Overview
overview
10Static
static
109e0a427b0b...e7.exe
windows7-x64
109e0a427b0b...e7.exe
windows10-2004-x64
109e25b8a175...7c.exe
windows7-x64
109e25b8a175...7c.exe
windows10-2004-x64
109e55090245...e4.exe
windows7-x64
109e55090245...e4.exe
windows10-2004-x64
109e5b7ffaab...05.exe
windows7-x64
109e5b7ffaab...05.exe
windows10-2004-x64
109e74a20e4e...38.exe
windows7-x64
109e74a20e4e...38.exe
windows10-2004-x64
109e8b382868...39.exe
windows7-x64
109e8b382868...39.exe
windows10-2004-x64
109e9642daec...94.exe
windows7-x64
109e9642daec...94.exe
windows10-2004-x64
109ef950b123...99.exe
windows7-x64
39ef950b123...99.exe
windows10-2004-x64
9f17d0e9bc...f7.exe
windows7-x64
69f17d0e9bc...f7.exe
windows10-2004-x64
69f1ccfcf5e...7d.exe
windows7-x64
19f1ccfcf5e...7d.exe
windows10-2004-x64
9f2ebb9c98...4f.exe
windows7-x64
109f2ebb9c98...4f.exe
windows10-2004-x64
109f461fa033...0b.exe
windows7-x64
109f461fa033...0b.exe
windows10-2004-x64
109f6a6c8041...f9.exe
windows7-x64
79f6a6c8041...f9.exe
windows10-2004-x64
79fc6b7a531...e4.exe
windows7-x64
109fc6b7a531...e4.exe
windows10-2004-x64
109fef837bde...4e.exe
windows7-x64
109fef837bde...4e.exe
windows10-2004-x64
109ff5970462...e0.exe
windows7-x64
109ff5970462...e0.exe
windows10-2004-x64
10Analysis
-
max time kernel
130s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:14
Behavioral task
behavioral1
Sample
9e0a427b0baf95dffaf2f1cbdf9772d2bb5f8c0f7b4b1d9a8d8072ffed2e9ae7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e0a427b0baf95dffaf2f1cbdf9772d2bb5f8c0f7b4b1d9a8d8072ffed2e9ae7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
9e25b8a1755d29ec471d8df1d98f317c.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
9e25b8a1755d29ec471d8df1d98f317c.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral5
Sample
9e55090245947d9d81138b405be61fe4.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
9e55090245947d9d81138b405be61fe4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
9e5b7ffaabf5b7b87ae5351d2bb0eb05.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
9e5b7ffaabf5b7b87ae5351d2bb0eb05.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
9e74a20e4ecbeedc5ad6b4cfb0c41a38.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
9e74a20e4ecbeedc5ad6b4cfb0c41a38.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
9e8b38286839f4eb5f1854ff289ba939.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
9e8b38286839f4eb5f1854ff289ba939.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
9e9642daecce85c22839d2da2451d575e39e53e3678d59346a08d7a20fdff494.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
9e9642daecce85c22839d2da2451d575e39e53e3678d59346a08d7a20fdff494.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
9ef950b12378580cc039c1ad6a089ae2fd9fc5b47b2b380cfe0b953a44fbce99.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
9ef950b12378580cc039c1ad6a089ae2fd9fc5b47b2b380cfe0b953a44fbce99.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
9f17d0e9bc37b8d8f59a92b9ee6e0ff7.exe
Resource
win7-20250207-en
Behavioral task
behavioral18
Sample
9f17d0e9bc37b8d8f59a92b9ee6e0ff7.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
9f1ccfcf5e175ae4c6ef4cb297ce5f7d.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
9f1ccfcf5e175ae4c6ef4cb297ce5f7d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
9f2ebb9c9810b867e79b44304e12d14f.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
9f2ebb9c9810b867e79b44304e12d14f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
9f461fa033a1285118131ac30901150b.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
9f461fa033a1285118131ac30901150b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
9f6a6c80412876ea03ad4f91bde1f4f9.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
9f6a6c80412876ea03ad4f91bde1f4f9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
9fc6b7a531664647e76420f006504fe4.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
9fc6b7a531664647e76420f006504fe4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
9fef837bdea2dc9e761d7e177419aa4e.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
9fef837bdea2dc9e761d7e177419aa4e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe
Resource
win10v2004-20250314-en
General
-
Target
9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe
-
Size
11.1MB
-
MD5
a22ee5e739a2ac8369547f4fce22b08a
-
SHA1
8e4a30c3f03682b057307548e83af8b3a5ff12f6
-
SHA256
9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0
-
SHA512
aa0a9be779940a26d2adb13f3380d1556d4de6a1f2b6eb7e5bf05e02342cb9fbc6b5417b903fd49382d1d0508af4189aca1f528c496e7c111e93ccdca50669fd
-
SSDEEP
196608:INsg4AMgAyNsg4AMgAINsg4AMgAFNsg4AMgAINsg4AMgAENsg4AMgAiNsg4AMgA8:IGg4adGg4a3Gg4aqGg4ajGg4aDGg4a1f
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3000 powershell.exe 2660 powershell.exe 1004 powershell.exe 2164 powershell.exe -
resource behavioral31/files/0x000500000001945c-139.dat behavioral31/files/0x000600000001946b-152.dat behavioral31/files/0x000700000001945c-163.dat -
Executes dropped EXE 5 IoCs
pid Process 1276 ._cache_9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 1260 Synaptics.exe 1272 Synaptics.exe 1728 Synaptics.exe 2624 ._cache_Synaptics.exe -
Loads dropped DLL 4 IoCs
pid Process 2564 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 2564 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 1272 Synaptics.exe 1272 Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 reallyfreegeoip.org 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2324 set thread context of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 1260 set thread context of 1272 1260 Synaptics.exe 47 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2856 schtasks.exe 1136 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1704 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 3000 powershell.exe 2660 powershell.exe 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 1260 Synaptics.exe 1260 Synaptics.exe 1260 Synaptics.exe 1276 ._cache_9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 1260 Synaptics.exe 1260 Synaptics.exe 1260 Synaptics.exe 1260 Synaptics.exe 1260 Synaptics.exe 1004 powershell.exe 2164 powershell.exe 1260 Synaptics.exe 1260 Synaptics.exe 1260 Synaptics.exe 2624 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe Token: SeDebugPrivilege 3000 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 1276 ._cache_9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe Token: SeDebugPrivilege 1260 Synaptics.exe Token: SeDebugPrivilege 1004 powershell.exe Token: SeDebugPrivilege 2164 powershell.exe Token: SeDebugPrivilege 2624 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1704 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3000 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 31 PID 2324 wrote to memory of 3000 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 31 PID 2324 wrote to memory of 3000 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 31 PID 2324 wrote to memory of 3000 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 31 PID 2324 wrote to memory of 2660 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 33 PID 2324 wrote to memory of 2660 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 33 PID 2324 wrote to memory of 2660 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 33 PID 2324 wrote to memory of 2660 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 33 PID 2324 wrote to memory of 2856 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 35 PID 2324 wrote to memory of 2856 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 35 PID 2324 wrote to memory of 2856 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 35 PID 2324 wrote to memory of 2856 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 35 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2324 wrote to memory of 2564 2324 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 37 PID 2564 wrote to memory of 1276 2564 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 38 PID 2564 wrote to memory of 1276 2564 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 38 PID 2564 wrote to memory of 1276 2564 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 38 PID 2564 wrote to memory of 1276 2564 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 38 PID 2564 wrote to memory of 1260 2564 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 39 PID 2564 wrote to memory of 1260 2564 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 39 PID 2564 wrote to memory of 1260 2564 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 39 PID 2564 wrote to memory of 1260 2564 9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe 39 PID 1260 wrote to memory of 1004 1260 Synaptics.exe 40 PID 1260 wrote to memory of 1004 1260 Synaptics.exe 40 PID 1260 wrote to memory of 1004 1260 Synaptics.exe 40 PID 1260 wrote to memory of 1004 1260 Synaptics.exe 40 PID 1260 wrote to memory of 2164 1260 Synaptics.exe 42 PID 1260 wrote to memory of 2164 1260 Synaptics.exe 42 PID 1260 wrote to memory of 2164 1260 Synaptics.exe 42 PID 1260 wrote to memory of 2164 1260 Synaptics.exe 42 PID 1260 wrote to memory of 1136 1260 Synaptics.exe 44 PID 1260 wrote to memory of 1136 1260 Synaptics.exe 44 PID 1260 wrote to memory of 1136 1260 Synaptics.exe 44 PID 1260 wrote to memory of 1136 1260 Synaptics.exe 44 PID 1260 wrote to memory of 1728 1260 Synaptics.exe 46 PID 1260 wrote to memory of 1728 1260 Synaptics.exe 46 PID 1260 wrote to memory of 1728 1260 Synaptics.exe 46 PID 1260 wrote to memory of 1728 1260 Synaptics.exe 46 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1260 wrote to memory of 1272 1260 Synaptics.exe 47 PID 1272 wrote to memory of 2624 1272 Synaptics.exe 48 PID 1272 wrote to memory of 2624 1272 Synaptics.exe 48 PID 1272 wrote to memory of 2624 1272 Synaptics.exe 48 PID 1272 wrote to memory of 2624 1272 Synaptics.exe 48 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe"C:\Users\Admin\AppData\Local\Temp\9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp71F5.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe"C:\Users\Admin\AppData\Local\Temp\9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\._cache_9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe"C:\Users\Admin\AppData\Local\Temp\._cache_9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEB68.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1136
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1728
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2624
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1704
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.1MB
MD5a22ee5e739a2ac8369547f4fce22b08a
SHA18e4a30c3f03682b057307548e83af8b3a5ff12f6
SHA2569ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0
SHA512aa0a9be779940a26d2adb13f3380d1556d4de6a1f2b6eb7e5bf05e02342cb9fbc6b5417b903fd49382d1d0508af4189aca1f528c496e7c111e93ccdca50669fd
-
C:\Users\Admin\AppData\Local\Temp\._cache_9ff5970462c67be2a3276d50e2caaccef892d83239ae7ab8c9e634995796bee0.exe
Filesize91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b
-
Filesize
25KB
MD585c5bd4aa371d940d286aa719b7a66ce
SHA17ffdc06e3fe539acac135b5218e5468f98e37fee
SHA256eed32ca88cf512c2cbf51c2c4bb1ea89754b3f53bf6e4e0fc6b2af6fc929d966
SHA51203d25ab385a84701532d82e1cb7ce7699422b2806f6d22050ecafcc8db8b69c94cdc1f286ca82d2dab842ebc6c98c912f038973ced53bf79b4887c0731feaf2d
-
Filesize
27KB
MD545c52029801b229d5c7859c192e9fd41
SHA12434da2572c5888504a0f0dbf9d81d7fe980d8ce
SHA2562c6b7b03d8789888992466faa4073a0ffc6eb065eff3f2cd4df87f99ff97102b
SHA5120a2d559b074f269b9e1106457dd64556c3721bf80a615715584898b6c449305a639615eb4ee1c0ec9b78c9801f18f6442191ddd4d59cf6cec0416c3e7a027ce0
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
32KB
MD521aba3ce031b8967f86c6c9b04c554ef
SHA1aa71b6588904e0e55b0a03d22d3761237942430b
SHA256d07f0dd0d2af76bbdad20579c60a0d4d666ae70fa0ec1d34ca208a02649cfc41
SHA512ef90feab33a862d55bbb8844ded9b53cfa70061603c80b9f83c3327e3c29d0ef4bd1d2a2a987225f444556f74305a8065e546402eb37cb77e21b4e4b7b9d7c45
-
Filesize
1KB
MD51a6f091575e68f2f425396e53a9effc9
SHA124b391e2e075a4ab0e587ecc098d9750486a220a
SHA2560366be5662d005ef118b923e5eebdadc839beeb6e3af6b6c78e856963015eb7d
SHA512a876c85a51459376f3d68f55741ed4d503760d9949aa7eada0ff5e12f4a688b378f01c1e2f3d252e58fb0a638c3206e788c18e6431bcf13e976da557cb3e81df
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J3MGPW91LCMHCKPT56IU.temp
Filesize7KB
MD5ab6748433311fa38294fb6d56b3d5dca
SHA17ea42648465d12246f4083bc4cf5e7b253bb56f3
SHA2565df43188dad0ce725d0b17ca1dc5fe36d59e70104092b43b52b96cf4d20958f0
SHA5125281bea59810ed2f9bc65ea7fe8c0b97ee64ec5c8258fb7ae5b7968f13af01b5c25512dfed6573705d2cc90b753dac5c841c339b3f4307d3359fce5b33e5962d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56cb65d611c54bdb8f7b68232db8e0d60
SHA1375420accc50db86e1097b3db525fa368acaf548
SHA256019613801382eb8a0681dbaca90dd42497b547f7ff409448cfb09d5a921c79d5
SHA51242e2bc36b90dcb54ab6cd7ea7ea23894bb79b40ed055a276d632f6d9f20397158e58f5b73eee56c8fdd7dba92446b161e93cabdac1879378fa79d290da422e91