Analysis
-
max time kernel
173s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0a28fea08d5aa82b03da4565c0d55603.exe
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
0a28fea08d5aa82b03da4565c0d55603.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
0a28fea08d5aa82b03da4565c0d55603.exe
-
Size
24KB
-
MD5
0a28fea08d5aa82b03da4565c0d55603
-
SHA1
8aa282cdf67366849a1ec1d9dd5354d36a299307
-
SHA256
979b349973482102a5201fd57485188b3086f06ce52fb62207af509a5c568bc5
-
SHA512
5313a8df265889a0c53d052dbcd55f2f4047713ff62c216e5318eaecaad79a94eadedc376f7bd8568c3b2486124aa539408d3d4ac2d60822c0a60c339d258cca
-
SSDEEP
384:E3eVES+/xwGkRKJ9RvklM61qmTTMVF9/q5lW0:bGS+ZfbJ9R8O8qYoAh
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 0a28fea08d5aa82b03da4565c0d55603.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 0a28fea08d5aa82b03da4565c0d55603.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4912 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 220 NETSTAT.EXE 1320 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4912 tasklist.exe Token: SeDebugPrivilege 220 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3396 0a28fea08d5aa82b03da4565c0d55603.exe 3396 0a28fea08d5aa82b03da4565c0d55603.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3396 wrote to memory of 1928 3396 0a28fea08d5aa82b03da4565c0d55603.exe 91 PID 3396 wrote to memory of 1928 3396 0a28fea08d5aa82b03da4565c0d55603.exe 91 PID 3396 wrote to memory of 1928 3396 0a28fea08d5aa82b03da4565c0d55603.exe 91 PID 1928 wrote to memory of 3280 1928 cmd.exe 93 PID 1928 wrote to memory of 3280 1928 cmd.exe 93 PID 1928 wrote to memory of 3280 1928 cmd.exe 93 PID 1928 wrote to memory of 1320 1928 cmd.exe 94 PID 1928 wrote to memory of 1320 1928 cmd.exe 94 PID 1928 wrote to memory of 1320 1928 cmd.exe 94 PID 1928 wrote to memory of 4912 1928 cmd.exe 95 PID 1928 wrote to memory of 4912 1928 cmd.exe 95 PID 1928 wrote to memory of 4912 1928 cmd.exe 95 PID 1928 wrote to memory of 400 1928 cmd.exe 97 PID 1928 wrote to memory of 400 1928 cmd.exe 97 PID 1928 wrote to memory of 400 1928 cmd.exe 97 PID 400 wrote to memory of 1976 400 net.exe 98 PID 400 wrote to memory of 1976 400 net.exe 98 PID 400 wrote to memory of 1976 400 net.exe 98 PID 1928 wrote to memory of 220 1928 cmd.exe 100 PID 1928 wrote to memory of 220 1928 cmd.exe 100 PID 1928 wrote to memory of 220 1928 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a28fea08d5aa82b03da4565c0d55603.exe"C:\Users\Admin\AppData\Local\Temp\0a28fea08d5aa82b03da4565c0d55603.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:3280
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:1320
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:1976
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-