Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 18:26
General
-
Target
90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe
-
Size
8.0MB
-
MD5
d2dbe489415f717e4b31257abaf2014c
-
SHA1
f935da9d0177bef1ceb9f6a2c15c9771aa578cd5
-
SHA256
90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf
-
SHA512
4e4d418b3dc84f7c80064885703f24f0a3a1fd30e6c2121c8375852b5b4866a8c571d324a0c977fdedcf55e9da1b77fba478410f18ad98790db7753854977d00
-
SSDEEP
196608:bKXbeO7oIzLzyxechmOEiZ560zzYybwpt:w7oIzq0cSiHSpt
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
resource yara_rule behavioral1/memory/4380-14-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4380-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4380-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4676-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4676-33-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4896-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4896-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4676-24-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4676-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4896-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral1/files/0x00070000000242bb-5.dat family_gh0strat behavioral1/memory/4380-14-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4380-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4380-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4676-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4676-33-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4896-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4896-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4676-24-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4676-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4896-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 11 IoCs
pid Process 220 R.exe 4380 N.exe 4676 TXPlatfor.exe 4896 TXPlatfor.exe 3536 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 4516 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 2572 Synaptics.exe 5752 Synaptics.exe 5404 ._cache_Synaptics.exe 1868 ._cache_Synaptics.exe 2100 svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 220 R.exe 4516 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 5404 ._cache_Synaptics.exe 1868 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\240619531.txt R.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5404 set thread context of 2932 5404 ._cache_Synaptics.exe 114 PID 1868 set thread context of 4344 1868 ._cache_Synaptics.exe 115 -
resource yara_rule behavioral1/memory/4380-14-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4380-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4380-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4380-12-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4676-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4676-33-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4896-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4896-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4676-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4676-24-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4676-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4896-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/files/0x000c0000000242c2-58.dat upx behavioral1/memory/4516-124-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/1868-313-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/4516-388-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/5404-391-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/1868-394-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/1868-393-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/1868-403-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/1868-407-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/1868-413-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/1868-417-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/1868-425-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/1868-446-0x0000000000400000-0x00000000008C3000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2952 220 WerFault.exe 85 5468 220 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatfor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4788 cmd.exe 5760 PING.EXE -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5760 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3824 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1868 ._cache_Synaptics.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4896 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4380 N.exe Token: SeLoadDriverPrivilege 4896 TXPlatfor.exe Token: 33 4896 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 4896 TXPlatfor.exe Token: 33 4896 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 4896 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 4516 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 4516 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 5404 ._cache_Synaptics.exe 5404 ._cache_Synaptics.exe 1868 ._cache_Synaptics.exe 1868 ._cache_Synaptics.exe 3824 EXCEL.EXE 3824 EXCEL.EXE 3824 EXCEL.EXE 3824 EXCEL.EXE 3824 EXCEL.EXE 3824 EXCEL.EXE 3824 EXCEL.EXE 3824 EXCEL.EXE 3824 EXCEL.EXE -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 5136 wrote to memory of 220 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 85 PID 5136 wrote to memory of 220 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 85 PID 5136 wrote to memory of 220 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 85 PID 5136 wrote to memory of 4380 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 94 PID 5136 wrote to memory of 4380 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 94 PID 5136 wrote to memory of 4380 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 94 PID 4380 wrote to memory of 4788 4380 N.exe 96 PID 4380 wrote to memory of 4788 4380 N.exe 96 PID 4380 wrote to memory of 4788 4380 N.exe 96 PID 4676 wrote to memory of 4896 4676 TXPlatfor.exe 97 PID 4676 wrote to memory of 4896 4676 TXPlatfor.exe 97 PID 4676 wrote to memory of 4896 4676 TXPlatfor.exe 97 PID 5136 wrote to memory of 3536 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 98 PID 5136 wrote to memory of 3536 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 98 PID 5136 wrote to memory of 3536 5136 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 98 PID 4788 wrote to memory of 5760 4788 cmd.exe 102 PID 4788 wrote to memory of 5760 4788 cmd.exe 102 PID 4788 wrote to memory of 5760 4788 cmd.exe 102 PID 3536 wrote to memory of 4516 3536 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 103 PID 3536 wrote to memory of 4516 3536 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 103 PID 3536 wrote to memory of 4516 3536 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 103 PID 3536 wrote to memory of 2572 3536 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 106 PID 3536 wrote to memory of 2572 3536 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 106 PID 3536 wrote to memory of 2572 3536 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 106 PID 2164 wrote to memory of 5752 2164 cmd.exe 107 PID 2164 wrote to memory of 5752 2164 cmd.exe 107 PID 2164 wrote to memory of 5752 2164 cmd.exe 107 PID 4516 wrote to memory of 5148 4516 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 109 PID 4516 wrote to memory of 5148 4516 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 109 PID 4516 wrote to memory of 5148 4516 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 109 PID 2572 wrote to memory of 5404 2572 Synaptics.exe 111 PID 2572 wrote to memory of 5404 2572 Synaptics.exe 111 PID 2572 wrote to memory of 5404 2572 Synaptics.exe 111 PID 5752 wrote to memory of 1868 5752 Synaptics.exe 112 PID 5752 wrote to memory of 1868 5752 Synaptics.exe 112 PID 5752 wrote to memory of 1868 5752 Synaptics.exe 112 PID 5404 wrote to memory of 2932 5404 ._cache_Synaptics.exe 114 PID 5404 wrote to memory of 2932 5404 ._cache_Synaptics.exe 114 PID 5404 wrote to memory of 2932 5404 ._cache_Synaptics.exe 114 PID 5404 wrote to memory of 2932 5404 ._cache_Synaptics.exe 114 PID 5404 wrote to memory of 2932 5404 ._cache_Synaptics.exe 114 PID 5404 wrote to memory of 2932 5404 ._cache_Synaptics.exe 114 PID 5404 wrote to memory of 2932 5404 ._cache_Synaptics.exe 114 PID 5404 wrote to memory of 2932 5404 ._cache_Synaptics.exe 114 PID 1868 wrote to memory of 4344 1868 ._cache_Synaptics.exe 115 PID 1868 wrote to memory of 4344 1868 ._cache_Synaptics.exe 115 PID 1868 wrote to memory of 4344 1868 ._cache_Synaptics.exe 115 PID 1868 wrote to memory of 4344 1868 ._cache_Synaptics.exe 115 PID 1868 wrote to memory of 4344 1868 ._cache_Synaptics.exe 115 PID 1868 wrote to memory of 4344 1868 ._cache_Synaptics.exe 115 PID 1868 wrote to memory of 4344 1868 ._cache_Synaptics.exe 115 PID 1868 wrote to memory of 4344 1868 ._cache_Synaptics.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe"C:\Users\Admin\AppData\Local\Temp\90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5136 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 4483⤵
- Program crash
PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 5283⤵
- Program crash
PID:5468
-
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exeC:\Users\Admin\AppData\Local\Temp\HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:5148
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5404 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Drops file in Windows directory
PID:2932
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 220 -ip 2201⤵PID:5312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 220 -ip 2201⤵PID:3500
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5752 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4344
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3824
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:2100
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe
Filesize3.7MB
MD59284ad2b9dedaccb7660b1613f8f2744
SHA15beb997b004f44770d1b1d7fabca69b8e50c14de
SHA25639367d062dd41a0bcbd6eeead8354b82b6ca39654deb01cdfcbaec14cfba5f13
SHA51294b7061b8d52ad26589d9baeae05dff4dab4eda87957356b52a47ee260af0625df7123ac688939f8b2b87ab89ad574a348575d81876ef69925b12db31370c991
-
Filesize
24KB
MD550a6ae61b9cac4f7e0a42895c32d486d
SHA136f3fbb11788a84a5552738be4f3cec207518db1
SHA2567b3e5d7dff3695ea12fb54b09993555162294ade3aba2d925125e4666287888e
SHA51275c3d796a2fa0d4d23b2462039a700a5b90b3e3af4ba0770edaa60d1852da8292375aae6e2a9aed376059b6393803dce6fd0fd12c70d5939b957f207b5e84d80
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
C:\Users\Admin\AppData\Local\Temp\HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe
Filesize4.4MB
MD517483b53d1189ebe1d2c341347778a1d
SHA11c3e0abbf19adbf6a5ca38d434b667794bcb11f3
SHA256391529f69657802339fa084feec2ebcfce99e888d6d1f19cdf7f09c7bfa27e5c
SHA512026b96a2efcc3555e0bff64280be0e9bf271112e58306526a9a38d32666518fa0f801e6e5220eaf24b5a58e2806e815c30edb36906fffbde12de1c91148e7cdf
-
Filesize
3.6MB
MD5a13a5d435f336ef34ad621f7ab58b2fc
SHA1144c965ae45493e33d65cc86d8c79c33985382f5
SHA2569af06847b1562bb682d55af14418bd3a666579cd651fa7442136e11a7dc73ef6
SHA512986cfbd10c2e34d24a58e77a680e850fb5101318cb140357b9ca6133c41f28313179561e2f5d7f692701de216b4123649084090e81a8724e30f4192fff13b2a2
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
36KB
MD5aabb7c086cf41dd3ae78ebb355560a50
SHA1e9b879226b8642c24cc031d3d8538b56bca772d0
SHA256075a76ba39f937682b2a667ab762bfbd75535033b3e22dbf961f8c258338b5a2
SHA5129a66f11645c69b4fd58fbee33f2c70d6020b4716858ebc128191ad36b2e136af51e0b80394cd877bfca1640a9f8ce3409838a15cd6f890957fa38594fcea6574
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
899KB
MD59301b57b4ae4a13a07589501c56c827c
SHA1a78600dbd2d7d10b0c8c7e628e730bb47eb2fb75
SHA256690b94b390fe83db00ca6188eaad760fa6fd83921f9689a79ba0a9e4d7ffe9ab
SHA51231cba7002f0b153fc38511bc3a2f648fd944158f286e44fe857f221ecb7e45d5aee1aea14656222285c5b4cbde0444ac7e0bc26550937f5a17a535236fa378cc
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309