Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
1daea4f77c0cfa0020fec04a9dc765b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1daea4f77c0cfa0020fec04a9dc765b3.exe
Resource
win10v2004-20231222-en
General
-
Target
1daea4f77c0cfa0020fec04a9dc765b3.exe
-
Size
24KB
-
MD5
1daea4f77c0cfa0020fec04a9dc765b3
-
SHA1
bfbc332fa4694b0090e7170c08137451684e4763
-
SHA256
f208de5a6ada83c70b69877aaf50654a3368a0113773b0f3ab956a8d9a439a6c
-
SHA512
e761aa0009af7cc99546b9ec8d6721907714d6f1c1b9a75a7de475de2d646f01db74ba0e39ebfd755f92e22bebb3ae80f89b25d2f49e44afecaf23bac5ac297a
-
SSDEEP
384:E3eVES+/xwGkRKJXJlM61qmTTMVF9/q5v0:bGS+ZfbJ5O8qYoAM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 1daea4f77c0cfa0020fec04a9dc765b3.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 1daea4f77c0cfa0020fec04a9dc765b3.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2324 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 644 ipconfig.exe 4312 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2324 tasklist.exe Token: SeDebugPrivilege 4312 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2408 1daea4f77c0cfa0020fec04a9dc765b3.exe 2408 1daea4f77c0cfa0020fec04a9dc765b3.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2408 wrote to memory of 4616 2408 1daea4f77c0cfa0020fec04a9dc765b3.exe 24 PID 2408 wrote to memory of 4616 2408 1daea4f77c0cfa0020fec04a9dc765b3.exe 24 PID 2408 wrote to memory of 4616 2408 1daea4f77c0cfa0020fec04a9dc765b3.exe 24 PID 4616 wrote to memory of 4164 4616 cmd.exe 23 PID 4616 wrote to memory of 4164 4616 cmd.exe 23 PID 4616 wrote to memory of 4164 4616 cmd.exe 23 PID 4616 wrote to memory of 644 4616 cmd.exe 19 PID 4616 wrote to memory of 644 4616 cmd.exe 19 PID 4616 wrote to memory of 644 4616 cmd.exe 19 PID 4616 wrote to memory of 2324 4616 cmd.exe 20 PID 4616 wrote to memory of 2324 4616 cmd.exe 20 PID 4616 wrote to memory of 2324 4616 cmd.exe 20 PID 4616 wrote to memory of 1564 4616 cmd.exe 36 PID 4616 wrote to memory of 1564 4616 cmd.exe 36 PID 4616 wrote to memory of 1564 4616 cmd.exe 36 PID 1564 wrote to memory of 4168 1564 net.exe 38 PID 1564 wrote to memory of 4168 1564 net.exe 38 PID 1564 wrote to memory of 4168 1564 net.exe 38 PID 4616 wrote to memory of 4312 4616 cmd.exe 41 PID 4616 wrote to memory of 4312 4616 cmd.exe 41 PID 4616 wrote to memory of 4312 4616 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\1daea4f77c0cfa0020fec04a9dc765b3.exe"C:\Users\Admin\AppData\Local\Temp\1daea4f77c0cfa0020fec04a9dc765b3.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:4168
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all1⤵
- Gathers network information
PID:644
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
C:\Windows\SysWOW64\cmd.execmd /c set1⤵PID:4164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD513b544b01f6298281f96e978e687941e
SHA12913c16b1036fdfea2497926fdeeaf293d9b54fc
SHA256f9554716868bbcaf47172156a898551bad0e61878b58963df37fe49797b2e6d1
SHA5122a9f62304bd19a1b5271ef1e30b487f729506cd8b3405d69956bb1630d8ee08a694959e8d8ac217d8f748fd96db8d920781ab0a62fa25139259ee7ab414e1412