Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
2670fbee3694be364c79d1bcdba4e4c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2670fbee3694be364c79d1bcdba4e4c6.exe
Resource
win10v2004-20231215-en
General
-
Target
2670fbee3694be364c79d1bcdba4e4c6.exe
-
Size
24KB
-
MD5
2670fbee3694be364c79d1bcdba4e4c6
-
SHA1
a53a0a505070b2c7e18153f483205f2b02a7f27e
-
SHA256
fdc2d074aed83eda9a8dfb2fb75aee93af30f2a760a5518c873ef8d4ed2bcc7b
-
SHA512
2bca1396cb95ba802be1788c4ddda4ee0ffd19278fe1d40057fc0a8b025d6a3e41c676b12301e209467a98186e826acede5bb314ba9c89096e65514f2f9be96c
-
SSDEEP
384:E3eVES+/xwGkRKJ0zaalM61qmTTMVF9/q530:bGS+ZfbJSO8qYoAk
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 2670fbee3694be364c79d1bcdba4e4c6.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 2670fbee3694be364c79d1bcdba4e4c6.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2792 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2872 NETSTAT.EXE 2432 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2792 tasklist.exe Token: SeDebugPrivilege 2872 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1936 2670fbee3694be364c79d1bcdba4e4c6.exe 1936 2670fbee3694be364c79d1bcdba4e4c6.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2760 1936 2670fbee3694be364c79d1bcdba4e4c6.exe 9 PID 1936 wrote to memory of 2760 1936 2670fbee3694be364c79d1bcdba4e4c6.exe 9 PID 1936 wrote to memory of 2760 1936 2670fbee3694be364c79d1bcdba4e4c6.exe 9 PID 1936 wrote to memory of 2760 1936 2670fbee3694be364c79d1bcdba4e4c6.exe 9 PID 2760 wrote to memory of 1924 2760 cmd.exe 7 PID 2760 wrote to memory of 1924 2760 cmd.exe 7 PID 2760 wrote to memory of 1924 2760 cmd.exe 7 PID 2760 wrote to memory of 1924 2760 cmd.exe 7 PID 2760 wrote to memory of 2432 2760 cmd.exe 6 PID 2760 wrote to memory of 2432 2760 cmd.exe 6 PID 2760 wrote to memory of 2432 2760 cmd.exe 6 PID 2760 wrote to memory of 2432 2760 cmd.exe 6 PID 2760 wrote to memory of 2792 2760 cmd.exe 5 PID 2760 wrote to memory of 2792 2760 cmd.exe 5 PID 2760 wrote to memory of 2792 2760 cmd.exe 5 PID 2760 wrote to memory of 2792 2760 cmd.exe 5 PID 2760 wrote to memory of 2848 2760 cmd.exe 3 PID 2760 wrote to memory of 2848 2760 cmd.exe 3 PID 2760 wrote to memory of 2848 2760 cmd.exe 3 PID 2760 wrote to memory of 2848 2760 cmd.exe 3 PID 2848 wrote to memory of 2876 2848 net.exe 2 PID 2848 wrote to memory of 2876 2848 net.exe 2 PID 2848 wrote to memory of 2876 2848 net.exe 2 PID 2848 wrote to memory of 2876 2848 net.exe 2 PID 2760 wrote to memory of 2872 2760 cmd.exe 1 PID 2760 wrote to memory of 2872 2760 cmd.exe 1 PID 2760 wrote to memory of 2872 2760 cmd.exe 1 PID 2760 wrote to memory of 2872 2760 cmd.exe 1
Processes
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an1⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start1⤵PID:2876
-
C:\Windows\SysWOW64\net.exenet start1⤵
- Suspicious use of WriteProcessMemory
PID:2848
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all1⤵
- Gathers network information
PID:2432
-
C:\Windows\SysWOW64\cmd.execmd /c set1⤵PID:1924
-
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log1⤵
- Suspicious use of WriteProcessMemory
PID:2760
-
C:\Users\Admin\AppData\Local\Temp\2670fbee3694be364c79d1bcdba4e4c6.exe"C:\Users\Admin\AppData\Local\Temp\2670fbee3694be364c79d1bcdba4e4c6.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD56835122f622279eed1e30f91bfed31cf
SHA1f6d24ff22bc20f1ed6375825ba9b0f6e7ee3c0c0
SHA256ae1bed4119b2f44245f073a626d1e1875b17685d4ab1646c4649119d6045e5b5
SHA512ac2747157f494bfffc7ef5b442fd3653752ca67eb67f0055cc4fa5df83503618791a173ea681c7de715068329d9dd495fb72a78f2ec30551ce3fa6b44a86d22b