Overview
overview
10Static
static
10ee5fd05cf5...c3.exe
windows7-x64
7ee5fd05cf5...c3.exe
windows10-2004-x64
7ee69b74300...91.exe
windows7-x64
10ee69b74300...91.exe
windows10-2004-x64
10ee907a3b63...42.exe
windows7-x64
10ee907a3b63...42.exe
windows10-2004-x64
10eea4dcd11b...6f.exe
windows7-x64
10eea4dcd11b...6f.exe
windows10-2004-x64
10eebe0a35fa...82.exe
windows7-x64
10eebe0a35fa...82.exe
windows10-2004-x64
10eee37b5af1...b0.exe
windows7-x64
10eee37b5af1...b0.exe
windows10-2004-x64
10eeeaec4088...b4.exe
windows7-x64
eeeaec4088...b4.exe
windows10-2004-x64
eeffb35d2a...98.exe
windows7-x64
10eeffb35d2a...98.exe
windows10-2004-x64
10ef1a8eac84...30.exe
windows7-x64
8ef1a8eac84...30.exe
windows10-2004-x64
8ef5d9dc508...d4.exe
windows7-x64
10ef5d9dc508...d4.exe
windows10-2004-x64
10ef9c94ed2f...f4.exe
windows7-x64
10ef9c94ed2f...f4.exe
windows10-2004-x64
10efa0bac8ed...d4.exe
windows7-x64
5efa0bac8ed...d4.exe
windows10-2004-x64
5efb13a6c7f...aa.exe
windows7-x64
7efb13a6c7f...aa.exe
windows10-2004-x64
7efbf15e364...42.exe
windows7-x64
7efbf15e364...42.exe
windows10-2004-x64
7efdcbe8680...47.exe
windows7-x64
7efdcbe8680...47.exe
windows10-2004-x64
7eff37c0a73...c5.exe
windows7-x64
10eff37c0a73...c5.exe
windows10-2004-x64
10Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:18
Behavioral task
behavioral1
Sample
ee5fd05cf5c85b15681d9d29faed9891e4fb86815f92bb3a816e2c7c191bbcc3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee5fd05cf5c85b15681d9d29faed9891e4fb86815f92bb3a816e2c7c191bbcc3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
ee69b743006be8b845c65756f0efdb91.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ee69b743006be8b845c65756f0efdb91.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
ee907a3b632b8f170f358fd622afba93c929176f32b3b6db0bc806a8a3cc2e42.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
eea4dcd11b7f7e40bb76cc5d43c0246f.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
eea4dcd11b7f7e40bb76cc5d43c0246f.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral9
Sample
eebe0a35fa5791aae284e3ecd38c0682.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
eebe0a35fa5791aae284e3ecd38c0682.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
eee37b5af157395dc54d091245c04e5be6bbd0ac63101d6016efedaab23afdb0.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
eee37b5af157395dc54d091245c04e5be6bbd0ac63101d6016efedaab23afdb0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
eeeaec4088574f6dede1eb2751e9a793293ea19c5e2f8a8dd4f470cc593febb4.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
eeeaec4088574f6dede1eb2751e9a793293ea19c5e2f8a8dd4f470cc593febb4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
eeffb35d2a79c3f83ee7c4a4500b1c98.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
eeffb35d2a79c3f83ee7c4a4500b1c98.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
ef1a8eac84dd9ea2c994351a14b9c6811260e765cb992411c3e4ace9ce289b30.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
ef1a8eac84dd9ea2c994351a14b9c6811260e765cb992411c3e4ace9ce289b30.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
ef5d9dc50867f0430aabd8e6696b76d4.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ef5d9dc50867f0430aabd8e6696b76d4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
ef9c94ed2f87a7be79dfaaa427604df4.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ef9c94ed2f87a7be79dfaaa427604df4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
efa0bac8ed96bc50c4cd73e16850cfd6cf7c6ba23f272d87e534eb7ac250d4d4.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
efa0bac8ed96bc50c4cd73e16850cfd6cf7c6ba23f272d87e534eb7ac250d4d4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
efb13a6c7f3b3923b440d094e7abe8aa.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
efb13a6c7f3b3923b440d094e7abe8aa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
efbf15e364864659166a08e05a57ab9442dff6c9ae950a3171de120c49dd0542.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
efbf15e364864659166a08e05a57ab9442dff6c9ae950a3171de120c49dd0542.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
efdcbe8680cf18754cb9d1895a148647.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
efdcbe8680cf18754cb9d1895a148647.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
eff37c0a73a6e26dacdcb0ed3001e2c5.exe
Resource
win7-20250207-en
Behavioral task
behavioral32
Sample
eff37c0a73a6e26dacdcb0ed3001e2c5.exe
Resource
win10v2004-20250314-en
General
-
Target
eeffb35d2a79c3f83ee7c4a4500b1c98.exe
-
Size
10.5MB
-
MD5
eeffb35d2a79c3f83ee7c4a4500b1c98
-
SHA1
f4e2377bfee4680bb00ee5134cfb860bb965d785
-
SHA256
55421d015184644cfa29fc2badf383443433ffc72fdbb24f57b341a29e07e90f
-
SHA512
f1630e3c82ad3bc3f969f96995fe545e383d7ed9dddc70afef907da70dcfbee405cbb7bb58307a12356e73404028a0f4b9467acfc19dd3ddba1fe054c8526c33
-
SSDEEP
196608:/Nsg4AMgAuNsg4AMgAMNsg4AMgA5Nsg4AMgARNsg4AMgANNsg4AMgABNsg4AMgAh:/Gg4a9Gg4anGg4aCGg4a2Gg4amGg4am0
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5612 powershell.exe 4544 powershell.exe 392 powershell.exe 4956 powershell.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 5528 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3012 Synaptics.exe 2460 Synaptics.exe 3136 Synaptics.exe 4368 ._cache_Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" eeffb35d2a79c3f83ee7c4a4500b1c98.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 reallyfreegeoip.org 70 reallyfreegeoip.org 43 checkip.dyndns.org 45 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3516 set thread context of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3012 set thread context of 3136 3012 Synaptics.exe 119 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ eeffb35d2a79c3f83ee7c4a4500b1c98.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4800 schtasks.exe 3880 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5088 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 5612 powershell.exe 5612 powershell.exe 4544 powershell.exe 4544 powershell.exe 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 5612 powershell.exe 4544 powershell.exe 5528 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe 5528 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe 3012 Synaptics.exe 3012 Synaptics.exe 3012 Synaptics.exe 3012 Synaptics.exe 3012 Synaptics.exe 3012 Synaptics.exe 3012 Synaptics.exe 3012 Synaptics.exe 392 powershell.exe 392 powershell.exe 4956 powershell.exe 4956 powershell.exe 3012 Synaptics.exe 3012 Synaptics.exe 3012 Synaptics.exe 3012 Synaptics.exe 392 powershell.exe 4956 powershell.exe 4368 ._cache_Synaptics.exe 4368 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe Token: SeDebugPrivilege 5612 powershell.exe Token: SeDebugPrivilege 4544 powershell.exe Token: SeDebugPrivilege 5528 ._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe Token: SeDebugPrivilege 3012 Synaptics.exe Token: SeDebugPrivilege 392 powershell.exe Token: SeDebugPrivilege 4956 powershell.exe Token: SeDebugPrivilege 4368 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE 5088 EXCEL.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 3516 wrote to memory of 5612 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 97 PID 3516 wrote to memory of 5612 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 97 PID 3516 wrote to memory of 5612 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 97 PID 3516 wrote to memory of 4544 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 99 PID 3516 wrote to memory of 4544 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 99 PID 3516 wrote to memory of 4544 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 99 PID 3516 wrote to memory of 4800 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 101 PID 3516 wrote to memory of 4800 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 101 PID 3516 wrote to memory of 4800 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 101 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 3516 wrote to memory of 6108 3516 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 103 PID 6108 wrote to memory of 5528 6108 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 105 PID 6108 wrote to memory of 5528 6108 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 105 PID 6108 wrote to memory of 5528 6108 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 105 PID 6108 wrote to memory of 3012 6108 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 106 PID 6108 wrote to memory of 3012 6108 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 106 PID 6108 wrote to memory of 3012 6108 eeffb35d2a79c3f83ee7c4a4500b1c98.exe 106 PID 3012 wrote to memory of 392 3012 Synaptics.exe 112 PID 3012 wrote to memory of 392 3012 Synaptics.exe 112 PID 3012 wrote to memory of 392 3012 Synaptics.exe 112 PID 3012 wrote to memory of 4956 3012 Synaptics.exe 114 PID 3012 wrote to memory of 4956 3012 Synaptics.exe 114 PID 3012 wrote to memory of 4956 3012 Synaptics.exe 114 PID 3012 wrote to memory of 3880 3012 Synaptics.exe 115 PID 3012 wrote to memory of 3880 3012 Synaptics.exe 115 PID 3012 wrote to memory of 3880 3012 Synaptics.exe 115 PID 3012 wrote to memory of 2460 3012 Synaptics.exe 118 PID 3012 wrote to memory of 2460 3012 Synaptics.exe 118 PID 3012 wrote to memory of 2460 3012 Synaptics.exe 118 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3012 wrote to memory of 3136 3012 Synaptics.exe 119 PID 3136 wrote to memory of 4368 3136 Synaptics.exe 120 PID 3136 wrote to memory of 4368 3136 Synaptics.exe 120 PID 3136 wrote to memory of 4368 3136 Synaptics.exe 120 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeffb35d2a79c3f83ee7c4a4500b1c98.exe"C:\Users\Admin\AppData\Local\Temp\eeffb35d2a79c3f83ee7c4a4500b1c98.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\eeffb35d2a79c3f83ee7c4a4500b1c98.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2016.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\eeffb35d2a79c3f83ee7c4a4500b1c98.exe"C:\Users\Admin\AppData\Local\Temp\eeffb35d2a79c3f83ee7c4a4500b1c98.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:6108 -
C:\Users\Admin\AppData\Local\Temp\._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe"C:\Users\Admin\AppData\Local\Temp\._cache_eeffb35d2a79c3f83ee7c4a4500b1c98.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5528
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA563.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3880
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:2460
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4368
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5088
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.5MB
MD5eeffb35d2a79c3f83ee7c4a4500b1c98
SHA1f4e2377bfee4680bb00ee5134cfb860bb965d785
SHA25655421d015184644cfa29fc2badf383443433ffc72fdbb24f57b341a29e07e90f
SHA512f1630e3c82ad3bc3f969f96995fe545e383d7ed9dddc70afef907da70dcfbee405cbb7bb58307a12356e73404028a0f4b9467acfc19dd3ddba1fe054c8526c33
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5a2abc9cd86a4d859adebf2865800a478
SHA113386f49f03d2c3484ce379bf0a689f29fed0f43
SHA256246660e6b95ada69830ca73a88e9ee60f4b3f3a3b1bdfec64cdb238917c892fb
SHA5126eb85fea54d8e174fce8546ac6c58a295234e1ff8a1941bfc23a14ee6d5d48067af5b09d033d9cdda968c2dbf3291d3c147299339a8fe5004245898d3b4794d2
-
Filesize
18KB
MD570b6d426e37b3f71558940564613acf7
SHA17646f697abf2d9698d51b6adeef46d9d8711f810
SHA2566b61848c44a0df8f5b4d725af4fe7574986d66b6fb25fcd8eb85aed1406ddab4
SHA5127d73dcea8d0bc5ea6ee66be7edb6be79751c4b23a6ccf4c8ad1a5753cc12e07611827069eb0280e9c5ec5aff3fd36f22007bf09d06a4cf4d9937d006f7139061
-
Filesize
91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b
-
Filesize
25KB
MD58be04e308e09ac77ad77560eb6dd68f4
SHA1322fde2647b3d14c43ac385ddd2d9dc9950c42cc
SHA256b9d733548ece9768da545117aff955268fdcc0bbe5e8a059ac33c047c22b6d53
SHA512347e268247b1a3073bd11636e1035b48ef694e7715b471e7b2106c7456e2e00fb0897b654b8d68ceb0b57b73f9a4feeb8adc4cb8891757098e82c1296b199339
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5c6219afb8359ad58e1d48a9f55b6898c
SHA1fc1638c0b8b371ffd049fda4855d1c08338b8342
SHA256aa3b4a572e2a109cbf6f9aee84bba4c910988b573e292a4c67a58bc70a135b57
SHA51265a2b8fa59e34ee43000fc0f9a9807a1f78a8185e4e8dc49b9c576ec3252716e5910eaa1d1d0f51a72f33af7a85cc252123c94a285b6ca56b4898db814ce62b9
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04