ScreenShot
Created | 2023.12.11 19:32 | Machine | s1_win7_x6403 |
Filename | SynapseExploit.exe | ||
Type | PE32 executable (console) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 55 detected (AIDetectMalware, RisePro, malicious, high confidence, Lumma, GIAK, GenericRXWL, TrojanPSW, Injuke, Kryptik, HVHC, Botx, keevuv, CrypterX, RedLineSteal, ckfuw, REDLINE, YXDLHZ, Krypt, ajhx, Eldorado, Malware@#1d2jpjcfqq4wu, 14OXGBD, score, R622440, BScope, Stealerc, ai score=80, unsafe, Genetic, hpboKKkYxtC, susgen, confidence, 100%) | ||
md5 | 2cd9b5d48c0904c90537d3eb0f1becad | ||
sha256 | b3ebb5a8630417d858f873711178365a1cc015e4a9952c9dfbb17550b3210053 | ||
ssdeep | 12288:JsSzartxSD/6+s8RPJsw9/r59yJUGaH881u4bT+txTanMwCxhFO5nG/sE:hzartxSD/6+sXsF9ygvbnMhxhgn5E | ||
imphash | 954a638f7d616d50845d17dd2901de21 | ||
impfuzzy | 48:hcpe0tSS1w9iYWDND8tXlX/rGGz/ao3fuFZIk5:hcpe0tSS1wAYW5D0XlXDGGba5R |
Network IP location
Signature (50cnts)
Level | Description |
---|---|
danger | File has been identified by 55 AntiVirus engines on VirusTotal as malicious |
danger | Executed a process and injected code into it |
watch | A process attempted to delay the analysis task. |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Attempts to create or modify system certificates |
watch | Code injection by writing an executable or DLL to the memory of another process |
watch | Collects information about installed applications |
watch | Communicates with host for which no DNS query was performed |
watch | Connects to an IRC server |
watch | Creates an executable file in a user folder |
watch | Executes one or more WMI queries |
watch | Harvests credentials from local FTP client softwares |
watch | Installs itself for autorun at Windows startup |
watch | Looks for the Windows Idle Time to determine the uptime |
watch | Manipulates memory of a non-child process indicative of process injection |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Tries to unhook Windows functions monitored by Cuckoo |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Created a process named as a common system process |
notice | Creates a shortcut to an executable file |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Creates hidden or system file |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | Executes one or more WMI queries which can be used to identify virtual machines |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Queries for potentially installed applications |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | Steals private information from local Internet browsers |
notice | Terminates another process |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The executable uses a known packer |
info | This executable has a PDB path |
info | Tries to locate where the browsers are installed |
info | Uses Windows APIs to generate a cryptographic key |
Rules (58cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | RedLine_Stealer_m_Zero | RedLine stealer | memory |
danger | Win32_Trojan_Emotet_2_Zero | Win32 Trojan Emotet | binaries (download) |
danger | XMRig_Miner_IN | XMRig Miner | binaries (download) |
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
warning | Suspicious_Obfuscation_Script_2 | Suspicious obfuscation script (e.g. executable files) | binaries (download) |
watch | Antivirus | Contains references to security software | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (download) |
watch | Network_Downloader | File Downloader | memory |
watch | Obsidium_Zero | Obsidium protector file | binaries (download) |
watch | schtasks_Zero | task schedule | memory |
watch | UPX_Zero | UPX packed file | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
watch | Win32_Trojan_PWS_Net_1_Zero | Win32 Trojan PWS .NET Azorult | binaries (download) |
notice | Code_injection | Code injection with CreateRemoteThread in a remote process | memory |
notice | Create_Service | Create a windows service | memory |
notice | Escalate_priviledges | Escalate priviledges | memory |
notice | Generic_PWS_Memory_Zero | PWS Memory | memory |
notice | KeyLogger | Run a KeyLogger | memory |
notice | local_credential_Steal | Steal credential | memory |
notice | Network_DGA | Communication using DGA | memory |
notice | Network_DNS | Communications use DNS | memory |
notice | Network_FTP | Communications over FTP | memory |
notice | Network_HTTP | Communications over HTTP | memory |
notice | Network_P2P_Win | Communications over P2P network | memory |
notice | Network_TCP_Socket | Communications over RAW Socket | memory |
notice | Persistence | Install itself for autorun at Windows startup | memory |
notice | ScreenShot | Take ScreenShot | memory |
notice | Sniff_Audio | Record Audio | memory |
notice | Str_Win32_Http_API | Match Windows Http API call | memory |
notice | Str_Win32_Internet_API | Match Windows Inet API call | memory |
info | anti_dbg | Checks if being debugged | memory |
info | antisb_threatExpert | Anti-Sandbox checks for ThreatExpert | memory |
info | Check_Dlls | (no description) | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerCheck__RemoteAPI | (no description) | memory |
info | DebuggerException__ConsoleCtrl | (no description) | memory |
info | DebuggerException__SetConsoleCtrl | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | Is_DotNET_EXE | (no description) | binaries (download) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | IsPE64 | (no description) | binaries (download) |
info | Microsoft_Office_File_Zero | Microsoft Office File | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
info | vmdetect_misc | Following Rule is referenced from AlienVault's Yara rule repository.This rule contains additional processes and driver names. | memory |
info | win_hook | Affect hook table | memory |
info | zip_file_format | ZIP file format | binaries (download) |
Network (13cnts) ?
Suricata ids
ET INFO Microsoft net.tcp Connection Initialization Activity
ET MALWARE Redline Stealer TCP CnC Activity
ET MALWARE [ANY.RUN] RedLine Stealer Family Related (MC-NMF Authorization)
ET MALWARE Redline Stealer TCP CnC - Id1Response
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO Executable Download from dotted-quad Host
ET POLICY PE EXE or DLL Windows file download HTTP
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET MALWARE Possible Kelihos.F EXE Download Common Structure
ET HUNTING Suspicious svchost.exe in URI - Possible Process Dump/Trojan Download
ET MALWARE Redline Stealer TCP CnC Activity
ET MALWARE [ANY.RUN] RedLine Stealer Family Related (MC-NMF Authorization)
ET MALWARE Redline Stealer TCP CnC - Id1Response
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO Executable Download from dotted-quad Host
ET POLICY PE EXE or DLL Windows file download HTTP
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET MALWARE Possible Kelihos.F EXE Download Common Structure
ET HUNTING Suspicious svchost.exe in URI - Possible Process Dump/Trojan Download
PE API
IAT(Import Address Table) Library
USER32.dll
0x4dd2dc ValidateRgn
ADVAPI32.dll
0x4dd000 SetServiceStatus
KERNEL32.dll
0x4dd030 CreateFileW
0x4dd034 WaitForThreadpoolTimerCallbacks
0x4dd038 CloseHandle
0x4dd03c EnterCriticalSection
0x4dd040 LeaveCriticalSection
0x4dd044 InitializeCriticalSectionAndSpinCount
0x4dd048 DeleteCriticalSection
0x4dd04c SetEvent
0x4dd050 ResetEvent
0x4dd054 WaitForSingleObjectEx
0x4dd058 CreateEventW
0x4dd05c GetModuleHandleW
0x4dd060 GetProcAddress
0x4dd064 IsDebuggerPresent
0x4dd068 UnhandledExceptionFilter
0x4dd06c SetUnhandledExceptionFilter
0x4dd070 GetStartupInfoW
0x4dd074 IsProcessorFeaturePresent
0x4dd078 QueryPerformanceCounter
0x4dd07c GetCurrentProcessId
0x4dd080 GetCurrentThreadId
0x4dd084 GetSystemTimeAsFileTime
0x4dd088 InitializeSListHead
0x4dd08c GetCurrentProcess
0x4dd090 TerminateProcess
0x4dd094 Sleep
0x4dd098 SwitchToThread
0x4dd09c GetExitCodeThread
0x4dd0a0 GetNativeSystemInfo
0x4dd0a4 GetStringTypeW
0x4dd0a8 WideCharToMultiByte
0x4dd0ac MultiByteToWideChar
0x4dd0b0 FormatMessageA
0x4dd0b4 EncodePointer
0x4dd0b8 DecodePointer
0x4dd0bc QueryPerformanceFrequency
0x4dd0c0 InitializeSRWLock
0x4dd0c4 ReleaseSRWLockExclusive
0x4dd0c8 AcquireSRWLockExclusive
0x4dd0cc TryAcquireSRWLockExclusive
0x4dd0d0 InitializeConditionVariable
0x4dd0d4 WakeConditionVariable
0x4dd0d8 WakeAllConditionVariable
0x4dd0dc SleepConditionVariableSRW
0x4dd0e0 InitializeCriticalSectionEx
0x4dd0e4 LCMapStringEx
0x4dd0e8 LocalFree
0x4dd0ec GetLocaleInfoEx
0x4dd0f0 SetFileInformationByHandle
0x4dd0f4 GetTempPathW
0x4dd0f8 FlsAlloc
0x4dd0fc FlsGetValue
0x4dd100 FlsSetValue
0x4dd104 FlsFree
0x4dd108 InitOnceExecuteOnce
0x4dd10c SleepConditionVariableCS
0x4dd110 CreateEventExW
0x4dd114 CreateSemaphoreExW
0x4dd118 FlushProcessWriteBuffers
0x4dd11c GetCurrentProcessorNumber
0x4dd120 GetTickCount64
0x4dd124 FreeLibraryWhenCallbackReturns
0x4dd128 CreateThreadpoolWork
0x4dd12c SubmitThreadpoolWork
0x4dd130 CloseThreadpoolWork
0x4dd134 CreateThreadpoolTimer
0x4dd138 SetThreadpoolTimer
0x4dd13c WriteConsoleW
0x4dd140 CloseThreadpoolTimer
0x4dd144 CreateThreadpoolWait
0x4dd148 SetThreadpoolWait
0x4dd14c CloseThreadpoolWait
0x4dd150 GetFileInformationByHandleEx
0x4dd154 CreateSymbolicLinkW
0x4dd158 CompareStringEx
0x4dd15c GetCPInfo
0x4dd160 HeapSize
0x4dd164 RaiseException
0x4dd168 RtlUnwind
0x4dd16c InterlockedPushEntrySList
0x4dd170 InterlockedFlushSList
0x4dd174 GetLastError
0x4dd178 SetLastError
0x4dd17c TlsAlloc
0x4dd180 TlsGetValue
0x4dd184 TlsSetValue
0x4dd188 TlsFree
0x4dd18c FreeLibrary
0x4dd190 LoadLibraryExW
0x4dd194 CreateThread
0x4dd198 ExitThread
0x4dd19c ResumeThread
0x4dd1a0 FreeLibraryAndExitThread
0x4dd1a4 GetModuleHandleExW
0x4dd1a8 ExitProcess
0x4dd1ac GetModuleFileNameW
0x4dd1b0 GetStdHandle
0x4dd1b4 WriteFile
0x4dd1b8 GetCommandLineA
0x4dd1bc GetCommandLineW
0x4dd1c0 GetCurrentThread
0x4dd1c4 HeapFree
0x4dd1c8 HeapAlloc
0x4dd1cc GetDateFormatW
0x4dd1d0 GetTimeFormatW
0x4dd1d4 CompareStringW
0x4dd1d8 LCMapStringW
0x4dd1dc GetLocaleInfoW
0x4dd1e0 IsValidLocale
0x4dd1e4 GetUserDefaultLCID
0x4dd1e8 EnumSystemLocalesW
0x4dd1ec FindClose
0x4dd1f0 FindFirstFileExW
0x4dd1f4 FindNextFileW
0x4dd1f8 IsValidCodePage
0x4dd1fc GetACP
0x4dd200 GetOEMCP
0x4dd204 GetEnvironmentStringsW
0x4dd208 FreeEnvironmentStringsW
0x4dd20c SetEnvironmentVariableW
0x4dd210 GetProcessHeap
0x4dd214 GetFileType
0x4dd218 SetConsoleCtrlHandler
0x4dd21c OutputDebugStringW
0x4dd220 SetStdHandle
0x4dd224 GetFileSizeEx
0x4dd228 SetFilePointerEx
0x4dd22c FlushFileBuffers
0x4dd230 GetConsoleOutputCP
0x4dd234 GetConsoleMode
0x4dd238 ReadFile
0x4dd23c ReadConsoleW
0x4dd240 HeapReAlloc
0x4dd244 GetTimeZoneInformation
EAT(Export Address Table) Library
0x405b23 _GetPhysicalSize@12
USER32.dll
0x4dd2dc ValidateRgn
ADVAPI32.dll
0x4dd000 SetServiceStatus
KERNEL32.dll
0x4dd030 CreateFileW
0x4dd034 WaitForThreadpoolTimerCallbacks
0x4dd038 CloseHandle
0x4dd03c EnterCriticalSection
0x4dd040 LeaveCriticalSection
0x4dd044 InitializeCriticalSectionAndSpinCount
0x4dd048 DeleteCriticalSection
0x4dd04c SetEvent
0x4dd050 ResetEvent
0x4dd054 WaitForSingleObjectEx
0x4dd058 CreateEventW
0x4dd05c GetModuleHandleW
0x4dd060 GetProcAddress
0x4dd064 IsDebuggerPresent
0x4dd068 UnhandledExceptionFilter
0x4dd06c SetUnhandledExceptionFilter
0x4dd070 GetStartupInfoW
0x4dd074 IsProcessorFeaturePresent
0x4dd078 QueryPerformanceCounter
0x4dd07c GetCurrentProcessId
0x4dd080 GetCurrentThreadId
0x4dd084 GetSystemTimeAsFileTime
0x4dd088 InitializeSListHead
0x4dd08c GetCurrentProcess
0x4dd090 TerminateProcess
0x4dd094 Sleep
0x4dd098 SwitchToThread
0x4dd09c GetExitCodeThread
0x4dd0a0 GetNativeSystemInfo
0x4dd0a4 GetStringTypeW
0x4dd0a8 WideCharToMultiByte
0x4dd0ac MultiByteToWideChar
0x4dd0b0 FormatMessageA
0x4dd0b4 EncodePointer
0x4dd0b8 DecodePointer
0x4dd0bc QueryPerformanceFrequency
0x4dd0c0 InitializeSRWLock
0x4dd0c4 ReleaseSRWLockExclusive
0x4dd0c8 AcquireSRWLockExclusive
0x4dd0cc TryAcquireSRWLockExclusive
0x4dd0d0 InitializeConditionVariable
0x4dd0d4 WakeConditionVariable
0x4dd0d8 WakeAllConditionVariable
0x4dd0dc SleepConditionVariableSRW
0x4dd0e0 InitializeCriticalSectionEx
0x4dd0e4 LCMapStringEx
0x4dd0e8 LocalFree
0x4dd0ec GetLocaleInfoEx
0x4dd0f0 SetFileInformationByHandle
0x4dd0f4 GetTempPathW
0x4dd0f8 FlsAlloc
0x4dd0fc FlsGetValue
0x4dd100 FlsSetValue
0x4dd104 FlsFree
0x4dd108 InitOnceExecuteOnce
0x4dd10c SleepConditionVariableCS
0x4dd110 CreateEventExW
0x4dd114 CreateSemaphoreExW
0x4dd118 FlushProcessWriteBuffers
0x4dd11c GetCurrentProcessorNumber
0x4dd120 GetTickCount64
0x4dd124 FreeLibraryWhenCallbackReturns
0x4dd128 CreateThreadpoolWork
0x4dd12c SubmitThreadpoolWork
0x4dd130 CloseThreadpoolWork
0x4dd134 CreateThreadpoolTimer
0x4dd138 SetThreadpoolTimer
0x4dd13c WriteConsoleW
0x4dd140 CloseThreadpoolTimer
0x4dd144 CreateThreadpoolWait
0x4dd148 SetThreadpoolWait
0x4dd14c CloseThreadpoolWait
0x4dd150 GetFileInformationByHandleEx
0x4dd154 CreateSymbolicLinkW
0x4dd158 CompareStringEx
0x4dd15c GetCPInfo
0x4dd160 HeapSize
0x4dd164 RaiseException
0x4dd168 RtlUnwind
0x4dd16c InterlockedPushEntrySList
0x4dd170 InterlockedFlushSList
0x4dd174 GetLastError
0x4dd178 SetLastError
0x4dd17c TlsAlloc
0x4dd180 TlsGetValue
0x4dd184 TlsSetValue
0x4dd188 TlsFree
0x4dd18c FreeLibrary
0x4dd190 LoadLibraryExW
0x4dd194 CreateThread
0x4dd198 ExitThread
0x4dd19c ResumeThread
0x4dd1a0 FreeLibraryAndExitThread
0x4dd1a4 GetModuleHandleExW
0x4dd1a8 ExitProcess
0x4dd1ac GetModuleFileNameW
0x4dd1b0 GetStdHandle
0x4dd1b4 WriteFile
0x4dd1b8 GetCommandLineA
0x4dd1bc GetCommandLineW
0x4dd1c0 GetCurrentThread
0x4dd1c4 HeapFree
0x4dd1c8 HeapAlloc
0x4dd1cc GetDateFormatW
0x4dd1d0 GetTimeFormatW
0x4dd1d4 CompareStringW
0x4dd1d8 LCMapStringW
0x4dd1dc GetLocaleInfoW
0x4dd1e0 IsValidLocale
0x4dd1e4 GetUserDefaultLCID
0x4dd1e8 EnumSystemLocalesW
0x4dd1ec FindClose
0x4dd1f0 FindFirstFileExW
0x4dd1f4 FindNextFileW
0x4dd1f8 IsValidCodePage
0x4dd1fc GetACP
0x4dd200 GetOEMCP
0x4dd204 GetEnvironmentStringsW
0x4dd208 FreeEnvironmentStringsW
0x4dd20c SetEnvironmentVariableW
0x4dd210 GetProcessHeap
0x4dd214 GetFileType
0x4dd218 SetConsoleCtrlHandler
0x4dd21c OutputDebugStringW
0x4dd220 SetStdHandle
0x4dd224 GetFileSizeEx
0x4dd228 SetFilePointerEx
0x4dd22c FlushFileBuffers
0x4dd230 GetConsoleOutputCP
0x4dd234 GetConsoleMode
0x4dd238 ReadFile
0x4dd23c ReadConsoleW
0x4dd240 HeapReAlloc
0x4dd244 GetTimeZoneInformation
EAT(Export Address Table) Library
0x405b23 _GetPhysicalSize@12