Overview
overview
10Static
static
1043e3cf7f28...56.exe
windows7-x64
1043e3cf7f28...56.exe
windows10-2004-x64
10441b1668aa...5d.exe
windows7-x64
10441b1668aa...5d.exe
windows10-2004-x64
10442867883c...aa.exe
windows7-x64
10442867883c...aa.exe
windows10-2004-x64
10444561befc...24.exe
windows7-x64
8444561befc...24.exe
windows10-2004-x64
104454ceb491...79.exe
windows7-x64
104454ceb491...79.exe
windows10-2004-x64
104455bb88d2...82.exe
windows7-x64
104455bb88d2...82.exe
windows10-2004-x64
104478036b24...33.exe
windows7-x64
104478036b24...33.exe
windows10-2004-x64
1044936a5622...c4.exe
windows7-x64
744936a5622...c4.exe
windows10-2004-x64
1044a74f61ee...28.exe
windows7-x64
1044a74f61ee...28.exe
windows10-2004-x64
104502536cf4...2e.exe
windows7-x64
104502536cf4...2e.exe
windows10-2004-x64
1045031250d6...94.exe
windows7-x64
1045031250d6...94.exe
windows10-2004-x64
1045031a9738...74.exe
windows7-x64
745031a9738...74.exe
windows10-2004-x64
7450bef50c0...67.exe
windows7-x64
1450bef50c0...67.exe
windows10-2004-x64
1453d8a7000...22.exe
windows7-x64
10453d8a7000...22.exe
windows10-2004-x64
10454e6ce92c...08.exe
windows7-x64
10454e6ce92c...08.exe
windows10-2004-x64
1045707ca513...4f.exe
windows7-x64
745707ca513...4f.exe
windows10-2004-x64
7Analysis
-
max time kernel
138s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:10
Behavioral task
behavioral1
Sample
43e3cf7f28351d5c551164a74a93d356.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
43e3cf7f28351d5c551164a74a93d356.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
441b1668aa7980a3ec40cf151cea5f5d.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
441b1668aa7980a3ec40cf151cea5f5d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
442867883ccfe230ba518cbc7ccc1faa.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
442867883ccfe230ba518cbc7ccc1faa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
444561befcef7bad6bb899304fb31524.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
444561befcef7bad6bb899304fb31524.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
4454ceb4919130c9dd9ac71aefa53879.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
4454ceb4919130c9dd9ac71aefa53879.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
4455bb88d29981861dadef760040858a341c74e4bb39a4ae4007b4522f354382.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
4455bb88d29981861dadef760040858a341c74e4bb39a4ae4007b4522f354382.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
4478036b24730075b2da4b9c1a601533.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
4478036b24730075b2da4b9c1a601533.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
44936a5622329c67528012ecd4ad27c4.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
44936a5622329c67528012ecd4ad27c4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
44a74f61eef0e7cea8bf142172ed4228.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
44a74f61eef0e7cea8bf142172ed4228.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
4502536cf49aa03ba4a7b695d7eaef2e.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
4502536cf49aa03ba4a7b695d7eaef2e.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
45031250d699e08b14558e0a13a75d94.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
45031250d699e08b14558e0a13a75d94.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral23
Sample
45031a9738ccab5f9cf3a399c5ac0374.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
45031a9738ccab5f9cf3a399c5ac0374.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
450bef50c0fe86686e7577c80502e567.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
450bef50c0fe86686e7577c80502e567.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
453d8a70001855e0de88f95920eecd22.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
453d8a70001855e0de88f95920eecd22.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
454e6ce92c1c3a8c55164afd9b2d4f08.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
454e6ce92c1c3a8c55164afd9b2d4f08.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
45707ca513bf23cac8fe8c8f84507bcaee2fa236ec7a887c678b978bc560454f.exe
Resource
win7-20250207-en
Behavioral task
behavioral32
Sample
45707ca513bf23cac8fe8c8f84507bcaee2fa236ec7a887c678b978bc560454f.exe
Resource
win10v2004-20250314-en
General
-
Target
45031250d699e08b14558e0a13a75d94.exe
-
Size
16.1MB
-
MD5
45031250d699e08b14558e0a13a75d94
-
SHA1
f52f77522198079fef50d275d7b465b08741245f
-
SHA256
da9de4402f6983b7c93b6f30084b115e98f1c7603828922ff37cf6af9cccb9f9
-
SHA512
0b8e97999ffaf0b676b81dd0aeda0ec9a48f8dc982f7f3e380c91711ed30615e1d7502dfc9f8cef95efde5e979ef57feb76ae232f0ffe3419d8e2a0f133ea946
-
SSDEEP
393216:PGg4aXGg4amGg4aiGg4aiGg4aCGg4aOGg4aCGg4a6Gg4aKGg4aGGg4ayGg4a74:PH0QQwMwYoUg74
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2440 powershell.exe 2808 powershell.exe 2624 powershell.exe 2092 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 1728 ._cache_45031250d699e08b14558e0a13a75d94.exe 340 Synaptics.exe 828 Synaptics.exe 3040 ._cache_Synaptics.exe -
Loads dropped DLL 4 IoCs
pid Process 1660 45031250d699e08b14558e0a13a75d94.exe 1660 45031250d699e08b14558e0a13a75d94.exe 828 Synaptics.exe 828 Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_45031250d699e08b14558e0a13a75d94.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_45031250d699e08b14558e0a13a75d94.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_45031250d699e08b14558e0a13a75d94.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 45031250d699e08b14558e0a13a75d94.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 reallyfreegeoip.org 9 reallyfreegeoip.org 11 checkip.dyndns.org 19 reallyfreegeoip.org 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2316 set thread context of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 340 set thread context of 828 340 Synaptics.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45031250d699e08b14558e0a13a75d94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45031250d699e08b14558e0a13a75d94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_45031250d699e08b14558e0a13a75d94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2560 schtasks.exe 1704 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1612 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2316 45031250d699e08b14558e0a13a75d94.exe 2316 45031250d699e08b14558e0a13a75d94.exe 2316 45031250d699e08b14558e0a13a75d94.exe 2316 45031250d699e08b14558e0a13a75d94.exe 2316 45031250d699e08b14558e0a13a75d94.exe 2316 45031250d699e08b14558e0a13a75d94.exe 2316 45031250d699e08b14558e0a13a75d94.exe 2316 45031250d699e08b14558e0a13a75d94.exe 2316 45031250d699e08b14558e0a13a75d94.exe 2316 45031250d699e08b14558e0a13a75d94.exe 2624 powershell.exe 2808 powershell.exe 1728 ._cache_45031250d699e08b14558e0a13a75d94.exe 340 Synaptics.exe 340 Synaptics.exe 340 Synaptics.exe 340 Synaptics.exe 340 Synaptics.exe 340 Synaptics.exe 340 Synaptics.exe 340 Synaptics.exe 2092 powershell.exe 2440 powershell.exe 340 Synaptics.exe 3040 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2316 45031250d699e08b14558e0a13a75d94.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 1728 ._cache_45031250d699e08b14558e0a13a75d94.exe Token: SeDebugPrivilege 340 Synaptics.exe Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 3040 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1612 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2808 2316 45031250d699e08b14558e0a13a75d94.exe 30 PID 2316 wrote to memory of 2808 2316 45031250d699e08b14558e0a13a75d94.exe 30 PID 2316 wrote to memory of 2808 2316 45031250d699e08b14558e0a13a75d94.exe 30 PID 2316 wrote to memory of 2808 2316 45031250d699e08b14558e0a13a75d94.exe 30 PID 2316 wrote to memory of 2624 2316 45031250d699e08b14558e0a13a75d94.exe 32 PID 2316 wrote to memory of 2624 2316 45031250d699e08b14558e0a13a75d94.exe 32 PID 2316 wrote to memory of 2624 2316 45031250d699e08b14558e0a13a75d94.exe 32 PID 2316 wrote to memory of 2624 2316 45031250d699e08b14558e0a13a75d94.exe 32 PID 2316 wrote to memory of 2560 2316 45031250d699e08b14558e0a13a75d94.exe 34 PID 2316 wrote to memory of 2560 2316 45031250d699e08b14558e0a13a75d94.exe 34 PID 2316 wrote to memory of 2560 2316 45031250d699e08b14558e0a13a75d94.exe 34 PID 2316 wrote to memory of 2560 2316 45031250d699e08b14558e0a13a75d94.exe 34 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 2316 wrote to memory of 1660 2316 45031250d699e08b14558e0a13a75d94.exe 36 PID 1660 wrote to memory of 1728 1660 45031250d699e08b14558e0a13a75d94.exe 37 PID 1660 wrote to memory of 1728 1660 45031250d699e08b14558e0a13a75d94.exe 37 PID 1660 wrote to memory of 1728 1660 45031250d699e08b14558e0a13a75d94.exe 37 PID 1660 wrote to memory of 1728 1660 45031250d699e08b14558e0a13a75d94.exe 37 PID 1660 wrote to memory of 340 1660 45031250d699e08b14558e0a13a75d94.exe 38 PID 1660 wrote to memory of 340 1660 45031250d699e08b14558e0a13a75d94.exe 38 PID 1660 wrote to memory of 340 1660 45031250d699e08b14558e0a13a75d94.exe 38 PID 1660 wrote to memory of 340 1660 45031250d699e08b14558e0a13a75d94.exe 38 PID 340 wrote to memory of 2092 340 Synaptics.exe 39 PID 340 wrote to memory of 2092 340 Synaptics.exe 39 PID 340 wrote to memory of 2092 340 Synaptics.exe 39 PID 340 wrote to memory of 2092 340 Synaptics.exe 39 PID 340 wrote to memory of 2440 340 Synaptics.exe 41 PID 340 wrote to memory of 2440 340 Synaptics.exe 41 PID 340 wrote to memory of 2440 340 Synaptics.exe 41 PID 340 wrote to memory of 2440 340 Synaptics.exe 41 PID 340 wrote to memory of 1704 340 Synaptics.exe 43 PID 340 wrote to memory of 1704 340 Synaptics.exe 43 PID 340 wrote to memory of 1704 340 Synaptics.exe 43 PID 340 wrote to memory of 1704 340 Synaptics.exe 43 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 340 wrote to memory of 828 340 Synaptics.exe 45 PID 828 wrote to memory of 3040 828 Synaptics.exe 46 PID 828 wrote to memory of 3040 828 Synaptics.exe 46 PID 828 wrote to memory of 3040 828 Synaptics.exe 46 PID 828 wrote to memory of 3040 828 Synaptics.exe 46 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45031250d699e08b14558e0a13a75d94.exe"C:\Users\Admin\AppData\Local\Temp\45031250d699e08b14558e0a13a75d94.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\45031250d699e08b14558e0a13a75d94.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE2E0.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\45031250d699e08b14558e0a13a75d94.exe"C:\Users\Admin\AppData\Local\Temp\45031250d699e08b14558e0a13a75d94.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\._cache_45031250d699e08b14558e0a13a75d94.exe"C:\Users\Admin\AppData\Local\Temp\._cache_45031250d699e08b14558e0a13a75d94.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp67F7.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1704
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3040
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1612
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.1MB
MD545031250d699e08b14558e0a13a75d94
SHA1f52f77522198079fef50d275d7b465b08741245f
SHA256da9de4402f6983b7c93b6f30084b115e98f1c7603828922ff37cf6af9cccb9f9
SHA5120b8e97999ffaf0b676b81dd0aeda0ec9a48f8dc982f7f3e380c91711ed30615e1d7502dfc9f8cef95efde5e979ef57feb76ae232f0ffe3419d8e2a0f133ea946
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD5abdd7ecd00f7b2a0b28a101a6c2f6341
SHA1348a8fb9fa765cf3d7d212403bc825239465fa2a
SHA256998fb2c1432a18dcffa62687a8f240917739b40290d6847a135ea81c9b751a47
SHA51239ee5c5d26804e4c332f7e684987f5da605c0a2854a8c28547bb186f30a7091390fd027f77289eafc89e630e520ddf46599ffba9e0b2637bae96728c14be56d5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RDKGPY6M2DFSSD6O7H55.temp
Filesize7KB
MD5c87218f4c627f6756223c948cc2e1249
SHA11afda6d0f352952a12323407537f33366b837ca3
SHA2568dc4034cda6b9dd369a380858c85276e20fadc4f252d77145d8a47f79a9162f1
SHA512daf65e27db19251e82b8e8222001bac152cf4bbb31a34d3fbbda28bfd31169d1e253b077571ba6a588751458fcfe524f85be7348ce2e2c5452c3524a9a597bc2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD555aedb92b6562de8d88d61382dd639ac
SHA12d54c961da995578513cfa946309716c0bc5404f
SHA256b444eadee2fb711125aa7ac4cab65af8ec150dc9722690bb60b206d59acbf8c5
SHA5121e3b80c861c110346d3e289b7f8bbea47bef9c8835ee5e2aa77086833e7bdd318ca1c33edf7fe065fb1d9809105a8effeb940b005eb0c50d047c18a1727901aa
-
Filesize
91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b