Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
68d6c4827e1068fd73bf09dc5a7ff0d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
68d6c4827e1068fd73bf09dc5a7ff0d6.exe
Resource
win10v2004-20231215-en
General
-
Target
68d6c4827e1068fd73bf09dc5a7ff0d6.exe
-
Size
24KB
-
MD5
68d6c4827e1068fd73bf09dc5a7ff0d6
-
SHA1
52a3916f9ea618e4221c6dc6bd0d98cb02c8d83b
-
SHA256
d9e39d5e5d62bc153f801e83f66a01042fcb5b0a0a38f44e97780fdee9e0ff1c
-
SHA512
24fae01a4ec21c31ab1b11b62c9038c45d12594a0e7d295159970ac1db777231ec9f9770d393168c0e7ad1d893aee66d220e9962f04ae9e06422104ee85ff4d0
-
SSDEEP
384:E3eVES+/xwGkRKJxlM61qmTTMVF9/q56K0:bGS+ZfbJxO8qYoAo
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 68d6c4827e1068fd73bf09dc5a7ff0d6.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 68d6c4827e1068fd73bf09dc5a7ff0d6.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2692 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2388 ipconfig.exe 2476 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 tasklist.exe Token: SeDebugPrivilege 2476 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1424 68d6c4827e1068fd73bf09dc5a7ff0d6.exe 1424 68d6c4827e1068fd73bf09dc5a7ff0d6.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2224 1424 68d6c4827e1068fd73bf09dc5a7ff0d6.exe 18 PID 1424 wrote to memory of 2224 1424 68d6c4827e1068fd73bf09dc5a7ff0d6.exe 18 PID 1424 wrote to memory of 2224 1424 68d6c4827e1068fd73bf09dc5a7ff0d6.exe 18 PID 1424 wrote to memory of 2224 1424 68d6c4827e1068fd73bf09dc5a7ff0d6.exe 18 PID 2224 wrote to memory of 2776 2224 cmd.exe 20 PID 2224 wrote to memory of 2776 2224 cmd.exe 20 PID 2224 wrote to memory of 2776 2224 cmd.exe 20 PID 2224 wrote to memory of 2776 2224 cmd.exe 20 PID 2224 wrote to memory of 2388 2224 cmd.exe 21 PID 2224 wrote to memory of 2388 2224 cmd.exe 21 PID 2224 wrote to memory of 2388 2224 cmd.exe 21 PID 2224 wrote to memory of 2388 2224 cmd.exe 21 PID 2224 wrote to memory of 2692 2224 cmd.exe 22 PID 2224 wrote to memory of 2692 2224 cmd.exe 22 PID 2224 wrote to memory of 2692 2224 cmd.exe 22 PID 2224 wrote to memory of 2692 2224 cmd.exe 22 PID 2224 wrote to memory of 2852 2224 cmd.exe 27 PID 2224 wrote to memory of 2852 2224 cmd.exe 27 PID 2224 wrote to memory of 2852 2224 cmd.exe 27 PID 2224 wrote to memory of 2852 2224 cmd.exe 27 PID 2852 wrote to memory of 2596 2852 net.exe 28 PID 2852 wrote to memory of 2596 2852 net.exe 28 PID 2852 wrote to memory of 2596 2852 net.exe 28 PID 2852 wrote to memory of 2596 2852 net.exe 28 PID 2224 wrote to memory of 2476 2224 cmd.exe 29 PID 2224 wrote to memory of 2476 2224 cmd.exe 29 PID 2224 wrote to memory of 2476 2224 cmd.exe 29 PID 2224 wrote to memory of 2476 2224 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\68d6c4827e1068fd73bf09dc5a7ff0d6.exe"C:\Users\Admin\AppData\Local\Temp\68d6c4827e1068fd73bf09dc5a7ff0d6.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2776
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2388
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2596
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD50e234355f95d570df3c1e4b7ad19fb8e
SHA1dddf050b15fc135ec743ab03cd6aaf7b352ef481
SHA2565c14d3365e99aa1b4e1ef86a6ac1791fd5c4ae750180b26820e3dcc07f885d3f
SHA5124a39e7a354acc0812687d1b3c8e1c62fda5c5f3bf509af04fec94a401ca5c860eb1c812b47f3de74bece3bd39452ba132678581380c1338dbc6ab86c6bf236a9