Overview
overview
10Static
static
10ee5fd05cf5...c3.exe
windows7-x64
7ee5fd05cf5...c3.exe
windows10-2004-x64
7ee69b74300...91.exe
windows7-x64
10ee69b74300...91.exe
windows10-2004-x64
10ee907a3b63...42.exe
windows7-x64
10ee907a3b63...42.exe
windows10-2004-x64
10eea4dcd11b...6f.exe
windows7-x64
10eea4dcd11b...6f.exe
windows10-2004-x64
10eebe0a35fa...82.exe
windows7-x64
10eebe0a35fa...82.exe
windows10-2004-x64
10eee37b5af1...b0.exe
windows7-x64
10eee37b5af1...b0.exe
windows10-2004-x64
10eeeaec4088...b4.exe
windows7-x64
eeeaec4088...b4.exe
windows10-2004-x64
eeffb35d2a...98.exe
windows7-x64
10eeffb35d2a...98.exe
windows10-2004-x64
10ef1a8eac84...30.exe
windows7-x64
8ef1a8eac84...30.exe
windows10-2004-x64
8ef5d9dc508...d4.exe
windows7-x64
10ef5d9dc508...d4.exe
windows10-2004-x64
10ef9c94ed2f...f4.exe
windows7-x64
10ef9c94ed2f...f4.exe
windows10-2004-x64
10efa0bac8ed...d4.exe
windows7-x64
5efa0bac8ed...d4.exe
windows10-2004-x64
5efb13a6c7f...aa.exe
windows7-x64
7efb13a6c7f...aa.exe
windows10-2004-x64
7efbf15e364...42.exe
windows7-x64
7efbf15e364...42.exe
windows10-2004-x64
7efdcbe8680...47.exe
windows7-x64
7efdcbe8680...47.exe
windows10-2004-x64
7eff37c0a73...c5.exe
windows7-x64
10eff37c0a73...c5.exe
windows10-2004-x64
10Analysis
-
max time kernel
122s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:18
Behavioral task
behavioral1
Sample
ee5fd05cf5c85b15681d9d29faed9891e4fb86815f92bb3a816e2c7c191bbcc3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee5fd05cf5c85b15681d9d29faed9891e4fb86815f92bb3a816e2c7c191bbcc3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
ee69b743006be8b845c65756f0efdb91.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ee69b743006be8b845c65756f0efdb91.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
eea4dcd11b7f7e40bb76cc5d43c0246f.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
eea4dcd11b7f7e40bb76cc5d43c0246f.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
eebe0a35fa5791aae284e3ecd38c0682.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
eebe0a35fa5791aae284e3ecd38c0682.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
eee37b5af157395dc54d091245c04e5be6bbd0ac63101d6016efedaab23afdb0.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
eee37b5af157395dc54d091245c04e5be6bbd0ac63101d6016efedaab23afdb0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
eeeaec4088574f6dede1eb2751e9a793293ea19c5e2f8a8dd4f470cc593febb4.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
eeeaec4088574f6dede1eb2751e9a793293ea19c5e2f8a8dd4f470cc593febb4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
eeffb35d2a79c3f83ee7c4a4500b1c98.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
eeffb35d2a79c3f83ee7c4a4500b1c98.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
ef1a8eac84dd9ea2c994351a14b9c6811260e765cb992411c3e4ace9ce289b30.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
ef1a8eac84dd9ea2c994351a14b9c6811260e765cb992411c3e4ace9ce289b30.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ef5d9dc50867f0430aabd8e6696b76d4.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ef5d9dc50867f0430aabd8e6696b76d4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
ef9c94ed2f87a7be79dfaaa427604df4.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ef9c94ed2f87a7be79dfaaa427604df4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
efa0bac8ed96bc50c4cd73e16850cfd6cf7c6ba23f272d87e534eb7ac250d4d4.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
efa0bac8ed96bc50c4cd73e16850cfd6cf7c6ba23f272d87e534eb7ac250d4d4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
efb13a6c7f3b3923b440d094e7abe8aa.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
efb13a6c7f3b3923b440d094e7abe8aa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
efbf15e364864659166a08e05a57ab9442dff6c9ae950a3171de120c49dd0542.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
efbf15e364864659166a08e05a57ab9442dff6c9ae950a3171de120c49dd0542.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
efdcbe8680cf18754cb9d1895a148647.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
efdcbe8680cf18754cb9d1895a148647.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
eff37c0a73a6e26dacdcb0ed3001e2c5.exe
Resource
win7-20250207-en
Behavioral task
behavioral32
Sample
eff37c0a73a6e26dacdcb0ed3001e2c5.exe
Resource
win10v2004-20250314-en
General
-
Target
eeffb35d2a79c3f83ee7c4a4500b1c98.exe
-
Size
10.5MB
-
MD5
eeffb35d2a79c3f83ee7c4a4500b1c98
-
SHA1
f4e2377bfee4680bb00ee5134cfb860bb965d785
-
SHA256
55421d015184644cfa29fc2badf383443433ffc72fdbb24f57b341a29e07e90f
-
SHA512
f1630e3c82ad3bc3f969f96995fe545e383d7ed9dddc70afef907da70dcfbee405cbb7bb58307a12356e73404028a0f4b9467acfc19dd3ddba1fe054c8526c33
-
SSDEEP
196608:/Nsg4AMgAuNsg4AMgAMNsg4AMgA5Nsg4AMgARNsg4AMgANNsg4AMgABNsg4AMgAh:/Gg4a9Gg4anGg4aCGg4a2Gg4amGg4am0
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2884 powershell.exe 2856 powershell.exe 2976 powershell.exe 588 powershell.exe -
Executes dropped EXE 7 IoCs
pid Process 1624 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2808 Synaptics.exe 848 Synaptics.exe 1752 Synaptics.exe 1536 Synaptics.exe 596 Synaptics.exe 1524 Synaptics.exe -
Loads dropped DLL 2 IoCs
pid Process 2584 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2584 eeffb35d2a79c3f83ee7c4a4500b1c98.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" eeffb35d2a79c3f83ee7c4a4500b1c98.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2472 set thread context of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeffb35d2a79c3f83ee7c4a4500b1c98.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2292 schtasks.exe 2036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2856 powershell.exe 2884 powershell.exe 1624 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2976 powershell.exe 588 powershell.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe 2808 Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe Token: SeDebugPrivilege 2856 powershell.exe Token: SeDebugPrivilege 2884 powershell.exe Token: SeDebugPrivilege 1624 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe Token: SeDebugPrivilege 2808 Synaptics.exe Token: SeDebugPrivilege 2976 powershell.exe Token: SeDebugPrivilege 588 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2856 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 31 PID 2472 wrote to memory of 2856 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 31 PID 2472 wrote to memory of 2856 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 31 PID 2472 wrote to memory of 2856 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 31 PID 2472 wrote to memory of 2884 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 33 PID 2472 wrote to memory of 2884 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 33 PID 2472 wrote to memory of 2884 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 33 PID 2472 wrote to memory of 2884 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 33 PID 2472 wrote to memory of 2292 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 35 PID 2472 wrote to memory of 2292 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 35 PID 2472 wrote to memory of 2292 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 35 PID 2472 wrote to memory of 2292 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 35 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2472 wrote to memory of 2584 2472 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 37 PID 2584 wrote to memory of 1624 2584 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 38 PID 2584 wrote to memory of 1624 2584 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 38 PID 2584 wrote to memory of 1624 2584 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 38 PID 2584 wrote to memory of 1624 2584 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 38 PID 2584 wrote to memory of 2808 2584 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 39 PID 2584 wrote to memory of 2808 2584 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 39 PID 2584 wrote to memory of 2808 2584 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 39 PID 2584 wrote to memory of 2808 2584 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 39 PID 2808 wrote to memory of 588 2808 Synaptics.exe 40 PID 2808 wrote to memory of 588 2808 Synaptics.exe 40 PID 2808 wrote to memory of 588 2808 Synaptics.exe 40 PID 2808 wrote to memory of 588 2808 Synaptics.exe 40 PID 2808 wrote to memory of 2976 2808 Synaptics.exe 42 PID 2808 wrote to memory of 2976 2808 Synaptics.exe 42 PID 2808 wrote to memory of 2976 2808 Synaptics.exe 42 PID 2808 wrote to memory of 2976 2808 Synaptics.exe 42 PID 2808 wrote to memory of 2036 2808 Synaptics.exe 44 PID 2808 wrote to memory of 2036 2808 Synaptics.exe 44 PID 2808 wrote to memory of 2036 2808 Synaptics.exe 44 PID 2808 wrote to memory of 2036 2808 Synaptics.exe 44 PID 2808 wrote to memory of 848 2808 Synaptics.exe 46 PID 2808 wrote to memory of 848 2808 Synaptics.exe 46 PID 2808 wrote to memory of 848 2808 Synaptics.exe 46 PID 2808 wrote to memory of 848 2808 Synaptics.exe 46 PID 2808 wrote to memory of 1752 2808 Synaptics.exe 47 PID 2808 wrote to memory of 1752 2808 Synaptics.exe 47 PID 2808 wrote to memory of 1752 2808 Synaptics.exe 47 PID 2808 wrote to memory of 1752 2808 Synaptics.exe 47 PID 2808 wrote to memory of 1536 2808 Synaptics.exe 48 PID 2808 wrote to memory of 1536 2808 Synaptics.exe 48 PID 2808 wrote to memory of 1536 2808 Synaptics.exe 48 PID 2808 wrote to memory of 1536 2808 Synaptics.exe 48 PID 2808 wrote to memory of 596 2808 Synaptics.exe 49 PID 2808 wrote to memory of 596 2808 Synaptics.exe 49 PID 2808 wrote to memory of 596 2808 Synaptics.exe 49 PID 2808 wrote to memory of 596 2808 Synaptics.exe 49 PID 2808 wrote to memory of 1524 2808 Synaptics.exe 50 PID 2808 wrote to memory of 1524 2808 Synaptics.exe 50 PID 2808 wrote to memory of 1524 2808 Synaptics.exe 50 PID 2808 wrote to memory of 1524 2808 Synaptics.exe 50 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeffb35d2a79c3f83ee7c4a4500b1c98.exe"C:\Users\Admin\AppData\Local\Temp\eeffb35d2a79c3f83ee7c4a4500b1c98.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\eeffb35d2a79c3f83ee7c4a4500b1c98.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5792.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\eeffb35d2a79c3f83ee7c4a4500b1c98.exe"C:\Users\Admin\AppData\Local\Temp\eeffb35d2a79c3f83ee7c4a4500b1c98.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe"C:\Users\Admin\AppData\Local\Temp\._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1624
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD02B.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:848
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1752
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1536
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:596
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.5MB
MD5eeffb35d2a79c3f83ee7c4a4500b1c98
SHA1f4e2377bfee4680bb00ee5134cfb860bb965d785
SHA25655421d015184644cfa29fc2badf383443433ffc72fdbb24f57b341a29e07e90f
SHA512f1630e3c82ad3bc3f969f96995fe545e383d7ed9dddc70afef907da70dcfbee405cbb7bb58307a12356e73404028a0f4b9467acfc19dd3ddba1fe054c8526c33
-
Filesize
91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b
-
Filesize
1KB
MD59d72bca34262a2e7fba3de3a03c2e049
SHA1185c80e95fb884d857f3659b480c8c2d082c28a5
SHA256781e99a7459eae1031bf16603bf5ac31b442bdfbcec28521208e9629e3786306
SHA5125bce4ec0b0f2e801b69b88e7b1f03db25437ba36c753f7a5f511ea50b4cbac01c57d0208ad7f60d8741949ff5132ff933cc7ea14b848cf5cc56864c1a2e5ebe7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58050ace112ec6aadc4fa1d3b8a052917
SHA132902d77ca2b6c707e2d0d642dbb27dd4d7af5ce
SHA256ef88d31dfefe64e90246c3e756a17369e89014ede12d98f95e8f593376772f85
SHA51202d1f9217ff71af4d0e5f47fc04131cd913d3cbf121ee10e568c8cf1d518425a17e34ef6c71a69c17590efebf881f3af71dffa57eff6f7c4a1be7c508f661682
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c5ab548db6bebe42885c6169efe0fad4
SHA1de63d77a31879fa969b4ca5264666c3e5a68845a
SHA256bade19e1dfe8193c7000308b1d655a4e7bb91917bd612de10c5d4b931a2edf6f
SHA51284c5f34a475238ec6a62e93e8dcd8414ff3b5a3e6665a2fccae3f6b98fd45842b87f5c0dff3220b29df20c25e67244fa51768037d9fb48de5329bf6210700372