Overview
overview
10Static
static
10a6b7e1f8d9...13.exe
windows7-x64
10a6b7e1f8d9...13.exe
windows10-2004-x64
10a6d91e550d...6e.exe
windows7-x64
7a6d91e550d...6e.exe
windows10-2004-x64
7a72cdbd8e2...ad.exe
windows7-x64
10a72cdbd8e2...ad.exe
windows10-2004-x64
10a731427f52...04.exe
windows7-x64
6a731427f52...04.exe
windows10-2004-x64
6a73951d873...67.exe
windows7-x64
10a73951d873...67.exe
windows10-2004-x64
10a74be4d5e7...73.exe
windows7-x64
10a74be4d5e7...73.exe
windows10-2004-x64
10a77ff4e4dd...87.exe
windows7-x64
10a77ff4e4dd...87.exe
windows10-2004-x64
10a799e456ff...88.exe
windows7-x64
10a799e456ff...88.exe
windows10-2004-x64
10a7c49036eb...95.exe
windows7-x64
3a7c49036eb...95.exe
windows10-2004-x64
3a7d8553ba6...a8.exe
windows7-x64
7a7d8553ba6...a8.exe
windows10-2004-x64
7a7e953c880...28.exe
windows7-x64
10a7e953c880...28.exe
windows10-2004-x64
10a7ead69ceb...a3.exe
windows7-x64
9a7ead69ceb...a3.exe
windows10-2004-x64
9a7ec6d64b2...db.exe
windows7-x64
1a7ec6d64b2...db.exe
windows10-2004-x64
1a7fd5ae1f0...f8.exe
windows7-x64
10a7fd5ae1f0...f8.exe
windows10-2004-x64
10a884e586e0...e0.exe
windows7-x64
10a884e586e0...e0.exe
windows10-2004-x64
10a8b0399c70...33.exe
windows7-x64
10a8b0399c70...33.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:15
Behavioral task
behavioral1
Sample
a6b7e1f8d965ec053cbb870a443d5513.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6b7e1f8d965ec053cbb870a443d5513.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
a6d91e550d33f9f64c5e292e47013b055f721bbc1865d3bfa5d89fe7f840586e.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
a6d91e550d33f9f64c5e292e47013b055f721bbc1865d3bfa5d89fe7f840586e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
a72cdbd8e2e58d49bac3da8f517b97ee8262cc6d54e21eadfacbf1df504a26ad.exe
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
a72cdbd8e2e58d49bac3da8f517b97ee8262cc6d54e21eadfacbf1df504a26ad.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
a731427f52bd2af065c7544d7f9ea804.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
a731427f52bd2af065c7544d7f9ea804.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
a73951d8730beba8a769c882801bd767.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
a73951d8730beba8a769c882801bd767.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
a74be4d5e7b154091b38338a6ac94973.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
a74be4d5e7b154091b38338a6ac94973.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
a77ff4e4dd651e4c89e2297a2a321987.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
a77ff4e4dd651e4c89e2297a2a321987.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
a799e456ff773d61953389e7fb322b88.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
a799e456ff773d61953389e7fb322b88.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
a7c49036ebf4784cc999d947c3350d466e1d4776671e2ce6bfa37c00013baf95.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
a7c49036ebf4784cc999d947c3350d466e1d4776671e2ce6bfa37c00013baf95.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
a7d8553ba6cb9193a197904239af5d2e7bc4c7015dce62660400968e54d94ba8.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
a7d8553ba6cb9193a197904239af5d2e7bc4c7015dce62660400968e54d94ba8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
a7e953c8807b21e5a5db9757e01e27e8018901c36cd81ef12cbda5712ad1c528.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
a7ead69cebb4805f528bc566a9b4eea3.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
a7ead69cebb4805f528bc566a9b4eea3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
a7ec6d64b26a76d441ffbded59fdbfa4d8e54782f5d03cc03e436d444de883db.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
a7ec6d64b26a76d441ffbded59fdbfa4d8e54782f5d03cc03e436d444de883db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
a7fd5ae1f0d16e9069ca216d2f21ccf8.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
a7fd5ae1f0d16e9069ca216d2f21ccf8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
a884e586e04d1b213ef1db19e0226a0503109862aa3072c6ace8660c6a3f46e0.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
a884e586e04d1b213ef1db19e0226a0503109862aa3072c6ace8660c6a3f46e0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
a8b0399c704553c85dfd0ab584536333.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
a8b0399c704553c85dfd0ab584536333.exe
Resource
win10v2004-20250314-en
General
-
Target
a799e456ff773d61953389e7fb322b88.exe
-
Size
20.2MB
-
MD5
a799e456ff773d61953389e7fb322b88
-
SHA1
ee4bb5e3ebfdb9a3a158b6e043ad8ad45405579e
-
SHA256
3f24ecfe09f50ca00f29c8617bc76f9b01785a2d86eaf16b34d46c60648ed32c
-
SHA512
5645160a60b98fa38fc2a278fe31290967368ec38df0b0b5ac6ca0fa1073518e7478888b4bbf13082a94d436567c53df04ba02b0265019ff61f7056f82b5f84a
-
SSDEEP
393216:SGg4aFGg4afGg4ahGg4aEGg4aJGg4akGg4a9Gg4aDGg4aKGg4aPGg4aLGg4aYGgf:AtfpyhSVzoPr2kyp
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5012 powershell.exe 2072 powershell.exe 3476 powershell.exe 5072 powershell.exe -
resource behavioral16/files/0x0002000000023128-378.dat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation a799e456ff773d61953389e7fb322b88.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation a799e456ff773d61953389e7fb322b88.exe -
Executes dropped EXE 4 IoCs
pid Process 3720 ._cache_a799e456ff773d61953389e7fb322b88.exe 2124 Synaptics.exe 6120 Synaptics.exe 3316 ._cache_Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a799e456ff773d61953389e7fb322b88.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 checkip.dyndns.org 46 reallyfreegeoip.org 47 reallyfreegeoip.org 84 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1652 set thread context of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 2124 set thread context of 6120 2124 Synaptics.exe 117 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_a799e456ff773d61953389e7fb322b88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a799e456ff773d61953389e7fb322b88.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5052 schtasks.exe 4720 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4024 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1652 a799e456ff773d61953389e7fb322b88.exe 1652 a799e456ff773d61953389e7fb322b88.exe 1652 a799e456ff773d61953389e7fb322b88.exe 1652 a799e456ff773d61953389e7fb322b88.exe 1652 a799e456ff773d61953389e7fb322b88.exe 1652 a799e456ff773d61953389e7fb322b88.exe 1652 a799e456ff773d61953389e7fb322b88.exe 1652 a799e456ff773d61953389e7fb322b88.exe 3476 powershell.exe 1652 a799e456ff773d61953389e7fb322b88.exe 2072 powershell.exe 3476 powershell.exe 2072 powershell.exe 3720 ._cache_a799e456ff773d61953389e7fb322b88.exe 2124 Synaptics.exe 2124 Synaptics.exe 2124 Synaptics.exe 2124 Synaptics.exe 2124 Synaptics.exe 2124 Synaptics.exe 2124 Synaptics.exe 2124 Synaptics.exe 5012 powershell.exe 5072 powershell.exe 5072 powershell.exe 2124 Synaptics.exe 5012 powershell.exe 5072 powershell.exe 3316 ._cache_Synaptics.exe 3316 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1652 a799e456ff773d61953389e7fb322b88.exe Token: SeDebugPrivilege 3476 powershell.exe Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 3720 ._cache_a799e456ff773d61953389e7fb322b88.exe Token: SeDebugPrivilege 2124 Synaptics.exe Token: SeDebugPrivilege 5012 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeDebugPrivilege 3316 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4024 EXCEL.EXE 4024 EXCEL.EXE 4024 EXCEL.EXE 4024 EXCEL.EXE 4024 EXCEL.EXE 4024 EXCEL.EXE 4024 EXCEL.EXE 4024 EXCEL.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1652 wrote to memory of 3476 1652 a799e456ff773d61953389e7fb322b88.exe 95 PID 1652 wrote to memory of 3476 1652 a799e456ff773d61953389e7fb322b88.exe 95 PID 1652 wrote to memory of 3476 1652 a799e456ff773d61953389e7fb322b88.exe 95 PID 1652 wrote to memory of 2072 1652 a799e456ff773d61953389e7fb322b88.exe 97 PID 1652 wrote to memory of 2072 1652 a799e456ff773d61953389e7fb322b88.exe 97 PID 1652 wrote to memory of 2072 1652 a799e456ff773d61953389e7fb322b88.exe 97 PID 1652 wrote to memory of 5052 1652 a799e456ff773d61953389e7fb322b88.exe 98 PID 1652 wrote to memory of 5052 1652 a799e456ff773d61953389e7fb322b88.exe 98 PID 1652 wrote to memory of 5052 1652 a799e456ff773d61953389e7fb322b88.exe 98 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 1652 wrote to memory of 2944 1652 a799e456ff773d61953389e7fb322b88.exe 101 PID 2944 wrote to memory of 3720 2944 a799e456ff773d61953389e7fb322b88.exe 102 PID 2944 wrote to memory of 3720 2944 a799e456ff773d61953389e7fb322b88.exe 102 PID 2944 wrote to memory of 3720 2944 a799e456ff773d61953389e7fb322b88.exe 102 PID 2944 wrote to memory of 2124 2944 a799e456ff773d61953389e7fb322b88.exe 103 PID 2944 wrote to memory of 2124 2944 a799e456ff773d61953389e7fb322b88.exe 103 PID 2944 wrote to memory of 2124 2944 a799e456ff773d61953389e7fb322b88.exe 103 PID 2124 wrote to memory of 5012 2124 Synaptics.exe 111 PID 2124 wrote to memory of 5012 2124 Synaptics.exe 111 PID 2124 wrote to memory of 5012 2124 Synaptics.exe 111 PID 2124 wrote to memory of 5072 2124 Synaptics.exe 113 PID 2124 wrote to memory of 5072 2124 Synaptics.exe 113 PID 2124 wrote to memory of 5072 2124 Synaptics.exe 113 PID 2124 wrote to memory of 4720 2124 Synaptics.exe 115 PID 2124 wrote to memory of 4720 2124 Synaptics.exe 115 PID 2124 wrote to memory of 4720 2124 Synaptics.exe 115 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 2124 wrote to memory of 6120 2124 Synaptics.exe 117 PID 6120 wrote to memory of 3316 6120 Synaptics.exe 118 PID 6120 wrote to memory of 3316 6120 Synaptics.exe 118 PID 6120 wrote to memory of 3316 6120 Synaptics.exe 118 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a799e456ff773d61953389e7fb322b88.exe"C:\Users\Admin\AppData\Local\Temp\a799e456ff773d61953389e7fb322b88.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a799e456ff773d61953389e7fb322b88.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF2EB.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\a799e456ff773d61953389e7fb322b88.exe"C:\Users\Admin\AppData\Local\Temp\a799e456ff773d61953389e7fb322b88.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\._cache_a799e456ff773d61953389e7fb322b88.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a799e456ff773d61953389e7fb322b88.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp74CD.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4720
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:6120 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3316
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4024
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.2MB
MD5a799e456ff773d61953389e7fb322b88
SHA1ee4bb5e3ebfdb9a3a158b6e043ad8ad45405579e
SHA2563f24ecfe09f50ca00f29c8617bc76f9b01785a2d86eaf16b34d46c60648ed32c
SHA5125645160a60b98fa38fc2a278fe31290967368ec38df0b0b5ac6ca0fa1073518e7478888b4bbf13082a94d436567c53df04ba02b0265019ff61f7056f82b5f84a
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD599de6041b66661090a1bbb5521e90640
SHA10e80b48e3ba21ec4d8f345d24bdfd5847446b57c
SHA256b6a94707f79d473eb56b31559d36c73e8e86a55832d69935b16c94081417fc6a
SHA5128a358dee5fc95e5d82b515d18e9f3b21b967288fb24550d8b1b315dca8d8c7dd48edcf5dd51c2106b41d81609e96202a895230d250f34cbd78d07877c0d0725c
-
Filesize
18KB
MD5566acfec1606e179176aa9e8324bca7f
SHA12e391e3b2b23bf998e16e0431c8c9b5fd72551f9
SHA256b7965ff5fb3070da7d488915356acf2a1cd8c431f30aeecb455232fd2438a328
SHA512a864dc3f01b3d9879885fd9b9cb8d0a8d02facfd5d5942c11c4d4d60af0aa4e3360a7d01ebe60a9a10f158bc9c804f523af971f576ba5102a06f9be29d12f2ff
-
Filesize
91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b
-
Filesize
24KB
MD59ba7f74b50b7bded28c11f6afc515ef5
SHA17bfa0706f46634dec569a00193752466b74c298e
SHA256002ef792a7f26b8ca8375a678fadd2416cf20a29dd0800baef2ade2f645123d2
SHA5127d578debe8fc213a6346d1ba2abb65afe9aeace03af49c36c6c9289de045cfdf999b268fa0b0e04b0736af2855eb152e3b7b834bf8729c2a0dc661b9f3eb43b4
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD57568f85451f0451e4987fcb6b207f35d
SHA15788f7037493e41e4a47ce947e7020ea3cb72783
SHA25619d28d81c7dc8a54ef3363cc785f73970a510dad1c6d5cc3cb1e3b6d608f4770
SHA5120a8a00da8573f41aadb7ebc3db4e9cf07cc2648316a3ae92b7788d604c8f435be1ce485d7d0e7fd5e3798777e962ec475c747be6e9a0edfbecc07b77c924edbc