Overview
overview
10Static
static
10de1299d65e...07.exe
windows7-x64
10de1299d65e...07.exe
windows10-2004-x64
10de3206bd13...8d.exe
windows7-x64
8de3206bd13...8d.exe
windows10-2004-x64
8de41dac906...f2.exe
windows7-x64
10de41dac906...f2.exe
windows10-2004-x64
10de55ad6fba...fe.exe
windows7-x64
10de55ad6fba...fe.exe
windows10-2004-x64
10de7c6ded50...6f.exe
windows7-x64
10de7c6ded50...6f.exe
windows10-2004-x64
10de85b03beb...f7.exe
windows7-x64
10de85b03beb...f7.exe
windows10-2004-x64
10de8984199c...45.exe
windows7-x64
10de8984199c...45.exe
windows10-2004-x64
10deb9b3528e...91.exe
windows7-x64
10deb9b3528e...91.exe
windows10-2004-x64
10dec0fc30b5...d0.exe
windows7-x64
10dec0fc30b5...d0.exe
windows10-2004-x64
10ded424937a...b5.exe
windows7-x64
10ded424937a...b5.exe
windows10-2004-x64
10defcdae3dc...64.exe
windows7-x64
10defcdae3dc...64.exe
windows10-2004-x64
10df04d21f8f...1c.exe
windows7-x64
10df04d21f8f...1c.exe
windows10-2004-x64
10df0e554958...e9.exe
windows7-x64
7df0e554958...e9.exe
windows10-2004-x64
7df35e63228...2e.exe
windows7-x64
10df35e63228...2e.exe
windows10-2004-x64
10df43aaf53c...31.exe
windows7-x64
8df43aaf53c...31.exe
windows10-2004-x64
8df9cc0d83f...35.exe
windows7-x64
7df9cc0d83f...35.exe
windows10-2004-x64
7Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:17
Behavioral task
behavioral1
Sample
de1299d65e55eeb63ddc8320cafe3f07.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de1299d65e55eeb63ddc8320cafe3f07.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
de3206bd1391c2d6e3dda6c031db8f8298a2a97ecad547adb06ebe31d2d00c8d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
de41dac906b1f4218d2cf3e93d994af2.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
de41dac906b1f4218d2cf3e93d994af2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
de55ad6fba2d168ad7a56c2c2f71d119b5912b6c1653e3b77f8a9773626d11fe.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
de55ad6fba2d168ad7a56c2c2f71d119b5912b6c1653e3b77f8a9773626d11fe.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
de7c6ded508e6b46e7f6b385572c426f.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
de7c6ded508e6b46e7f6b385572c426f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
de85b03bebfb919df53912cb0ca84af7.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
de85b03bebfb919df53912cb0ca84af7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
de8984199cea928c5ce0773ce065a545.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
de8984199cea928c5ce0773ce065a545.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
deb9b3528e54334bf14621892e130791.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
deb9b3528e54334bf14621892e130791.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
dec0fc30b53f55787ffb4b054bd59fb796c9f2d43dc8d56ab749215f05957fd0.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
dec0fc30b53f55787ffb4b054bd59fb796c9f2d43dc8d56ab749215f05957fd0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ded424937a30c22016f9766e627fccb5.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
ded424937a30c22016f9766e627fccb5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
defcdae3dc9e03410d78ef0ab357f764.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
defcdae3dc9e03410d78ef0ab357f764.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
df04d21f8f4edc307cb444b18e8f201c.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
df04d21f8f4edc307cb444b18e8f201c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
df0e554958405ce1e7b15ab03585cce9.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
df0e554958405ce1e7b15ab03585cce9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
df35e63228a07a080a53b1bd5b62de3a09337c7d3c2eeef01adf41de434da82e.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
df35e63228a07a080a53b1bd5b62de3a09337c7d3c2eeef01adf41de434da82e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
df43aaf53cf823766f98d138827f3931.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
df43aaf53cf823766f98d138827f3931.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
df9cc0d83fdf3053b95b91afe74fa035.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
df9cc0d83fdf3053b95b91afe74fa035.exe
Resource
win10v2004-20250314-en
General
-
Target
ded424937a30c22016f9766e627fccb5.exe
-
Size
13.8MB
-
MD5
ded424937a30c22016f9766e627fccb5
-
SHA1
c073e74f656a7c5c0a74cc1cae3d059ae6715204
-
SHA256
81694e7be43cf7bbe907aa1a152951ae3d0e665782485fb0915a6c146b63dde6
-
SHA512
2a387db31c91bc6b212a99323f47f4ae37d37570bc2ea497a5d01f4ac99ed397d669c66ff01ed8f100b4b3f0d0a113de68f102b0e59a8aa569fd050b3502ef27
-
SSDEEP
393216:hGg4aNGg4aeGg4aMGg4avGg4a5Gg4aFGg4aYGg4aWGg4aEGg4an:plcKvRt2kyn
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3048 powershell.exe 4248 powershell.exe 3208 powershell.exe 1672 powershell.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation ded424937a30c22016f9766e627fccb5.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation ded424937a30c22016f9766e627fccb5.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 3816 ._cache_ded424937a30c22016f9766e627fccb5.exe 4820 Synaptics.exe 4644 Synaptics.exe 1948 Synaptics.exe 1476 ._cache_Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" ded424937a30c22016f9766e627fccb5.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 checkip.dyndns.org 44 reallyfreegeoip.org 45 reallyfreegeoip.org 76 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4900 set thread context of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4820 set thread context of 1948 4820 Synaptics.exe 120 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_ded424937a30c22016f9766e627fccb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ded424937a30c22016f9766e627fccb5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2744 schtasks.exe 2872 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3220 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 3048 powershell.exe 4248 powershell.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4900 ded424937a30c22016f9766e627fccb5.exe 4248 powershell.exe 3048 powershell.exe 3816 ._cache_ded424937a30c22016f9766e627fccb5.exe 4820 Synaptics.exe 4820 Synaptics.exe 4820 Synaptics.exe 4820 Synaptics.exe 4820 Synaptics.exe 4820 Synaptics.exe 4820 Synaptics.exe 4820 Synaptics.exe 3208 powershell.exe 4820 Synaptics.exe 4820 Synaptics.exe 4820 Synaptics.exe 4820 Synaptics.exe 1672 powershell.exe 1672 powershell.exe 3208 powershell.exe 1672 powershell.exe 1476 ._cache_Synaptics.exe 1476 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4900 ded424937a30c22016f9766e627fccb5.exe Token: SeDebugPrivilege 3048 powershell.exe Token: SeDebugPrivilege 4248 powershell.exe Token: SeDebugPrivilege 3816 ._cache_ded424937a30c22016f9766e627fccb5.exe Token: SeDebugPrivilege 4820 Synaptics.exe Token: SeDebugPrivilege 3208 powershell.exe Token: SeDebugPrivilege 1672 powershell.exe Token: SeDebugPrivilege 1476 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE 3220 EXCEL.EXE -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 4900 wrote to memory of 3048 4900 ded424937a30c22016f9766e627fccb5.exe 96 PID 4900 wrote to memory of 3048 4900 ded424937a30c22016f9766e627fccb5.exe 96 PID 4900 wrote to memory of 3048 4900 ded424937a30c22016f9766e627fccb5.exe 96 PID 4900 wrote to memory of 4248 4900 ded424937a30c22016f9766e627fccb5.exe 98 PID 4900 wrote to memory of 4248 4900 ded424937a30c22016f9766e627fccb5.exe 98 PID 4900 wrote to memory of 4248 4900 ded424937a30c22016f9766e627fccb5.exe 98 PID 4900 wrote to memory of 2744 4900 ded424937a30c22016f9766e627fccb5.exe 100 PID 4900 wrote to memory of 2744 4900 ded424937a30c22016f9766e627fccb5.exe 100 PID 4900 wrote to memory of 2744 4900 ded424937a30c22016f9766e627fccb5.exe 100 PID 4900 wrote to memory of 404 4900 ded424937a30c22016f9766e627fccb5.exe 102 PID 4900 wrote to memory of 404 4900 ded424937a30c22016f9766e627fccb5.exe 102 PID 4900 wrote to memory of 404 4900 ded424937a30c22016f9766e627fccb5.exe 102 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 4900 wrote to memory of 3928 4900 ded424937a30c22016f9766e627fccb5.exe 103 PID 3928 wrote to memory of 3816 3928 ded424937a30c22016f9766e627fccb5.exe 105 PID 3928 wrote to memory of 3816 3928 ded424937a30c22016f9766e627fccb5.exe 105 PID 3928 wrote to memory of 3816 3928 ded424937a30c22016f9766e627fccb5.exe 105 PID 3928 wrote to memory of 4820 3928 ded424937a30c22016f9766e627fccb5.exe 107 PID 3928 wrote to memory of 4820 3928 ded424937a30c22016f9766e627fccb5.exe 107 PID 3928 wrote to memory of 4820 3928 ded424937a30c22016f9766e627fccb5.exe 107 PID 4820 wrote to memory of 3208 4820 Synaptics.exe 113 PID 4820 wrote to memory of 3208 4820 Synaptics.exe 113 PID 4820 wrote to memory of 3208 4820 Synaptics.exe 113 PID 4820 wrote to memory of 1672 4820 Synaptics.exe 115 PID 4820 wrote to memory of 1672 4820 Synaptics.exe 115 PID 4820 wrote to memory of 1672 4820 Synaptics.exe 115 PID 4820 wrote to memory of 2872 4820 Synaptics.exe 117 PID 4820 wrote to memory of 2872 4820 Synaptics.exe 117 PID 4820 wrote to memory of 2872 4820 Synaptics.exe 117 PID 4820 wrote to memory of 4644 4820 Synaptics.exe 119 PID 4820 wrote to memory of 4644 4820 Synaptics.exe 119 PID 4820 wrote to memory of 4644 4820 Synaptics.exe 119 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 4820 wrote to memory of 1948 4820 Synaptics.exe 120 PID 1948 wrote to memory of 1476 1948 Synaptics.exe 121 PID 1948 wrote to memory of 1476 1948 Synaptics.exe 121 PID 1948 wrote to memory of 1476 1948 Synaptics.exe 121 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp396A.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"2⤵PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"C:\Users\Admin\AppData\Local\Temp\ded424937a30c22016f9766e627fccb5.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\._cache_ded424937a30c22016f9766e627fccb5.exe"C:\Users\Admin\AppData\Local\Temp\._cache_ded424937a30c22016f9766e627fccb5.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBCD3.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2872
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:4644
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1476
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3220
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.8MB
MD5ded424937a30c22016f9766e627fccb5
SHA1c073e74f656a7c5c0a74cc1cae3d059ae6715204
SHA25681694e7be43cf7bbe907aa1a152951ae3d0e665782485fb0915a6c146b63dde6
SHA5122a387db31c91bc6b212a99323f47f4ae37d37570bc2ea497a5d01f4ac99ed397d669c66ff01ed8f100b4b3f0d0a113de68f102b0e59a8aa569fd050b3502ef27
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD55bf963c8983c0c90703cdd6bddfd8843
SHA1127e011fcb17913154febd5039577e7267b8318b
SHA2569880cc13d6c6512a79196c6798b572c748fb310e6ae72c623038429e7bc267e8
SHA512fda429e95148f3db25d9ac3bb39a3554c7bc3e258c2abd0ef52cfd9594745cb7dfc790fc82caab4013d6add64adc16995601b7d18407ce8aa991f4ef5e2700be
-
Filesize
18KB
MD500f72ef65c725d14e743c4b40103f4f9
SHA14d660a70578bcb5d2212360d34fba67ae9768473
SHA2568299580acb1f8ac75c38c72cc5784d659992c45cf28cf649f1b39defdc045338
SHA512501f6390c72705144eb90fd3cb18793ee7340cb4b067ef08538579d5142741c6bb47e6ae32d19c81cb0309f7875661e1285641a4243759a411b7db40d7845588
-
Filesize
91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
26KB
MD551ef2deb7ee6c1b3c1abfc27546c5440
SHA1780523a871b28dbc88794b9291a8219645655772
SHA256887ac4e7ba521452a92f65e974709ade6c8fe6af59b8b2917eb78f1820a81b00
SHA5128885823c66cf3ceb4c88ad6a25ae56a669fcbbebfb8565f2892b7c6b8a9b87454d9a8bed228a07364ad5889f0ccc1dfae91ba443737aef91c951f8bfe6e8ff00
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5b8d0c9983df15bb6461ab648d8a3941e
SHA1497df7a240408c9fb891f69ddb54b924632357ee
SHA25631d53aa920c37251d34f6b5173f53f0d6beda6e5515f9cd1050a4517f539b1cb
SHA51238228490f35efb2c3b839109c9c5d274516b507ba7e074626a809bb1faa395c4b4ef527481cf49483e20086a4a1b78f4761dde235d1fcbfc4cc6da09f1b40b82