Overview
overview
10Static
static
10a6b7e1f8d9...13.exe
windows7-x64
10a6b7e1f8d9...13.exe
windows10-2004-x64
10a6d91e550d...6e.exe
windows7-x64
7a6d91e550d...6e.exe
windows10-2004-x64
7a72cdbd8e2...ad.exe
windows7-x64
10a72cdbd8e2...ad.exe
windows10-2004-x64
10a731427f52...04.exe
windows7-x64
6a731427f52...04.exe
windows10-2004-x64
6a73951d873...67.exe
windows7-x64
10a73951d873...67.exe
windows10-2004-x64
10a74be4d5e7...73.exe
windows7-x64
10a74be4d5e7...73.exe
windows10-2004-x64
10a77ff4e4dd...87.exe
windows7-x64
10a77ff4e4dd...87.exe
windows10-2004-x64
10a799e456ff...88.exe
windows7-x64
10a799e456ff...88.exe
windows10-2004-x64
10a7c49036eb...95.exe
windows7-x64
3a7c49036eb...95.exe
windows10-2004-x64
3a7d8553ba6...a8.exe
windows7-x64
7a7d8553ba6...a8.exe
windows10-2004-x64
7a7e953c880...28.exe
windows7-x64
10a7e953c880...28.exe
windows10-2004-x64
10a7ead69ceb...a3.exe
windows7-x64
9a7ead69ceb...a3.exe
windows10-2004-x64
9a7ec6d64b2...db.exe
windows7-x64
1a7ec6d64b2...db.exe
windows10-2004-x64
1a7fd5ae1f0...f8.exe
windows7-x64
10a7fd5ae1f0...f8.exe
windows10-2004-x64
10a884e586e0...e0.exe
windows7-x64
10a884e586e0...e0.exe
windows10-2004-x64
10a8b0399c70...33.exe
windows7-x64
10a8b0399c70...33.exe
windows10-2004-x64
10Analysis
-
max time kernel
139s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:15
Behavioral task
behavioral1
Sample
a6b7e1f8d965ec053cbb870a443d5513.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6b7e1f8d965ec053cbb870a443d5513.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
a6d91e550d33f9f64c5e292e47013b055f721bbc1865d3bfa5d89fe7f840586e.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
a6d91e550d33f9f64c5e292e47013b055f721bbc1865d3bfa5d89fe7f840586e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
a72cdbd8e2e58d49bac3da8f517b97ee8262cc6d54e21eadfacbf1df504a26ad.exe
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
a72cdbd8e2e58d49bac3da8f517b97ee8262cc6d54e21eadfacbf1df504a26ad.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
a731427f52bd2af065c7544d7f9ea804.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
a731427f52bd2af065c7544d7f9ea804.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
a73951d8730beba8a769c882801bd767.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
a73951d8730beba8a769c882801bd767.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
a74be4d5e7b154091b38338a6ac94973.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
a74be4d5e7b154091b38338a6ac94973.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
a77ff4e4dd651e4c89e2297a2a321987.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
a77ff4e4dd651e4c89e2297a2a321987.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
a799e456ff773d61953389e7fb322b88.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
a799e456ff773d61953389e7fb322b88.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
a7c49036ebf4784cc999d947c3350d466e1d4776671e2ce6bfa37c00013baf95.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
a7c49036ebf4784cc999d947c3350d466e1d4776671e2ce6bfa37c00013baf95.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
a7d8553ba6cb9193a197904239af5d2e7bc4c7015dce62660400968e54d94ba8.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
a7d8553ba6cb9193a197904239af5d2e7bc4c7015dce62660400968e54d94ba8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
a7ead69cebb4805f528bc566a9b4eea3.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
a7ead69cebb4805f528bc566a9b4eea3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
a7ec6d64b26a76d441ffbded59fdbfa4d8e54782f5d03cc03e436d444de883db.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
a7ec6d64b26a76d441ffbded59fdbfa4d8e54782f5d03cc03e436d444de883db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
a7fd5ae1f0d16e9069ca216d2f21ccf8.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
a7fd5ae1f0d16e9069ca216d2f21ccf8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
a884e586e04d1b213ef1db19e0226a0503109862aa3072c6ace8660c6a3f46e0.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
a884e586e04d1b213ef1db19e0226a0503109862aa3072c6ace8660c6a3f46e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
a8b0399c704553c85dfd0ab584536333.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
a8b0399c704553c85dfd0ab584536333.exe
Resource
win10v2004-20250314-en
General
-
Target
a799e456ff773d61953389e7fb322b88.exe
-
Size
20.2MB
-
MD5
a799e456ff773d61953389e7fb322b88
-
SHA1
ee4bb5e3ebfdb9a3a158b6e043ad8ad45405579e
-
SHA256
3f24ecfe09f50ca00f29c8617bc76f9b01785a2d86eaf16b34d46c60648ed32c
-
SHA512
5645160a60b98fa38fc2a278fe31290967368ec38df0b0b5ac6ca0fa1073518e7478888b4bbf13082a94d436567c53df04ba02b0265019ff61f7056f82b5f84a
-
SSDEEP
393216:SGg4aFGg4afGg4ahGg4aEGg4aJGg4akGg4a9Gg4aDGg4aKGg4aPGg4aLGg4aYGgf:AtfpyhSVzoPr2kyp
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2828 powershell.exe 2740 powershell.exe 2704 powershell.exe 1136 powershell.exe -
resource behavioral15/files/0x000600000001a469-164.dat -
Executes dropped EXE 4 IoCs
pid Process 2100 ._cache_a799e456ff773d61953389e7fb322b88.exe 1332 Synaptics.exe 1196 Synaptics.exe 2376 ._cache_Synaptics.exe -
Loads dropped DLL 4 IoCs
pid Process 3052 a799e456ff773d61953389e7fb322b88.exe 3052 a799e456ff773d61953389e7fb322b88.exe 1196 Synaptics.exe 1196 Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_a799e456ff773d61953389e7fb322b88.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a799e456ff773d61953389e7fb322b88.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org 19 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2240 set thread context of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 1332 set thread context of 1196 1332 Synaptics.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2804 schtasks.exe 2064 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2692 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2240 a799e456ff773d61953389e7fb322b88.exe 2240 a799e456ff773d61953389e7fb322b88.exe 2240 a799e456ff773d61953389e7fb322b88.exe 2240 a799e456ff773d61953389e7fb322b88.exe 2240 a799e456ff773d61953389e7fb322b88.exe 2240 a799e456ff773d61953389e7fb322b88.exe 2240 a799e456ff773d61953389e7fb322b88.exe 2240 a799e456ff773d61953389e7fb322b88.exe 2240 a799e456ff773d61953389e7fb322b88.exe 2828 powershell.exe 2740 powershell.exe 2100 ._cache_a799e456ff773d61953389e7fb322b88.exe 1332 Synaptics.exe 1332 Synaptics.exe 1332 Synaptics.exe 1332 Synaptics.exe 1332 Synaptics.exe 1332 Synaptics.exe 1332 Synaptics.exe 1332 Synaptics.exe 1136 powershell.exe 2704 powershell.exe 1332 Synaptics.exe 2376 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2240 a799e456ff773d61953389e7fb322b88.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 2740 powershell.exe Token: SeDebugPrivilege 2100 ._cache_a799e456ff773d61953389e7fb322b88.exe Token: SeDebugPrivilege 1332 Synaptics.exe Token: SeDebugPrivilege 1136 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 2376 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2828 2240 a799e456ff773d61953389e7fb322b88.exe 29 PID 2240 wrote to memory of 2828 2240 a799e456ff773d61953389e7fb322b88.exe 29 PID 2240 wrote to memory of 2828 2240 a799e456ff773d61953389e7fb322b88.exe 29 PID 2240 wrote to memory of 2828 2240 a799e456ff773d61953389e7fb322b88.exe 29 PID 2240 wrote to memory of 2740 2240 a799e456ff773d61953389e7fb322b88.exe 31 PID 2240 wrote to memory of 2740 2240 a799e456ff773d61953389e7fb322b88.exe 31 PID 2240 wrote to memory of 2740 2240 a799e456ff773d61953389e7fb322b88.exe 31 PID 2240 wrote to memory of 2740 2240 a799e456ff773d61953389e7fb322b88.exe 31 PID 2240 wrote to memory of 2804 2240 a799e456ff773d61953389e7fb322b88.exe 33 PID 2240 wrote to memory of 2804 2240 a799e456ff773d61953389e7fb322b88.exe 33 PID 2240 wrote to memory of 2804 2240 a799e456ff773d61953389e7fb322b88.exe 33 PID 2240 wrote to memory of 2804 2240 a799e456ff773d61953389e7fb322b88.exe 33 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 2240 wrote to memory of 3052 2240 a799e456ff773d61953389e7fb322b88.exe 35 PID 3052 wrote to memory of 2100 3052 a799e456ff773d61953389e7fb322b88.exe 36 PID 3052 wrote to memory of 2100 3052 a799e456ff773d61953389e7fb322b88.exe 36 PID 3052 wrote to memory of 2100 3052 a799e456ff773d61953389e7fb322b88.exe 36 PID 3052 wrote to memory of 2100 3052 a799e456ff773d61953389e7fb322b88.exe 36 PID 3052 wrote to memory of 1332 3052 a799e456ff773d61953389e7fb322b88.exe 37 PID 3052 wrote to memory of 1332 3052 a799e456ff773d61953389e7fb322b88.exe 37 PID 3052 wrote to memory of 1332 3052 a799e456ff773d61953389e7fb322b88.exe 37 PID 3052 wrote to memory of 1332 3052 a799e456ff773d61953389e7fb322b88.exe 37 PID 1332 wrote to memory of 2704 1332 Synaptics.exe 38 PID 1332 wrote to memory of 2704 1332 Synaptics.exe 38 PID 1332 wrote to memory of 2704 1332 Synaptics.exe 38 PID 1332 wrote to memory of 2704 1332 Synaptics.exe 38 PID 1332 wrote to memory of 1136 1332 Synaptics.exe 40 PID 1332 wrote to memory of 1136 1332 Synaptics.exe 40 PID 1332 wrote to memory of 1136 1332 Synaptics.exe 40 PID 1332 wrote to memory of 1136 1332 Synaptics.exe 40 PID 1332 wrote to memory of 2064 1332 Synaptics.exe 42 PID 1332 wrote to memory of 2064 1332 Synaptics.exe 42 PID 1332 wrote to memory of 2064 1332 Synaptics.exe 42 PID 1332 wrote to memory of 2064 1332 Synaptics.exe 42 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1332 wrote to memory of 1196 1332 Synaptics.exe 44 PID 1196 wrote to memory of 2376 1196 Synaptics.exe 45 PID 1196 wrote to memory of 2376 1196 Synaptics.exe 45 PID 1196 wrote to memory of 2376 1196 Synaptics.exe 45 PID 1196 wrote to memory of 2376 1196 Synaptics.exe 45 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a799e456ff773d61953389e7fb322b88.exe"C:\Users\Admin\AppData\Local\Temp\a799e456ff773d61953389e7fb322b88.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a799e456ff773d61953389e7fb322b88.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7C41.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\a799e456ff773d61953389e7fb322b88.exe"C:\Users\Admin\AppData\Local\Temp\a799e456ff773d61953389e7fb322b88.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\._cache_a799e456ff773d61953389e7fb322b88.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a799e456ff773d61953389e7fb322b88.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3F.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2064
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2376
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2692
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.2MB
MD5a799e456ff773d61953389e7fb322b88
SHA1ee4bb5e3ebfdb9a3a158b6e043ad8ad45405579e
SHA2563f24ecfe09f50ca00f29c8617bc76f9b01785a2d86eaf16b34d46c60648ed32c
SHA5125645160a60b98fa38fc2a278fe31290967368ec38df0b0b5ac6ca0fa1073518e7478888b4bbf13082a94d436567c53df04ba02b0265019ff61f7056f82b5f84a
-
Filesize
91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b
-
Filesize
21KB
MD5ff58db009d240f2ff0d725b5857aa89b
SHA1736ac442a05d646b4d2f5e51ef8c13d917438a87
SHA256b951dbceb2b784e790330fb1828a1aaf25c214d4dc27644db72dce741b557906
SHA512c8b982dff97e53ef456520eb843bb717a491f79f122a83c4e3520db2f63e364a74819ccf5aae07f4740f485992ef2714d27e4676d90bedbf72062482c34925ac
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
25KB
MD57f309f4fe8458f65abb524e25d601be6
SHA19dcd31c91a6f08e1cc990c09af188f55396acc3b
SHA256307464933b1d1be17224ef6a9561b6a1b786360fb0ab4d9295a6999bf77bd7b6
SHA512f1747e31a8581d8eb3bcd7bc6c695303160d85008dbed1171cfb619388cda08610e4c378c9210ba4144cdbccfb16e41f1256f2f0113f706ad12847c46b0561e0
-
Filesize
23KB
MD5aed9ab28c653317fa97c8f7a7a1ae966
SHA1cfdd8a98d50020e9c8657a3f859af9d15d606da5
SHA25634ad73a3af0b318f71e2cf7e2f4e634a46ff2a588c6e4d42b3010c985a181ed2
SHA512dc4148da307db1fa626465cf62e29c52245df8d05d19844d8cbd7a0075d37a909d012d7d0d68647c54859957fea3cd4b30af94a8a31cefce3093aa922b3d575e
-
Filesize
1KB
MD5abdd7ecd00f7b2a0b28a101a6c2f6341
SHA1348a8fb9fa765cf3d7d212403bc825239465fa2a
SHA256998fb2c1432a18dcffa62687a8f240917739b40290d6847a135ea81c9b751a47
SHA51239ee5c5d26804e4c332f7e684987f5da605c0a2854a8c28547bb186f30a7091390fd027f77289eafc89e630e520ddf46599ffba9e0b2637bae96728c14be56d5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD545f3b89430be2bef4f042a110aabbf00
SHA19106f8d9908d9bcd52153ea46c7ab8f10d4eaa3e
SHA256931eaab2df74297b4b32e52752ee37b1b32619d08d680060c2c9856011fb03be
SHA5125bd750ab35226aa94dd1971109ffc557cfcfda8a6461d16f8419aa945b360ded9192f41ffddf3d4d7f4db6222b8ec43603b345e4fff2d5b8980669d585fea44f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD57ddf18b7881eec8ffd69ff4c8db7fbf1
SHA14d23f8b50eb3de5fd44db3cd944ff5f4028a0f20
SHA2565c14e24cb9bad6530eed14ac37eb05105d1a2e965a89d2d35899292e477ac679
SHA5124cf320120095c636f85f30e2da03e5bf13d32b358f85f8d5966625214a5d37b8b937169d3356c67285803a5afa6e8c3c74824bb8bde55eeef186ac788d265853