Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 18:21
General
-
Target
90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe
-
Size
8.0MB
-
MD5
d2dbe489415f717e4b31257abaf2014c
-
SHA1
f935da9d0177bef1ceb9f6a2c15c9771aa578cd5
-
SHA256
90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf
-
SHA512
4e4d418b3dc84f7c80064885703f24f0a3a1fd30e6c2121c8375852b5b4866a8c571d324a0c977fdedcf55e9da1b77fba478410f18ad98790db7753854977d00
-
SSDEEP
196608:bKXbeO7oIzLzyxechmOEiZ560zzYybwpt:w7oIzq0cSiHSpt
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
resource yara_rule behavioral1/memory/5608-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/5608-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/5608-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/676-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/676-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1764-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1764-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1764-45-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/files/0x0008000000024201-5.dat family_gh0strat behavioral1/memory/5608-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/5608-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/5608-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/676-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/676-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1764-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1764-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1764-45-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\240616765.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 13 IoCs
pid Process 532 R.exe 5608 N.exe 676 TXPlatfor.exe 1764 TXPlatfor.exe 2320 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 4512 Synaptics.exe 4016 Synaptics.exe 4472 ._cache_Synaptics.exe 3752 Remote Data.exe 796 svchost.exe 592 svchost.exe 3932 ._cache_Synaptics.exe -
Loads dropped DLL 6 IoCs
pid Process 532 R.exe 2344 svchost.exe 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 4472 ._cache_Synaptics.exe 3752 Remote Data.exe 3932 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe -
Creates a Windows Service
-
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File created C:\Windows\SysWOW64\240616765.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5004 set thread context of 4536 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 105 PID 4472 set thread context of 6136 4472 ._cache_Synaptics.exe 107 -
resource yara_rule behavioral1/memory/5608-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/5608-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/5608-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/5608-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/676-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/676-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/676-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1764-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1764-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1764-45-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/files/0x000700000002420c-62.dat upx behavioral1/memory/5004-128-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/4472-303-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3932-340-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/5004-346-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/4472-349-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3932-351-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3932-352-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/5004-410-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/4472-412-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3932-413-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3932-420-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3932-426-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3932-430-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3932-437-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3932-441-0x0000000000400000-0x00000000008C3000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatfor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Remote Data.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3140 cmd.exe 896 PING.EXE -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 896 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2576 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3932 ._cache_Synaptics.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1764 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5608 N.exe Token: SeLoadDriverPrivilege 1764 TXPlatfor.exe Token: 33 1764 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 1764 TXPlatfor.exe Token: 33 1764 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 1764 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 4472 ._cache_Synaptics.exe 4472 ._cache_Synaptics.exe 3932 ._cache_Synaptics.exe 3932 ._cache_Synaptics.exe 2576 EXCEL.EXE 2576 EXCEL.EXE 2576 EXCEL.EXE 2576 EXCEL.EXE 2576 EXCEL.EXE 2576 EXCEL.EXE 2576 EXCEL.EXE 2576 EXCEL.EXE 2576 EXCEL.EXE -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 4112 wrote to memory of 532 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 85 PID 4112 wrote to memory of 532 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 85 PID 4112 wrote to memory of 532 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 85 PID 4112 wrote to memory of 5608 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 88 PID 4112 wrote to memory of 5608 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 88 PID 4112 wrote to memory of 5608 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 88 PID 5608 wrote to memory of 3140 5608 N.exe 90 PID 5608 wrote to memory of 3140 5608 N.exe 90 PID 5608 wrote to memory of 3140 5608 N.exe 90 PID 676 wrote to memory of 1764 676 TXPlatfor.exe 91 PID 676 wrote to memory of 1764 676 TXPlatfor.exe 91 PID 676 wrote to memory of 1764 676 TXPlatfor.exe 91 PID 4112 wrote to memory of 2320 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 92 PID 4112 wrote to memory of 2320 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 92 PID 4112 wrote to memory of 2320 4112 90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 92 PID 3140 wrote to memory of 896 3140 cmd.exe 95 PID 3140 wrote to memory of 896 3140 cmd.exe 95 PID 3140 wrote to memory of 896 3140 cmd.exe 95 PID 2320 wrote to memory of 5004 2320 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 98 PID 2320 wrote to memory of 5004 2320 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 98 PID 2320 wrote to memory of 5004 2320 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 98 PID 2320 wrote to memory of 4512 2320 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 101 PID 2320 wrote to memory of 4512 2320 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 101 PID 2320 wrote to memory of 4512 2320 HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 101 PID 3692 wrote to memory of 4016 3692 cmd.exe 102 PID 3692 wrote to memory of 4016 3692 cmd.exe 102 PID 3692 wrote to memory of 4016 3692 cmd.exe 102 PID 4512 wrote to memory of 4472 4512 Synaptics.exe 103 PID 4512 wrote to memory of 4472 4512 Synaptics.exe 103 PID 4512 wrote to memory of 4472 4512 Synaptics.exe 103 PID 5004 wrote to memory of 4536 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 105 PID 5004 wrote to memory of 4536 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 105 PID 5004 wrote to memory of 4536 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 105 PID 2344 wrote to memory of 3752 2344 svchost.exe 104 PID 2344 wrote to memory of 3752 2344 svchost.exe 104 PID 2344 wrote to memory of 3752 2344 svchost.exe 104 PID 5004 wrote to memory of 4536 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 105 PID 5004 wrote to memory of 4536 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 105 PID 5004 wrote to memory of 4536 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 105 PID 5004 wrote to memory of 4536 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 105 PID 5004 wrote to memory of 4536 5004 ._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe 105 PID 4472 wrote to memory of 6136 4472 ._cache_Synaptics.exe 107 PID 4472 wrote to memory of 6136 4472 ._cache_Synaptics.exe 107 PID 4472 wrote to memory of 6136 4472 ._cache_Synaptics.exe 107 PID 4472 wrote to memory of 6136 4472 ._cache_Synaptics.exe 107 PID 4472 wrote to memory of 6136 4472 ._cache_Synaptics.exe 107 PID 4472 wrote to memory of 6136 4472 ._cache_Synaptics.exe 107 PID 4472 wrote to memory of 6136 4472 ._cache_Synaptics.exe 107 PID 4472 wrote to memory of 6136 4472 ._cache_Synaptics.exe 107 PID 4016 wrote to memory of 3932 4016 Synaptics.exe 109 PID 4016 wrote to memory of 3932 4016 Synaptics.exe 109 PID 4016 wrote to memory of 3932 4016 Synaptics.exe 109 PID 3932 wrote to memory of 5460 3932 ._cache_Synaptics.exe 112 PID 3932 wrote to memory of 5460 3932 ._cache_Synaptics.exe 112 PID 3932 wrote to memory of 5460 3932 ._cache_Synaptics.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe"C:\Users\Admin\AppData\Local\Temp\90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exeC:\Users\Admin\AppData\Local\Temp\HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4536
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Drops file in Windows directory
PID:6136
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:4248
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\240616765.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3752
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:5460
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:796
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:592
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe
Filesize3.7MB
MD59284ad2b9dedaccb7660b1613f8f2744
SHA15beb997b004f44770d1b1d7fabca69b8e50c14de
SHA25639367d062dd41a0bcbd6eeead8354b82b6ca39654deb01cdfcbaec14cfba5f13
SHA51294b7061b8d52ad26589d9baeae05dff4dab4eda87957356b52a47ee260af0625df7123ac688939f8b2b87ab89ad574a348575d81876ef69925b12db31370c991
-
Filesize
22KB
MD5bed430f60623f94dbcea6ac0716a5911
SHA1a3d4792d00fb29104320fd8ecaccf07df77556d7
SHA256c874400173e62fc9cc4614015dabd973d5d5badfbf720d5feb4e38a550f316a4
SHA512cfc2ddcf804ae4f4a780c1a9cf881ba032bfdd847041f05e96f30a814832896838bfd18092bf749b2ecbe4e9abe700fbc699bfd124774abad08b31ef35519e50
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
C:\Users\Admin\AppData\Local\Temp\HD_90aa52caa8c2e9b43bc91a7c166bedcf7740b28cfb289732af3ce51d1a3314bf.exe
Filesize4.4MB
MD517483b53d1189ebe1d2c341347778a1d
SHA11c3e0abbf19adbf6a5ca38d434b667794bcb11f3
SHA256391529f69657802339fa084feec2ebcfce99e888d6d1f19cdf7f09c7bfa27e5c
SHA512026b96a2efcc3555e0bff64280be0e9bf271112e58306526a9a38d32666518fa0f801e6e5220eaf24b5a58e2806e815c30edb36906fffbde12de1c91148e7cdf
-
Filesize
3.6MB
MD5a13a5d435f336ef34ad621f7ab58b2fc
SHA1144c965ae45493e33d65cc86d8c79c33985382f5
SHA2569af06847b1562bb682d55af14418bd3a666579cd651fa7442136e11a7dc73ef6
SHA512986cfbd10c2e34d24a58e77a680e850fb5101318cb140357b9ca6133c41f28313179561e2f5d7f692701de216b4123649084090e81a8724e30f4192fff13b2a2
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
36KB
MD5aabb7c086cf41dd3ae78ebb355560a50
SHA1e9b879226b8642c24cc031d3d8538b56bca772d0
SHA256075a76ba39f937682b2a667ab762bfbd75535033b3e22dbf961f8c258338b5a2
SHA5129a66f11645c69b4fd58fbee33f2c70d6020b4716858ebc128191ad36b2e136af51e0b80394cd877bfca1640a9f8ce3409838a15cd6f890957fa38594fcea6574
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
899KB
MD59af7357de64d3208c2fad507fb6478d3
SHA1e9b7637dc54df9df4a705846481eb85da82be298
SHA2562287955d29235712ead2cce90d80d1a7b16676ce14fbaeb9dd17cdeb9895f3c7
SHA512262b95093e25159b015fa4550284d8f76cd1ded31c44329a168641dd3d2b641caacbcefa5201af6b6c47908094e2208ba7b95ac8a1e847f511a4bcfbb020d54f
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309