Analysis
-
max time kernel
0s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
43f0682f83485ae3dd505a8e916b409e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
43f0682f83485ae3dd505a8e916b409e.exe
Resource
win10v2004-20231222-en
General
-
Target
43f0682f83485ae3dd505a8e916b409e.exe
-
Size
24KB
-
MD5
43f0682f83485ae3dd505a8e916b409e
-
SHA1
e412feb81968ecc86d5df83d5b1ce4940bc00ee6
-
SHA256
198597b7db8721407a106b440a7503ce8ba47295a45daa0db134deec92dea45b
-
SHA512
fc9c0efd9a0281e4d5b96b88d4135caf4b6518e5dee3c43e4cebc38452bd77cd6db16dcd710922701c65206f616d3e415c47e8b31e652a1f4b95397f6aff97ea
-
SSDEEP
384:E3eVES+/xwGkRKJ5RMlM61qmTTMVF9/q5G0:bGS+ZfbJ5RMO8qYoAv
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 43f0682f83485ae3dd505a8e916b409e.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 43f0682f83485ae3dd505a8e916b409e.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2216 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2944 ipconfig.exe 1924 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2216 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 532 43f0682f83485ae3dd505a8e916b409e.exe 532 43f0682f83485ae3dd505a8e916b409e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 532 wrote to memory of 1456 532 43f0682f83485ae3dd505a8e916b409e.exe 28 PID 532 wrote to memory of 1456 532 43f0682f83485ae3dd505a8e916b409e.exe 28 PID 532 wrote to memory of 1456 532 43f0682f83485ae3dd505a8e916b409e.exe 28 PID 1456 wrote to memory of 2396 1456 cmd.exe 18 PID 1456 wrote to memory of 2396 1456 cmd.exe 18 PID 1456 wrote to memory of 2396 1456 cmd.exe 18 PID 1456 wrote to memory of 2944 1456 cmd.exe 19 PID 1456 wrote to memory of 2944 1456 cmd.exe 19 PID 1456 wrote to memory of 2944 1456 cmd.exe 19 PID 1456 wrote to memory of 2216 1456 cmd.exe 23 PID 1456 wrote to memory of 2216 1456 cmd.exe 23 PID 1456 wrote to memory of 2216 1456 cmd.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\43f0682f83485ae3dd505a8e916b409e.exe"C:\Users\Admin\AppData\Local\Temp\43f0682f83485ae3dd505a8e916b409e.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:1456
-
-
C:\Windows\SysWOW64\cmd.execmd /c set1⤵PID:2396
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all1⤵
- Gathers network information
PID:2944
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an1⤵
- Gathers network information
PID:1924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start1⤵PID:4820
-
C:\Windows\SysWOW64\net.exenet start1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD560d659f1e9526145ba2e508fec0a9069
SHA1add12bb829054f6c459365df6724cd0ed62bf426
SHA256a9797ae0ca0682f96fe979e7409f1d70f0233a8d9b324b7f12ee1636571b5a2f
SHA512b426c97a3c13563d765c383cbb818f8fe8c65af89193665a05b156abb1ffd1e854c1a6ba355c96da59f30c0d20ef9aa263fbdfd1d891a23b1dff88f9b58546ad