Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
2dc00657c6dbda18e367761ffbba1a54.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2dc00657c6dbda18e367761ffbba1a54.exe
Resource
win10v2004-20231215-en
General
-
Target
2dc00657c6dbda18e367761ffbba1a54.exe
-
Size
24KB
-
MD5
2dc00657c6dbda18e367761ffbba1a54
-
SHA1
bcd1c6290ca4f41c104573bbd2a9729ac16dc292
-
SHA256
ba692808b880bbe042bfdc0765eed3f9012c2cf6388996d2c25c6f056958fde7
-
SHA512
a54ff71c8fb5339c384a7f67310e718e5546b425f52c6b45a1af613128befdc346ee9782c8f8793b242ef0717ee5167d01472c1473876e8afd2f357c1065cae6
-
SSDEEP
384:E3eVES+/xwGkRKJMXQlM61qmTTMVF9/q5q0:bGS+ZfbJMgO8qYoAb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 2dc00657c6dbda18e367761ffbba1a54.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 2dc00657c6dbda18e367761ffbba1a54.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 440 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2324 ipconfig.exe 1112 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 440 tasklist.exe Token: SeDebugPrivilege 1112 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5088 2dc00657c6dbda18e367761ffbba1a54.exe 5088 2dc00657c6dbda18e367761ffbba1a54.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5088 wrote to memory of 2540 5088 2dc00657c6dbda18e367761ffbba1a54.exe 88 PID 5088 wrote to memory of 2540 5088 2dc00657c6dbda18e367761ffbba1a54.exe 88 PID 5088 wrote to memory of 2540 5088 2dc00657c6dbda18e367761ffbba1a54.exe 88 PID 2540 wrote to memory of 2036 2540 cmd.exe 90 PID 2540 wrote to memory of 2036 2540 cmd.exe 90 PID 2540 wrote to memory of 2036 2540 cmd.exe 90 PID 2540 wrote to memory of 2324 2540 cmd.exe 91 PID 2540 wrote to memory of 2324 2540 cmd.exe 91 PID 2540 wrote to memory of 2324 2540 cmd.exe 91 PID 2540 wrote to memory of 440 2540 cmd.exe 92 PID 2540 wrote to memory of 440 2540 cmd.exe 92 PID 2540 wrote to memory of 440 2540 cmd.exe 92 PID 2540 wrote to memory of 2568 2540 cmd.exe 95 PID 2540 wrote to memory of 2568 2540 cmd.exe 95 PID 2540 wrote to memory of 2568 2540 cmd.exe 95 PID 2568 wrote to memory of 4388 2568 net.exe 96 PID 2568 wrote to memory of 4388 2568 net.exe 96 PID 2568 wrote to memory of 4388 2568 net.exe 96 PID 2540 wrote to memory of 1112 2540 cmd.exe 97 PID 2540 wrote to memory of 1112 2540 cmd.exe 97 PID 2540 wrote to memory of 1112 2540 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dc00657c6dbda18e367761ffbba1a54.exe"C:\Users\Admin\AppData\Local\Temp\2dc00657c6dbda18e367761ffbba1a54.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2036
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2324
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:4388
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5dcb639c6dafa231e8bf174c2a01c8347
SHA1b9c0b331e2ef0d2dcd62b9655128c5db49e4cdce
SHA25670584e3a2d6b642ee9b9ac54ba08ff182ff52f182d12dbd3cda14ec9397df0f0
SHA512e26c2293dace94009b8e7b088746fef2ee416d4a3829676e35357d3b84c86d30087a8f8e6542cf7cd6c433644d8451dc14ebd02c2a3b36a35ae084798f74c8af