Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
1a93217eb901890d0f4c3020df1fee76.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1a93217eb901890d0f4c3020df1fee76.exe
Resource
win10v2004-20231222-en
General
-
Target
1a93217eb901890d0f4c3020df1fee76.exe
-
Size
24KB
-
MD5
1a93217eb901890d0f4c3020df1fee76
-
SHA1
84d9d031e9e340bdbbef333d79d6605cc2750784
-
SHA256
243ae77144a497041e224e6b8d0379889370fa2479b79d243fbdcae613353dff
-
SHA512
84146dd8046c59a032acec5bcc975eaeaa7bc0019b6b5e5d51182fe0f88b1a5ec1bb80f83cf26cb085379af3e99970ee870075b91274c2c709d41a26bc5ef858
-
SSDEEP
384:E3eVES+/xwGkRKJKIjlM61qmTTMVF9/q5I0:bGS+ZfbJK+O8qYoAx
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 1a93217eb901890d0f4c3020df1fee76.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 1a93217eb901890d0f4c3020df1fee76.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2572 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3052 ipconfig.exe 2876 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2572 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2156 1a93217eb901890d0f4c3020df1fee76.exe 2156 1a93217eb901890d0f4c3020df1fee76.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2916 2156 1a93217eb901890d0f4c3020df1fee76.exe 16 PID 2156 wrote to memory of 2916 2156 1a93217eb901890d0f4c3020df1fee76.exe 16 PID 2156 wrote to memory of 2916 2156 1a93217eb901890d0f4c3020df1fee76.exe 16 PID 2156 wrote to memory of 2916 2156 1a93217eb901890d0f4c3020df1fee76.exe 16 PID 2916 wrote to memory of 3024 2916 cmd.exe 23 PID 2916 wrote to memory of 3024 2916 cmd.exe 23 PID 2916 wrote to memory of 3024 2916 cmd.exe 23 PID 2916 wrote to memory of 3024 2916 cmd.exe 23 PID 2916 wrote to memory of 3052 2916 cmd.exe 17 PID 2916 wrote to memory of 3052 2916 cmd.exe 17 PID 2916 wrote to memory of 3052 2916 cmd.exe 17 PID 2916 wrote to memory of 3052 2916 cmd.exe 17 PID 2916 wrote to memory of 2572 2916 cmd.exe 18 PID 2916 wrote to memory of 2572 2916 cmd.exe 18 PID 2916 wrote to memory of 2572 2916 cmd.exe 18 PID 2916 wrote to memory of 2572 2916 cmd.exe 18 PID 2916 wrote to memory of 2880 2916 cmd.exe 22 PID 2916 wrote to memory of 2880 2916 cmd.exe 22 PID 2916 wrote to memory of 2880 2916 cmd.exe 22 PID 2916 wrote to memory of 2880 2916 cmd.exe 22 PID 2880 wrote to memory of 2632 2880 net.exe 20 PID 2880 wrote to memory of 2632 2880 net.exe 20 PID 2880 wrote to memory of 2632 2880 net.exe 20 PID 2880 wrote to memory of 2632 2880 net.exe 20 PID 2916 wrote to memory of 2876 2916 cmd.exe 21 PID 2916 wrote to memory of 2876 2916 cmd.exe 21 PID 2916 wrote to memory of 2876 2916 cmd.exe 21 PID 2916 wrote to memory of 2876 2916 cmd.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a93217eb901890d0f4c3020df1fee76.exe"C:\Users\Admin\AppData\Local\Temp\1a93217eb901890d0f4c3020df1fee76.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:3052
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
PID:2876
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2880
-
-
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:3024
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start1⤵PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5b2fad5367028891c073a4b5f8dbfdca9
SHA1f8fe7357f133f08140d15f3a7f4cb725cd7f5cba
SHA25635cb13f837520e9cc39a7c6e5e4f36be688b3cb6ebbb5412566498b48ded1f79
SHA5122c68899b2bfe81d664533f7585b688613dd1014a1ec27018fa0c156150b573ca9f67a3a9c54bd7bb3767616a7525895a7bd626c64ec06a9104fe585c07fad3bc