Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
5970556b7bb8e6ccc806d80a1cd4415b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5970556b7bb8e6ccc806d80a1cd4415b.exe
Resource
win10v2004-20231215-en
General
-
Target
5970556b7bb8e6ccc806d80a1cd4415b.exe
-
Size
24KB
-
MD5
5970556b7bb8e6ccc806d80a1cd4415b
-
SHA1
b52f550f3f948a83e5048cfba8c708449e1ad4e4
-
SHA256
06aceb0e99203ea89466be40ba788fff41738370ef793e1f9ea97fb0eb86439f
-
SHA512
c93c034d721a8ba10a58ae6ae673a4cc76dd755368a5481ff2104c49fc8eb525c7476d0aaaf624217ce2b576f0a92b60b979b7ac5b284b066bc0deaf23ed29ce
-
SSDEEP
384:E3eVES+/xwGkRKJ0czlM61qmTTMVF9/q5m0:bGS+ZfbJ0IO8qYoAP
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 5970556b7bb8e6ccc806d80a1cd4415b.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 5970556b7bb8e6ccc806d80a1cd4415b.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2932 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2872 ipconfig.exe 4504 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2932 tasklist.exe Token: SeDebugPrivilege 4504 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2696 5970556b7bb8e6ccc806d80a1cd4415b.exe 2696 5970556b7bb8e6ccc806d80a1cd4415b.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2528 2696 5970556b7bb8e6ccc806d80a1cd4415b.exe 32 PID 2696 wrote to memory of 2528 2696 5970556b7bb8e6ccc806d80a1cd4415b.exe 32 PID 2696 wrote to memory of 2528 2696 5970556b7bb8e6ccc806d80a1cd4415b.exe 32 PID 2528 wrote to memory of 4136 2528 cmd.exe 30 PID 2528 wrote to memory of 4136 2528 cmd.exe 30 PID 2528 wrote to memory of 4136 2528 cmd.exe 30 PID 2528 wrote to memory of 2872 2528 cmd.exe 21 PID 2528 wrote to memory of 2872 2528 cmd.exe 21 PID 2528 wrote to memory of 2872 2528 cmd.exe 21 PID 2528 wrote to memory of 2932 2528 cmd.exe 22 PID 2528 wrote to memory of 2932 2528 cmd.exe 22 PID 2528 wrote to memory of 2932 2528 cmd.exe 22 PID 2528 wrote to memory of 4824 2528 cmd.exe 29 PID 2528 wrote to memory of 4824 2528 cmd.exe 29 PID 2528 wrote to memory of 4824 2528 cmd.exe 29 PID 4824 wrote to memory of 2304 4824 net.exe 28 PID 4824 wrote to memory of 2304 4824 net.exe 28 PID 4824 wrote to memory of 2304 4824 net.exe 28 PID 2528 wrote to memory of 4504 2528 cmd.exe 27 PID 2528 wrote to memory of 4504 2528 cmd.exe 27 PID 2528 wrote to memory of 4504 2528 cmd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5970556b7bb8e6ccc806d80a1cd4415b.exe"C:\Users\Admin\AppData\Local\Temp\5970556b7bb8e6ccc806d80a1cd4415b.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2528
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all1⤵
- Gathers network information
PID:2872
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an1⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start1⤵PID:2304
-
C:\Windows\SysWOW64\net.exenet start1⤵
- Suspicious use of WriteProcessMemory
PID:4824
-
C:\Windows\SysWOW64\cmd.execmd /c set1⤵PID:4136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5374ae193ed94d96baf2d44ea162e333f
SHA1de3f1511418f75ec12af8f83fd15b16c1a45bca0
SHA256fa6d56b003b853916814d1215410b1de39841c1a61eb09ec9d7eec62bfaaac68
SHA5126dc55ead2cdb47f91cfb841978e0bc835d29fed50f3a19983c81ed9df5946dd61fe6068ad5b7048b1e05186ea49101eff962770516baea3c1f41487beea379b7