Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
10183403e59feb8ff22c27d1d968cc46.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10183403e59feb8ff22c27d1d968cc46.exe
Resource
win10v2004-20231215-en
General
-
Target
10183403e59feb8ff22c27d1d968cc46.exe
-
Size
24KB
-
MD5
10183403e59feb8ff22c27d1d968cc46
-
SHA1
dc7b78df5f14ba480cf79f13896e624a0899ff28
-
SHA256
bb68cca9d8b8fcee236fde5d26905a7d27850ddf3e91a9d78c316d330c89c2c3
-
SHA512
7d3a4373c5d373fc14b640ba8d3249e415de17ad301115d254b7adf115cf10e2bbbc4e9f8eb622c51788c2f14810aef6421aca336a8c01bebd7c70351e200da2
-
SSDEEP
384:E3eVES+/xwGkRKJgflM61qmTTMVF9/q510:bGS+ZfbJgfO8qYoAa
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 10183403e59feb8ff22c27d1d968cc46.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 10183403e59feb8ff22c27d1d968cc46.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2856 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2712 ipconfig.exe 2660 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2856 tasklist.exe Token: SeDebugPrivilege 2660 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1244 10183403e59feb8ff22c27d1d968cc46.exe 1244 10183403e59feb8ff22c27d1d968cc46.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2032 1244 10183403e59feb8ff22c27d1d968cc46.exe 28 PID 1244 wrote to memory of 2032 1244 10183403e59feb8ff22c27d1d968cc46.exe 28 PID 1244 wrote to memory of 2032 1244 10183403e59feb8ff22c27d1d968cc46.exe 28 PID 1244 wrote to memory of 2032 1244 10183403e59feb8ff22c27d1d968cc46.exe 28 PID 2032 wrote to memory of 2948 2032 cmd.exe 30 PID 2032 wrote to memory of 2948 2032 cmd.exe 30 PID 2032 wrote to memory of 2948 2032 cmd.exe 30 PID 2032 wrote to memory of 2948 2032 cmd.exe 30 PID 2032 wrote to memory of 2712 2032 cmd.exe 31 PID 2032 wrote to memory of 2712 2032 cmd.exe 31 PID 2032 wrote to memory of 2712 2032 cmd.exe 31 PID 2032 wrote to memory of 2712 2032 cmd.exe 31 PID 2032 wrote to memory of 2856 2032 cmd.exe 32 PID 2032 wrote to memory of 2856 2032 cmd.exe 32 PID 2032 wrote to memory of 2856 2032 cmd.exe 32 PID 2032 wrote to memory of 2856 2032 cmd.exe 32 PID 2032 wrote to memory of 2632 2032 cmd.exe 34 PID 2032 wrote to memory of 2632 2032 cmd.exe 34 PID 2032 wrote to memory of 2632 2032 cmd.exe 34 PID 2032 wrote to memory of 2632 2032 cmd.exe 34 PID 2632 wrote to memory of 2648 2632 net.exe 35 PID 2632 wrote to memory of 2648 2632 net.exe 35 PID 2632 wrote to memory of 2648 2632 net.exe 35 PID 2632 wrote to memory of 2648 2632 net.exe 35 PID 2032 wrote to memory of 2660 2032 cmd.exe 36 PID 2032 wrote to memory of 2660 2032 cmd.exe 36 PID 2032 wrote to memory of 2660 2032 cmd.exe 36 PID 2032 wrote to memory of 2660 2032 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\10183403e59feb8ff22c27d1d968cc46.exe"C:\Users\Admin\AppData\Local\Temp\10183403e59feb8ff22c27d1d968cc46.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2948
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2712
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2648
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD56ffebe70fa8d77053288808afaa974d1
SHA1f0bf1f3e898c97f48edcf9c5b92ccde76cc3b69d
SHA2566a44cdcf161b5087ef05cacd78726e3731da38f746d3983ef75a2592b2d90ccb
SHA512913fdee7d45494ebb49d86940b7a854c8e9cfd9016efde93a64b8b6a2f7ec27c55901f69f6ccd90bc0bc239a7f42539593233f13ae0887a3bae64553a6306339