded424937a...b5.exe
windows10-2004-x64
10defcdae3dc...64.exe
windows7-x64
10defcdae3dc...64.exe
windows10-2004-x64
10df04d21f8f...1c.exe
windows7-x64
10df04d21f8f...1c.exe
windows10-2004-x64
10df0e554958...e9.exe
windows7-x64
7df0e554958...e9.exe
windows10-2004-x64
7df35e63228...2e.exe
windows7-x64
10df35e63228...2e.exe
windows10-2004-x64
10df43aaf53c...31.exe
windows7-x64
8df43aaf53c...31.exe
windows10-2004-x64
8df9cc0d83f...35.exe
windows7-x64
7df9cc0d83f...35.exe
windows10-2004-x64
7Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:17
Behavioral task
behavioral1
Sample
de1299d65e55eeb63ddc8320cafe3f07.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de1299d65e55eeb63ddc8320cafe3f07.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
de41dac906b1f4218d2cf3e93d994af2.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
de41dac906b1f4218d2cf3e93d994af2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
de55ad6fba2d168ad7a56c2c2f71d119b5912b6c1653e3b77f8a9773626d11fe.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
de55ad6fba2d168ad7a56c2c2f71d119b5912b6c1653e3b77f8a9773626d11fe.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
de7c6ded508e6b46e7f6b385572c426f.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
de7c6ded508e6b46e7f6b385572c426f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
de85b03bebfb919df53912cb0ca84af7.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
de85b03bebfb919df53912cb0ca84af7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
de8984199cea928c5ce0773ce065a545.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
de8984199cea928c5ce0773ce065a545.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
deb9b3528e54334bf14621892e130791.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
deb9b3528e54334bf14621892e130791.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
dec0fc30b53f55787ffb4b054bd59fb796c9f2d43dc8d56ab749215f05957fd0.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
dec0fc30b53f55787ffb4b054bd59fb796c9f2d43dc8d56ab749215f05957fd0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ded424937a30c22016f9766e627fccb5.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
ded424937a30c22016f9766e627fccb5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
defcdae3dc9e03410d78ef0ab357f764.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
defcdae3dc9e03410d78ef0ab357f764.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
df04d21f8f4edc307cb444b18e8f201c.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
df04d21f8f4edc307cb444b18e8f201c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
df0e554958405ce1e7b15ab03585cce9.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
df0e554958405ce1e7b15ab03585cce9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
df35e63228a07a080a53b1bd5b62de3a09337c7d3c2eeef01adf41de434da82e.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
df35e63228a07a080a53b1bd5b62de3a09337c7d3c2eeef01adf41de434da82e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
df43aaf53cf823766f98d138827f3931.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
df43aaf53cf823766f98d138827f3931.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
df9cc0d83fdf3053b95b91afe74fa035.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
df9cc0d83fdf3053b95b91afe74fa035.exe
Resource
win10v2004-20250314-en
General
-
Target
ded424937a30c22016f9766e627fccb5.exe
-
Size
13.8MB
-
MD5
ded424937a30c22016f9766e627fccb5
-
SHA1
c073e74f656a7c5c0a74cc1cae3d059ae6715204
-
SHA256
81694e7be43cf7bbe907aa1a152951ae3d0e665782485fb0915a6c146b63dde6
-
SHA512
2a387db31c91bc6b212a99323f47f4ae37d37570bc2ea497a5d01f4ac99ed397d669c66ff01ed8f100b4b3f0d0a113de68f102b0e59a8aa569fd050b3502ef27
-
SSDEEP
393216:hGg4aNGg4aeGg4aMGg4avGg4a5Gg4aFGg4aYGg4aWGg4aEGg4an:plcKvRt2kyn
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2560 powershell.exe 3004 powershell.exe 1360 powershell.exe 2800 powershell.exe -
resource behavioral19/files/0x000500000001a4c1-139.dat behavioral19/files/0x000600000001a4c3-152.dat behavioral19/files/0x000700000001a4c1-163.dat -
Executes dropped EXE 4 IoCs
pid Process 2504 ._cache_ded424937a30c22016f9766e627fccb5.exe 2012 Synaptics.exe 1544 Synaptics.exe 1640 ._cache_Synaptics.exe -
Loads dropped DLL 4 IoCs
pid Process 1272 ded424937a30c22016f9766e627fccb5.exe 1272 ded424937a30c22016f9766e627fccb5.exe 1544 Synaptics.exe 1544 Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" ded424937a30c22016f9766e627fccb5.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org 15 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2656 set thread context of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2012 set thread context of 1544 2012 Synaptics.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2592 schtasks.exe 1944 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1656 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2656 ded424937a30c22016f9766e627fccb5.exe 2656 ded424937a30c22016f9766e627fccb5.exe 2656 ded424937a30c22016f9766e627fccb5.exe 2656 ded424937a30c22016f9766e627fccb5.exe 2656 ded424937a30c22016f9766e627fccb5.exe 2656 ded424937a30c22016f9766e627fccb5.exe 2656 ded424937a30c22016f9766e627fccb5.exe 2656 ded424937a30c22016f9766e627fccb5.exe 2656 ded424937a30c22016f9766e627fccb5.exe 2800 powershell.exe 2560 powershell.exe 2504 ._cache_ded424937a30c22016f9766e627fccb5.exe 2012 Synaptics.exe 2012 Synaptics.exe 2012 Synaptics.exe 2012 Synaptics.exe 2012 Synaptics.exe 2012 Synaptics.exe 2012 Synaptics.exe 2012 Synaptics.exe 3004 powershell.exe 1360 powershell.exe 2012 Synaptics.exe 1640 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2656 ded424937a30c22016f9766e627fccb5.exe Token: SeDebugPrivilege 2800 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 2504 ._cache_ded424937a30c22016f9766e627fccb5.exe Token: SeDebugPrivilege 2012 Synaptics.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 1360 powershell.exe Token: SeDebugPrivilege 1640 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1656 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2800 2656 ded424937a30c22016f9766e627fccb5.exe 30 PID 2656 wrote to memory of 2800 2656 ded424937a30c22016f9766e627fccb5.exe 30 PID 2656 wrote to memory of 2800 2656 ded424937a30c22016f9766e627fccb5.exe 30 PID 2656 wrote to memory of 2800 2656 ded424937a30c22016f9766e627fccb5.exe 30 PID 2656 wrote to memory of 2560 2656 ded424937a30c22016f9766e627fccb5.exe 32 PID 2656 wrote to memory of 2560 2656 ded424937a30c22016f9766e627fccb5.exe 32 PID 2656 wrote to memory of 2560 2656 ded424937a30c22016f9766e627fccb5.exe 32 PID 2656 wrote to memory of 2560 2656 ded424937a30c22016f9766e627fccb5.exe 32 PID 2656 wrote to memory of 2592 2656 ded424937a30c22016f9766e627fccb5.exe 33 PID 2656 wrote to memory of 2592 2656 ded424937a30c22016f9766e627fccb5.exe 33 PID 2656 wrote to memory of 2592 2656 ded424937a30c22016f9766e627fccb5.exe 33 PID 2656 wrote to memory of 2592 2656 ded424937a30c22016f9766e627fccb5.exe 33 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 2656 wrote to memory of 1272 2656 ded424937a30c22016f9766e627fccb5.exe 36 PID 1272 wrote to memory of 2504 1272 ded424937a30c22016f9766e627fccb5.exe 37 PID 1272 wrote to memory of 2504 1272 ded424937a30c22016f9766e627fccb5.exe 37 PID 1272 wrote to memory of 2504 1272 ded424937a30c22016f9766e627fccb5.exe 37 PID 1272 wrote to memory of 2504 1272 ded424937a30c22016f9766e627fccb5.exe 37 PID 1272 wrote to memory of 2012 1272 ded424937a30c22016f9766e627fccb5.exe 38 PID 1272 wrote to memory of 2012 1272 ded424937a30c22016f9766e627fccb5.exe 38 PID 1272 wrote to memory of 2012 1272 ded424937a30c22016f9766e627fccb5.exe 38 PID 1272 wrote to memory of 2012 1272 ded424937a30c22016f9766e627fccb5.exe 38 PID 2012 wrote to memory of 3004 2012 Synaptics.exe 39 PID 2012 wrote to memory of 3004 2012 Synaptics.exe 39 PID 2012 wrote to memory of 3004 2012 Synaptics.exe 39 PID 2012 wrote to memory of 3004 2012 Synaptics.exe 39 PID 2012 wrote to memory of 1360 2012 Synaptics.exe 41 PID 2012 wrote to memory of 1360 2012 Synaptics.exe 41 PID 2012 wrote to memory of 1360 2012 Synaptics.exe 41 PID 2012 wrote to memory of 1360 2012 Synaptics.exe 41 PID 2012 wrote to memory of 1944 2012 Synaptics.exe 43 PID 2012 wrote to memory of 1944 2012 Synaptics.exe 43 PID 2012 wrote to memory of 1944 2012 Synaptics.exe 43 PID 2012 wrote to memory of 1944 2012 Synaptics.exe 43 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 2012 wrote to memory of 1544 2012 Synaptics.exe 45 PID 1544 wrote to memory of 1640 1544 Synaptics.exe 46 PID 1544 wrote to memory of 1640 1544 Synaptics.exe 46 PID 1544 wrote to memory of 1640 1544 Synaptics.exe 46 PID 1544 wrote to memory of 1640 1544 Synaptics.exe 46 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC0CF.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\._cache_ded424937a30c22016f9766e627fccb5.exe"C:\Users\Admin\AppData\Local\Temp\._cache_ded424937a30c22016f9766e627fccb5.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3B7A.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1944
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1640
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1656
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.8MB
MD5ded424937a30c22016f9766e627fccb5
SHA1c073e74f656a7c5c0a74cc1cae3d059ae6715204
SHA25681694e7be43cf7bbe907aa1a152951ae3d0e665782485fb0915a6c146b63dde6
SHA5122a387db31c91bc6b212a99323f47f4ae37d37570bc2ea497a5d01f4ac99ed397d669c66ff01ed8f100b4b3f0d0a113de68f102b0e59a8aa569fd050b3502ef27
-
Filesize
1KB
MD5f014f894e0d2d53e24e89512a0f034b1
SHA1f1ea7e6ae19a4e55f3c45b6a928807d18cc1a6f2
SHA256a63a53cfaf8a8d9c419f13cc9de620e1bb821da17a087c04919e6f09059b9238
SHA512617baa25cbcc4eb76784a69e03581a9686ced40a766ea820b81b6c4f3be1af5ebf9ad523d74dd7d7ef671cdf0b2c84195fc099f43bc62b8f8696a3fb11f517e5
-
Filesize
24KB
MD54a3d80866aad48333c56a7ae3e8aad69
SHA1f4039589781e46d71241c581a0d7c5470d793df5
SHA256dae64f623dee31ae9698d7a80ae69039077aa4f8b06698fae214355f0a2a28b4
SHA512b9bac8e6bae6804aa8d781d1549272600d79e2561553ae64b4211364a5307801587b810b9f3511a6603ea6767100d9d6a167424b31137330c13461103c5f0ed4
-
Filesize
31KB
MD5f9636ce1942717ed467be5f95bf8075c
SHA1129b8410690649c1764ef15c2dc0d78b82b98489
SHA256b7fdf4bddc3fc208e6b5edaccac93b3bd68586eb4f97cce961cdc4bdb5f0e9e2
SHA5123441560793bbbbcef282a695cee17a3d114551cf4d6317f36a211d4c44f53f14275f64235ba9caa84c56bb8b0541b6dac6e248ca0e1d5f282a294b4f095c8770
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
28KB
MD5e55bfd9fc76f48b40009e2fb705c47f4
SHA177f1b375c9bf10ba91ec5d32f70ae6657a594236
SHA256d1badc0c036b1cb0842ddfaa098a04e4b3c04a2228c5a952b6b441b7e220a462
SHA512cedea69c09820bb4ba404945b3ae3ae921ca9a79a4a04fa4247426b6befa13092a55354768769108029090a8af955b5a3485bcc2e7b434fba770d940870343f7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56935d4cb257734cd3fcc06b263c4a5d7
SHA151c9695198544c960b91c32ee41fe760c6b6bf05
SHA256a4438adaf780e7d68d0f7fddf54c8c7cdef726de3ff5aef57cada17cac1db11c
SHA512f53dc58a8fce2f2216bbff5c5cef5da3a4c86c1a5d00d7960e8bd65d1e2a5f10f3626f0d4ed377baf18561caee65252d7705abd9a3e0daabf18e7b9abf6cded0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c831c553c7b58765936beca4a9de7563
SHA1b75d4487a73acad198b62a183ec81cd300da1f29
SHA2564ae6bdb88a15abd73a5def4df0cd3fce9e579bd3e69a4f48b034212ffe75b3e4
SHA512bcf1846aaec108f8a251e00edccabbdd73441e44ba1e921dbd3d374eb8fc2490ac77370e99ab74dc499076c99775c34dc9297dddfb6a5b3439cfa20ad0ad65e3
-
Filesize
91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b