Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 08:36
General
-
Target
8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe
-
Size
8.0MB
-
MD5
35db606133aabaf2743518a0fff09938
-
SHA1
5efda44781e95b56f5b467c721242da1de54a9ad
-
SHA256
8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6
-
SHA512
f7da56456800a9305166c161a73239c028be32f5f28cf480328bf1839844fcc0fa79ffc2d5459b0e89d7aa0d0db2f51ad73ede67ebeee95bd41828a55439f7f0
-
SSDEEP
196608:bKXbeO7oIzLzyxechmOEiZ560zzYybwpQ:w7oIzq0cSiHSpQ
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
resource yara_rule behavioral1/memory/4916-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4916-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/4916-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1944-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1944-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/808-93-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/808-98-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/files/0x00080000000240c2-5.dat family_gh0strat behavioral1/memory/4916-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4916-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/4916-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1944-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1944-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/808-93-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/808-98-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\240620312.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 12 IoCs
pid Process 1796 R.exe 4916 N.exe 1944 TXPlatfor.exe 808 TXPlatfor.exe 1192 HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 4328 Synaptics.exe 2832 Synaptics.exe 4768 svchost.exe 1932 Remote Data.exe 3020 ._cache_Synaptics.exe 2108 ._cache_Synaptics.exe -
Loads dropped DLL 8 IoCs
pid Process 1796 R.exe 5028 svchost.exe 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 1932 Remote Data.exe 4328 Synaptics.exe 4328 Synaptics.exe 2108 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe -
Creates a Windows Service
-
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe File created C:\Windows\SysWOW64\240620312.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe File created C:\Windows\SysWOW64\._cache_Synaptics.exe Synaptics.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1924 set thread context of 3440 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 105 -
resource yara_rule behavioral1/memory/4916-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4916-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4916-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/4916-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1944-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1944-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1944-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/files/0x00070000000240c8-45.dat upx behavioral1/memory/808-93-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/808-98-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1924-109-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/2108-342-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3020-321-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/1924-405-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3020-408-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3020-409-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/2108-411-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3020-430-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3020-434-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3020-440-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3020-444-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3020-451-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3020-461-0x0000000000400000-0x00000000008C3000-memory.dmp upx behavioral1/memory/3020-479-0x0000000000400000-0x00000000008C3000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Remote Data.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatfor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4052 cmd.exe 4660 PING.EXE -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4660 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2852 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 ._cache_Synaptics.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 808 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4916 N.exe Token: SeLoadDriverPrivilege 808 TXPlatfor.exe Token: 33 808 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 808 TXPlatfor.exe Token: 33 808 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 808 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 3020 ._cache_Synaptics.exe 2108 ._cache_Synaptics.exe 2108 ._cache_Synaptics.exe 3020 ._cache_Synaptics.exe 2852 EXCEL.EXE 2852 EXCEL.EXE 2852 EXCEL.EXE 2852 EXCEL.EXE 2852 EXCEL.EXE 2852 EXCEL.EXE 2852 EXCEL.EXE 2852 EXCEL.EXE 2852 EXCEL.EXE -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 3812 wrote to memory of 1796 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 86 PID 3812 wrote to memory of 1796 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 86 PID 3812 wrote to memory of 1796 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 86 PID 3812 wrote to memory of 4916 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 91 PID 3812 wrote to memory of 4916 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 91 PID 3812 wrote to memory of 4916 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 91 PID 4916 wrote to memory of 4052 4916 N.exe 94 PID 4916 wrote to memory of 4052 4916 N.exe 94 PID 4916 wrote to memory of 4052 4916 N.exe 94 PID 1944 wrote to memory of 808 1944 TXPlatfor.exe 95 PID 1944 wrote to memory of 808 1944 TXPlatfor.exe 95 PID 1944 wrote to memory of 808 1944 TXPlatfor.exe 95 PID 3812 wrote to memory of 1192 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 96 PID 3812 wrote to memory of 1192 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 96 PID 3812 wrote to memory of 1192 3812 8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 96 PID 1192 wrote to memory of 1924 1192 HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 99 PID 1192 wrote to memory of 1924 1192 HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 99 PID 1192 wrote to memory of 1924 1192 HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 99 PID 4052 wrote to memory of 4660 4052 cmd.exe 102 PID 4052 wrote to memory of 4660 4052 cmd.exe 102 PID 4052 wrote to memory of 4660 4052 cmd.exe 102 PID 1192 wrote to memory of 4328 1192 HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 103 PID 1192 wrote to memory of 4328 1192 HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 103 PID 1192 wrote to memory of 4328 1192 HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 103 PID 3580 wrote to memory of 2832 3580 cmd.exe 104 PID 3580 wrote to memory of 2832 3580 cmd.exe 104 PID 3580 wrote to memory of 2832 3580 cmd.exe 104 PID 1924 wrote to memory of 3440 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 105 PID 1924 wrote to memory of 3440 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 105 PID 1924 wrote to memory of 3440 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 105 PID 1924 wrote to memory of 3440 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 105 PID 1924 wrote to memory of 3440 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 105 PID 1924 wrote to memory of 3440 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 105 PID 1924 wrote to memory of 3440 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 105 PID 1924 wrote to memory of 3440 1924 ._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe 105 PID 5028 wrote to memory of 1932 5028 svchost.exe 107 PID 5028 wrote to memory of 1932 5028 svchost.exe 107 PID 5028 wrote to memory of 1932 5028 svchost.exe 107 PID 4328 wrote to memory of 3020 4328 Synaptics.exe 108 PID 4328 wrote to memory of 3020 4328 Synaptics.exe 108 PID 4328 wrote to memory of 3020 4328 Synaptics.exe 108 PID 2832 wrote to memory of 2108 2832 Synaptics.exe 109 PID 2832 wrote to memory of 2108 2832 Synaptics.exe 109 PID 2832 wrote to memory of 2108 2832 Synaptics.exe 109 PID 2108 wrote to memory of 2996 2108 ._cache_Synaptics.exe 111 PID 2108 wrote to memory of 2996 2108 ._cache_Synaptics.exe 111 PID 2108 wrote to memory of 2996 2108 ._cache_Synaptics.exe 111 PID 3020 wrote to memory of 4636 3020 ._cache_Synaptics.exe 113 PID 3020 wrote to memory of 4636 3020 ._cache_Synaptics.exe 113 PID 3020 wrote to memory of 4636 3020 ._cache_Synaptics.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe"C:\Users\Admin\AppData\Local\Temp\8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exeC:\Users\Admin\AppData\Local\Temp\HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3440
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:4636
-
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:4800
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\240620312.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Synaptics\Synaptics.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\._cache_Synaptics.exe"C:\Windows\system32\._cache_Synaptics.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:2996
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:4768
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2852
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe
Filesize3.7MB
MD59284ad2b9dedaccb7660b1613f8f2744
SHA15beb997b004f44770d1b1d7fabca69b8e50c14de
SHA25639367d062dd41a0bcbd6eeead8354b82b6ca39654deb01cdfcbaec14cfba5f13
SHA51294b7061b8d52ad26589d9baeae05dff4dab4eda87957356b52a47ee260af0625df7123ac688939f8b2b87ab89ad574a348575d81876ef69925b12db31370c991
-
Filesize
22KB
MD54054104f9c0df53e876b9a0b44f18917
SHA18c19c98f1bc8e8fa795d264083d81567dac405f7
SHA2563d4beff38bdfd3d35fc0bb545dbad8c180fdb69e70ab6a29e2a0650726d07449
SHA5124dd4eb0e33e6779af5843054cefe286b532e20d068b5e9626f43e9790851f1240e430bf18d96a7f0f945ee3acd9ba9f5d649ca9e9dcb2c944910ce787d8bc758
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
C:\Users\Admin\AppData\Local\Temp\HD_8a79b4e7edb4764cb017c6db7a16fb5e616423f32583310eb37d4d8dc0cd5aa6.exe
Filesize4.4MB
MD5823401406ccffd5b07b74ede7dbc76bd
SHA1cc403c42409c697adeff4d0af3aaf277613df409
SHA256fbe61a3296c3e29c94853dd99b6c463a0c15cc641c022ac7fbdd8bd454b7fdaf
SHA512d5cc34457666348f1d2b760b90876d26779803e40c85754e4acbb48d5eb05ec5056c6720314632f141ded4805b78f52c6e1e7caf9fc65e521e6c9f291131a472
-
Filesize
3.6MB
MD5a13a5d435f336ef34ad621f7ab58b2fc
SHA1144c965ae45493e33d65cc86d8c79c33985382f5
SHA2569af06847b1562bb682d55af14418bd3a666579cd651fa7442136e11a7dc73ef6
SHA512986cfbd10c2e34d24a58e77a680e850fb5101318cb140357b9ca6133c41f28313179561e2f5d7f692701de216b4123649084090e81a8724e30f4192fff13b2a2
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
36KB
MD5aabb7c086cf41dd3ae78ebb355560a50
SHA1e9b879226b8642c24cc031d3d8538b56bca772d0
SHA256075a76ba39f937682b2a667ab762bfbd75535033b3e22dbf961f8c258338b5a2
SHA5129a66f11645c69b4fd58fbee33f2c70d6020b4716858ebc128191ad36b2e136af51e0b80394cd877bfca1640a9f8ce3409838a15cd6f890957fa38594fcea6574
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
4.4MB
MD5d8af5178ebc92ebfe890486965c2bff4
SHA1d0dd7dd5e1fafc3bccef3b56f8751c647e10ab65
SHA256da610e6a48ad5d6afa32ecc3b34f095768808d1601a37c0c48c0de7bd481b0e0
SHA512b70b072b609e279dd2917fe3abcf6fe2c91efe857b938dca963730f1780a52f5902949ca9f8be0720841bcd436f0c0e9f19bb470f8b9af3c40da434d808db28c
-
Filesize
8.0MB
MD506553d0425f9c78d47e1f659f0f106ea
SHA16fee926e340bda78d990d0f1341fb3e4256094f2
SHA25648e8462c78b192e68b58f70cc1eb7cec152e9c311472fb294ac944dbec76e89b
SHA51206cfb1d32050143913fed65fa3688292a116a8bed661e0625d927689870d5d63ff6346d6ea52aa85f74409796a962bdcba636a520d4370c244a43df145b2c67b
-
Filesize
899KB
MD5534a5d3dc8582419073add6b71f7d0b4
SHA1eda847d6c39a9d5dda517e2a02664766af32bc6b
SHA256f4582890afd3d9805b87ded41f2f90bd49a885df17d7e3090bd1f113ac1b50f7
SHA51229f17c48d43a0ddd5b49698b5c21a041418b968bf25b2e8cedddae457fa5384c95d36acfaa517639aabbae8458db561a3450aba9a4a88558ff1ac18c23fd8a02
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
45KB
MD5b7c999040d80e5bf87886d70d992c51e
SHA1a8ed9a51cc14ccf99b670e60ebbc110756504929
SHA2565c3257b277f160109071e7e716040e67657341d8c42aa68d9afafe1630fcc53e
SHA51271ba2fbd705e51b488afe3bb33a67212cf297e97e8b1b20ada33e16956f7ec8f89a79e04a4b256fd61a442fada690aff0c807c2bdcc9165a9c7be3de725de309