Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
291f37554db2985ffeb7a9a1b5e8a8fe.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
291f37554db2985ffeb7a9a1b5e8a8fe.exe
Resource
win10v2004-20231215-en
General
-
Target
291f37554db2985ffeb7a9a1b5e8a8fe.exe
-
Size
24KB
-
MD5
291f37554db2985ffeb7a9a1b5e8a8fe
-
SHA1
a2aa74cb1de19acaa86bcac773a99d5fbf657de7
-
SHA256
ef2f7a59ca2c0f60e8d7d2965f17cf3d8e347a8babb95dcb6e50e316d013e3d1
-
SHA512
8baf3d2948b564cabe5f4fd1b331f9209de520fdc16cbbde05252763b85eb19334af9efa2fc42f70364a3edc9f0fb13a41d2b28b03c145733e213ae1e8a7433a
-
SSDEEP
384:E3eVES+/xwGkRKJilM61qmTTMVF9/q5r0:bGS+ZfbJiO8qYoAg
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 291f37554db2985ffeb7a9a1b5e8a8fe.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 291f37554db2985ffeb7a9a1b5e8a8fe.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1412 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2204 ipconfig.exe 2648 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1412 tasklist.exe Token: SeDebugPrivilege 2648 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2172 291f37554db2985ffeb7a9a1b5e8a8fe.exe 2172 291f37554db2985ffeb7a9a1b5e8a8fe.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1592 2172 291f37554db2985ffeb7a9a1b5e8a8fe.exe 28 PID 2172 wrote to memory of 1592 2172 291f37554db2985ffeb7a9a1b5e8a8fe.exe 28 PID 2172 wrote to memory of 1592 2172 291f37554db2985ffeb7a9a1b5e8a8fe.exe 28 PID 2172 wrote to memory of 1592 2172 291f37554db2985ffeb7a9a1b5e8a8fe.exe 28 PID 1592 wrote to memory of 2352 1592 cmd.exe 30 PID 1592 wrote to memory of 2352 1592 cmd.exe 30 PID 1592 wrote to memory of 2352 1592 cmd.exe 30 PID 1592 wrote to memory of 2352 1592 cmd.exe 30 PID 1592 wrote to memory of 2204 1592 cmd.exe 31 PID 1592 wrote to memory of 2204 1592 cmd.exe 31 PID 1592 wrote to memory of 2204 1592 cmd.exe 31 PID 1592 wrote to memory of 2204 1592 cmd.exe 31 PID 1592 wrote to memory of 1412 1592 cmd.exe 32 PID 1592 wrote to memory of 1412 1592 cmd.exe 32 PID 1592 wrote to memory of 1412 1592 cmd.exe 32 PID 1592 wrote to memory of 1412 1592 cmd.exe 32 PID 1592 wrote to memory of 2584 1592 cmd.exe 34 PID 1592 wrote to memory of 2584 1592 cmd.exe 34 PID 1592 wrote to memory of 2584 1592 cmd.exe 34 PID 1592 wrote to memory of 2584 1592 cmd.exe 34 PID 2584 wrote to memory of 2572 2584 net.exe 36 PID 2584 wrote to memory of 2572 2584 net.exe 36 PID 2584 wrote to memory of 2572 2584 net.exe 36 PID 2584 wrote to memory of 2572 2584 net.exe 36 PID 1592 wrote to memory of 2648 1592 cmd.exe 35 PID 1592 wrote to memory of 2648 1592 cmd.exe 35 PID 1592 wrote to memory of 2648 1592 cmd.exe 35 PID 1592 wrote to memory of 2648 1592 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\291f37554db2985ffeb7a9a1b5e8a8fe.exe"C:\Users\Admin\AppData\Local\Temp\291f37554db2985ffeb7a9a1b5e8a8fe.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2352
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2204
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2572
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5ae66d16a0cb2ffd3cb49675aa41cbc4b
SHA1c1808fe03af93310c3e05ed64896aa59ae150295
SHA2567d93fd00062a2d764337b6c68c1c07a48ba0b7f676b1da820e6404766eec8982
SHA51268ec3dbacc9ba121d958fdc1a3a22bb84c42b9fe4593c7f764efa4fad455a77035dc22d6a6d1dadea5079146b1e47125ab23c6de23b8e755fc56fa19e65dfed8