Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 02:14
Static task
static1
Behavioral task
behavioral1
Sample
0b4a2375493a07e21024f37bbeefaaef.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b4a2375493a07e21024f37bbeefaaef.exe
Resource
win10v2004-20231215-en
General
-
Target
0b4a2375493a07e21024f37bbeefaaef.exe
-
Size
24KB
-
MD5
0b4a2375493a07e21024f37bbeefaaef
-
SHA1
ae143cdb566eb91cb5fba0708a9f71c4eb88792c
-
SHA256
839be998064fb7bb8aca1771dc1d80295a26f29d863b39c3ea1b81b440f3f6c1
-
SHA512
b3c69717805a8d5e085cf0bf8325daa24bfd77f1f65fb3b53a15568a592e2856e8ba3a61789013e0dfb2a54110666cb459a3fe5f0a3539d49c05faa69d8b1cd9
-
SSDEEP
384:E3eVES+/xwGkRKJU5tlM61qmTTMVF9/q5m0:bGS+ZfbJgO8qYoAP
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 0b4a2375493a07e21024f37bbeefaaef.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 0b4a2375493a07e21024f37bbeefaaef.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2336 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2360 ipconfig.exe 2800 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2336 tasklist.exe Token: SeDebugPrivilege 2800 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3044 0b4a2375493a07e21024f37bbeefaaef.exe 3044 0b4a2375493a07e21024f37bbeefaaef.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1912 3044 0b4a2375493a07e21024f37bbeefaaef.exe 28 PID 3044 wrote to memory of 1912 3044 0b4a2375493a07e21024f37bbeefaaef.exe 28 PID 3044 wrote to memory of 1912 3044 0b4a2375493a07e21024f37bbeefaaef.exe 28 PID 3044 wrote to memory of 1912 3044 0b4a2375493a07e21024f37bbeefaaef.exe 28 PID 1912 wrote to memory of 2976 1912 cmd.exe 30 PID 1912 wrote to memory of 2976 1912 cmd.exe 30 PID 1912 wrote to memory of 2976 1912 cmd.exe 30 PID 1912 wrote to memory of 2976 1912 cmd.exe 30 PID 1912 wrote to memory of 2360 1912 cmd.exe 31 PID 1912 wrote to memory of 2360 1912 cmd.exe 31 PID 1912 wrote to memory of 2360 1912 cmd.exe 31 PID 1912 wrote to memory of 2360 1912 cmd.exe 31 PID 1912 wrote to memory of 2336 1912 cmd.exe 32 PID 1912 wrote to memory of 2336 1912 cmd.exe 32 PID 1912 wrote to memory of 2336 1912 cmd.exe 32 PID 1912 wrote to memory of 2336 1912 cmd.exe 32 PID 1912 wrote to memory of 2776 1912 cmd.exe 34 PID 1912 wrote to memory of 2776 1912 cmd.exe 34 PID 1912 wrote to memory of 2776 1912 cmd.exe 34 PID 1912 wrote to memory of 2776 1912 cmd.exe 34 PID 2776 wrote to memory of 2780 2776 net.exe 35 PID 2776 wrote to memory of 2780 2776 net.exe 35 PID 2776 wrote to memory of 2780 2776 net.exe 35 PID 2776 wrote to memory of 2780 2776 net.exe 35 PID 1912 wrote to memory of 2800 1912 cmd.exe 36 PID 1912 wrote to memory of 2800 1912 cmd.exe 36 PID 1912 wrote to memory of 2800 1912 cmd.exe 36 PID 1912 wrote to memory of 2800 1912 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b4a2375493a07e21024f37bbeefaaef.exe"C:\Users\Admin\AppData\Local\Temp\0b4a2375493a07e21024f37bbeefaaef.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2976
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2360
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2780
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD526b0e92b2c911d3f011416de0d4a5447
SHA1aecd768dd92ff96f24f418fef5f7629b0fabf236
SHA256a04e3e189026773f13626fe17e236f3088d76481fe4e8bc716cdfacb94be0d10
SHA512cdde1a44055badcf2073e85e4f8ac1447906f109f8cd9d01bb071c7bbeaca4861b7fd3d41075930f6e94077d66d01ac436c8f3cd514fdd27208b644b1c961df0