Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
0a81e854e6e1101bcf9de5ef23224673.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a81e854e6e1101bcf9de5ef23224673.exe
Resource
win10v2004-20231215-en
General
-
Target
0a81e854e6e1101bcf9de5ef23224673.exe
-
Size
24KB
-
MD5
0a81e854e6e1101bcf9de5ef23224673
-
SHA1
a440f984bfc59732134649674371035686382307
-
SHA256
93038943f5e84e2bca1ad4d79a425f853f18c9bc07da224ad94735201e744fb0
-
SHA512
7dd4018395d4144304db378c8caab0be93aef5b78598d705038af3f5f39945a3a9380dc748777dcdc98d6d813b14838d1f3c897e0dc28b1efb802622c8d95754
-
SSDEEP
384:E3eVES+/xwGkRKJilM61qmTTMVF9/q5x0:bGS+ZfbJiO8qYoAu
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 0a81e854e6e1101bcf9de5ef23224673.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 0a81e854e6e1101bcf9de5ef23224673.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1744 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2868 ipconfig.exe 3440 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1744 tasklist.exe Token: SeDebugPrivilege 3440 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4684 0a81e854e6e1101bcf9de5ef23224673.exe 4684 0a81e854e6e1101bcf9de5ef23224673.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3672 4684 0a81e854e6e1101bcf9de5ef23224673.exe 90 PID 4684 wrote to memory of 3672 4684 0a81e854e6e1101bcf9de5ef23224673.exe 90 PID 4684 wrote to memory of 3672 4684 0a81e854e6e1101bcf9de5ef23224673.exe 90 PID 3672 wrote to memory of 3740 3672 cmd.exe 93 PID 3672 wrote to memory of 3740 3672 cmd.exe 93 PID 3672 wrote to memory of 3740 3672 cmd.exe 93 PID 3672 wrote to memory of 2868 3672 cmd.exe 92 PID 3672 wrote to memory of 2868 3672 cmd.exe 92 PID 3672 wrote to memory of 2868 3672 cmd.exe 92 PID 3672 wrote to memory of 1744 3672 cmd.exe 94 PID 3672 wrote to memory of 1744 3672 cmd.exe 94 PID 3672 wrote to memory of 1744 3672 cmd.exe 94 PID 3672 wrote to memory of 1556 3672 cmd.exe 97 PID 3672 wrote to memory of 1556 3672 cmd.exe 97 PID 3672 wrote to memory of 1556 3672 cmd.exe 97 PID 1556 wrote to memory of 2932 1556 net.exe 98 PID 1556 wrote to memory of 2932 1556 net.exe 98 PID 1556 wrote to memory of 2932 1556 net.exe 98 PID 3672 wrote to memory of 3440 3672 cmd.exe 99 PID 3672 wrote to memory of 3440 3672 cmd.exe 99 PID 3672 wrote to memory of 3440 3672 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a81e854e6e1101bcf9de5ef23224673.exe"C:\Users\Admin\AppData\Local\Temp\0a81e854e6e1101bcf9de5ef23224673.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2868
-
-
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:3740
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2932
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD515b9df96c5c00ab82984f3933e8c2ccf
SHA1e9150859bcb6b4bb087d37c32c013e20f2ec8bf8
SHA256f9f515f93767445be5d63397df088cb0068e318835538e1dbaa408294d689785
SHA512f2602d5544c2cd45a5cffb33b410620053e3f0fe3adf87521f125775bb6ba5d1c30d20150afb6f217d59865809680e0b081d9c0139ba1a86e574fb23939a6b3e