Analysis
-
max time kernel
20s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 09:41
General
-
Target
08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe
-
Size
8.0MB
-
MD5
75add0d16fb2a42587078fc84779b2ad
-
SHA1
7500994b2f7bb71fff21889d44c374e1ab08a78f
-
SHA256
08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742
-
SHA512
1df141f96c0eaa96b37231df82f4b9bec96b3512260d1adc0360cd801119a82dfb77fe7123f5fbbfb5d9b06bf851f8f3bc2681d52ec2f051e59383875a6cdd1e
-
SSDEEP
196608:bKXbeO7oIzLzyxechmOEiZ560zzYybwpl:w7oIzq0cSiHSpl
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
resource yara_rule behavioral1/memory/1284-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1284-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1284-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2804-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2804-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4296-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4296-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4296-45-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/files/0x0007000000024310-5.dat family_gh0strat behavioral1/memory/1284-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1284-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1284-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2804-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2804-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4296-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4296-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4296-45-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\240617328.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 14 IoCs
pid Process 2296 R.exe 1284 N.exe 2804 TXPlatfor.exe 4296 TXPlatfor.exe 3476 HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 4992 Synaptics.exe 3888 Synaptics.exe 5932 svchost.exe 812 ._cache_Synaptics.exe 5484 Remote Data.exe 2280 svchost.exe 6060 ._cache_Synaptics.exe 5540 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 2296 R.exe 4168 svchost.exe 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 812 ._cache_Synaptics.exe 5484 Remote Data.exe 6060 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe -
Creates a Windows Service
-
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File created C:\Windows\SysWOW64\240617328.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4900 set thread context of 2072 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 104 PID 812 set thread context of 3132 812 ._cache_Synaptics.exe 109 PID 6060 set thread context of 2128 6060 ._cache_Synaptics.exe 113 -
resource yara_rule behavioral1/memory/1284-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1284-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1284-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1284-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2804-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2804-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2804-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4296-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4296-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4296-45-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/files/0x0007000000024319-62.dat upx behavioral1/memory/4900-127-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/812-265-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/6060-348-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/4900-407-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/812-411-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/6060-413-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/6060-412-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/6060-423-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/6060-428-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/6060-435-0x0000000000400000-0x00000000008C3000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatfor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Remote Data.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4300 cmd.exe 1720 PING.EXE -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1720 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3468 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4296 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1284 N.exe Token: SeLoadDriverPrivilege 4296 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 812 ._cache_Synaptics.exe 812 ._cache_Synaptics.exe 3468 EXCEL.EXE 3468 EXCEL.EXE 6060 ._cache_Synaptics.exe 6060 ._cache_Synaptics.exe 3468 EXCEL.EXE 3468 EXCEL.EXE 3468 EXCEL.EXE 3468 EXCEL.EXE 3468 EXCEL.EXE 3468 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2296 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 86 PID 2136 wrote to memory of 2296 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 86 PID 2136 wrote to memory of 2296 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 86 PID 2136 wrote to memory of 1284 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 91 PID 2136 wrote to memory of 1284 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 91 PID 2136 wrote to memory of 1284 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 91 PID 1284 wrote to memory of 4300 1284 N.exe 93 PID 1284 wrote to memory of 4300 1284 N.exe 93 PID 1284 wrote to memory of 4300 1284 N.exe 93 PID 2804 wrote to memory of 4296 2804 TXPlatfor.exe 94 PID 2804 wrote to memory of 4296 2804 TXPlatfor.exe 94 PID 2804 wrote to memory of 4296 2804 TXPlatfor.exe 94 PID 2136 wrote to memory of 3476 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 95 PID 2136 wrote to memory of 3476 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 95 PID 2136 wrote to memory of 3476 2136 08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 95 PID 4300 wrote to memory of 1720 4300 cmd.exe 97 PID 4300 wrote to memory of 1720 4300 cmd.exe 97 PID 4300 wrote to memory of 1720 4300 cmd.exe 97 PID 3476 wrote to memory of 4900 3476 HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 98 PID 3476 wrote to memory of 4900 3476 HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 98 PID 3476 wrote to memory of 4900 3476 HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 98 PID 4796 wrote to memory of 4992 4796 cmd.exe 103 PID 4796 wrote to memory of 4992 4796 cmd.exe 103 PID 4796 wrote to memory of 4992 4796 cmd.exe 103 PID 3476 wrote to memory of 3888 3476 HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 102 PID 3476 wrote to memory of 3888 3476 HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 102 PID 3476 wrote to memory of 3888 3476 HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 102 PID 4900 wrote to memory of 2072 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 104 PID 4900 wrote to memory of 2072 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 104 PID 4900 wrote to memory of 2072 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 104 PID 4900 wrote to memory of 2072 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 104 PID 4900 wrote to memory of 2072 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 104 PID 4900 wrote to memory of 2072 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 104 PID 4900 wrote to memory of 2072 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 104 PID 4900 wrote to memory of 2072 4900 ._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe 104 PID 4992 wrote to memory of 812 4992 Synaptics.exe 106 PID 4992 wrote to memory of 812 4992 Synaptics.exe 106 PID 4992 wrote to memory of 812 4992 Synaptics.exe 106 PID 4168 wrote to memory of 5484 4168 svchost.exe 108 PID 4168 wrote to memory of 5484 4168 svchost.exe 108 PID 4168 wrote to memory of 5484 4168 svchost.exe 108 PID 812 wrote to memory of 3132 812 ._cache_Synaptics.exe 109 PID 812 wrote to memory of 3132 812 ._cache_Synaptics.exe 109 PID 812 wrote to memory of 3132 812 ._cache_Synaptics.exe 109 PID 812 wrote to memory of 3132 812 ._cache_Synaptics.exe 109 PID 812 wrote to memory of 3132 812 ._cache_Synaptics.exe 109 PID 812 wrote to memory of 3132 812 ._cache_Synaptics.exe 109 PID 812 wrote to memory of 3132 812 ._cache_Synaptics.exe 109 PID 812 wrote to memory of 3132 812 ._cache_Synaptics.exe 109 PID 3888 wrote to memory of 6060 3888 Synaptics.exe 111 PID 3888 wrote to memory of 6060 3888 Synaptics.exe 111 PID 3888 wrote to memory of 6060 3888 Synaptics.exe 111 PID 6060 wrote to memory of 2128 6060 ._cache_Synaptics.exe 113 PID 6060 wrote to memory of 2128 6060 ._cache_Synaptics.exe 113 PID 6060 wrote to memory of 2128 6060 ._cache_Synaptics.exe 113 PID 6060 wrote to memory of 2128 6060 ._cache_Synaptics.exe 113 PID 6060 wrote to memory of 2128 6060 ._cache_Synaptics.exe 113 PID 6060 wrote to memory of 2128 6060 ._cache_Synaptics.exe 113 PID 6060 wrote to memory of 2128 6060 ._cache_Synaptics.exe 113 PID 6060 wrote to memory of 2128 6060 ._cache_Synaptics.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe"C:\Users\Admin\AppData\Local\Temp\08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exeC:\Users\Admin\AppData\Local\Temp\HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2072
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6060 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Drops file in Windows directory
PID:2128
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:5200
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\240617328.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5484
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Drops file in Windows directory
PID:3132
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:5932
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3468
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:2280
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:5540
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe
Filesize3.7MB
MD59284ad2b9dedaccb7660b1613f8f2744
SHA15beb997b004f44770d1b1d7fabca69b8e50c14de
SHA25639367d062dd41a0bcbd6eeead8354b82b6ca39654deb01cdfcbaec14cfba5f13
SHA51294b7061b8d52ad26589d9baeae05dff4dab4eda87957356b52a47ee260af0625df7123ac688939f8b2b87ab89ad574a348575d81876ef69925b12db31370c991
-
Filesize
22KB
MD589e6efe9708aa61caa620b29fe26dbf5
SHA16a59240437823eae3e8a625dbe10e0221c91f20b
SHA256e4c1463c3eb54e3cb6ae1130f87ced815a3332512ecc8cb51bc096f6bdc03eed
SHA5122cee0d4db2813bd7c28047f624e3aa32c7239d80df34afe4de768b0e1592b392d90a5c4e8217c818e30ba5a372e42d9953738844f7921563ff07a3fa57e13f2e
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
C:\Users\Admin\AppData\Local\Temp\HD_08ae4e225db853cce5d02df3ee5db5cd211ea3dce4412c3b81d1da43646b9742.exe
Filesize4.4MB
MD5188c1d80c607e5ab9f9601d7c838eaae
SHA1b3d38a8e55ae6abf9edab12a32613c220964c8ca
SHA2562020f870682c35d00b54752766baabd273c5b50c12644e42e08fd4fd14e0a314
SHA5127de5d09bdd7b40a96d7b23c985767f17e4149c862b2ac14631d811dd00ca1d0a0eca0317b095b2dca320ee8eec8e276b1f89536d80596ddd7cc8ec3fb470052b
-
Filesize
3.6MB
MD5a13a5d435f336ef34ad621f7ab58b2fc
SHA1144c965ae45493e33d65cc86d8c79c33985382f5
SHA2569af06847b1562bb682d55af14418bd3a666579cd651fa7442136e11a7dc73ef6
SHA512986cfbd10c2e34d24a58e77a680e850fb5101318cb140357b9ca6133c41f28313179561e2f5d7f692701de216b4123649084090e81a8724e30f4192fff13b2a2
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
36KB
MD5aabb7c086cf41dd3ae78ebb355560a50
SHA1e9b879226b8642c24cc031d3d8538b56bca772d0
SHA256075a76ba39f937682b2a667ab762bfbd75535033b3e22dbf961f8c258338b5a2
SHA5129a66f11645c69b4fd58fbee33f2c70d6020b4716858ebc128191ad36b2e136af51e0b80394cd877bfca1640a9f8ce3409838a15cd6f890957fa38594fcea6574
-
Filesize
899KB
MD57c6c0a90db0f6347f04a0118e037b5c8
SHA114d1ae77585520d30bd562b8696cfc42c088d932
SHA256aa72f018faf5dd9d3db24d9b4b8df4fc69ae7b4ffeb570b3bb37f832dedba240
SHA51221d492596af8494334e1681bf192c51c8faf88d00ea90588b396457ee0af574eac37f91a2ee70633bf53be1019fee4cb89f7178ea235941cccd474328b29aa2f
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309