Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
ad97c569279210ff706a394060f4a193.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ad97c569279210ff706a394060f4a193.exe
Resource
win10v2004-20231215-en
General
-
Target
ad97c569279210ff706a394060f4a193.exe
-
Size
24KB
-
MD5
ad97c569279210ff706a394060f4a193
-
SHA1
2091b3e2480c2741d1714ea9163452fde9019924
-
SHA256
ef5f4409955b5dbafeb6ae3612d9aba369a741080a165a13b5a276fc6548e859
-
SHA512
03fab26b8418f7ef8453d29bffc342d1d0209cee6f75eac1ca1c7745607628da47c2104300c121bec294558a05a869874d0cd66254a4b11230bafc39ad78749c
-
SSDEEP
384:E3eVES+/xwGkRKJ4fY0lM61qmTTMVF9/q580:bGS+ZfbJ4zO8qYoAt
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" ad97c569279210ff706a394060f4a193.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe ad97c569279210ff706a394060f4a193.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2780 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2388 ipconfig.exe 2868 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2780 tasklist.exe Token: SeDebugPrivilege 2868 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2492 ad97c569279210ff706a394060f4a193.exe 2492 ad97c569279210ff706a394060f4a193.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1636 2492 ad97c569279210ff706a394060f4a193.exe 16 PID 2492 wrote to memory of 1636 2492 ad97c569279210ff706a394060f4a193.exe 16 PID 2492 wrote to memory of 1636 2492 ad97c569279210ff706a394060f4a193.exe 16 PID 2492 wrote to memory of 1636 2492 ad97c569279210ff706a394060f4a193.exe 16 PID 1636 wrote to memory of 2464 1636 cmd.exe 23 PID 1636 wrote to memory of 2464 1636 cmd.exe 23 PID 1636 wrote to memory of 2464 1636 cmd.exe 23 PID 1636 wrote to memory of 2464 1636 cmd.exe 23 PID 1636 wrote to memory of 2388 1636 cmd.exe 17 PID 1636 wrote to memory of 2388 1636 cmd.exe 17 PID 1636 wrote to memory of 2388 1636 cmd.exe 17 PID 1636 wrote to memory of 2388 1636 cmd.exe 17 PID 1636 wrote to memory of 2780 1636 cmd.exe 18 PID 1636 wrote to memory of 2780 1636 cmd.exe 18 PID 1636 wrote to memory of 2780 1636 cmd.exe 18 PID 1636 wrote to memory of 2780 1636 cmd.exe 18 PID 1636 wrote to memory of 2856 1636 cmd.exe 21 PID 1636 wrote to memory of 2856 1636 cmd.exe 21 PID 1636 wrote to memory of 2856 1636 cmd.exe 21 PID 1636 wrote to memory of 2856 1636 cmd.exe 21 PID 2856 wrote to memory of 2844 2856 net.exe 20 PID 2856 wrote to memory of 2844 2856 net.exe 20 PID 2856 wrote to memory of 2844 2856 net.exe 20 PID 2856 wrote to memory of 2844 2856 net.exe 20 PID 1636 wrote to memory of 2868 1636 cmd.exe 19 PID 1636 wrote to memory of 2868 1636 cmd.exe 19 PID 1636 wrote to memory of 2868 1636 cmd.exe 19 PID 1636 wrote to memory of 2868 1636 cmd.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad97c569279210ff706a394060f4a193.exe"C:\Users\Admin\AppData\Local\Temp\ad97c569279210ff706a394060f4a193.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2388
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2856
-
-
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2464
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start1⤵PID:2844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD59c79598c605aa269f4222e8ae06fc6cd
SHA17458f2e4b3825809a57a079235cbb67843a4ab5e
SHA256b4d203755ebaca7973c296de934b936ae1076d0d43c18ea08c4d12a6cc1f9f9a
SHA512f5afce9061e46f44b32970958a99db7ab622f24f555b977d9f2c067afc58e3a66e31897ad9ea9c8535e40bfa46f88e884e4977d93469a831a6bfdbaeefe48b80