Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
4bc2a1b3f8854d670fe76a4d6d98f93b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4bc2a1b3f8854d670fe76a4d6d98f93b.exe
Resource
win10v2004-20231222-en
General
-
Target
4bc2a1b3f8854d670fe76a4d6d98f93b.exe
-
Size
24KB
-
MD5
4bc2a1b3f8854d670fe76a4d6d98f93b
-
SHA1
d85d146437b18ac7165dbcb40190f8cf66af6287
-
SHA256
04f8a0521dc56a4651d0f32af23703be51c70b431a3fe072bbcbe0018376885a
-
SHA512
84a39fff5884b682da7a6c27ef065109c93307e43d018d7aee5d8c7eb28b019d1403df1c7fc438df1c0e6ffb072918026a4e2423297f4401859aabd43b0713cc
-
SSDEEP
384:E3eVES+/xwGkRKJilM61qmTTMVF9/q5U0:bGS+ZfbJiO8qYoAV
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 4bc2a1b3f8854d670fe76a4d6d98f93b.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 4bc2a1b3f8854d670fe76a4d6d98f93b.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 828 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4956 NETSTAT.EXE 2336 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 828 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5088 4bc2a1b3f8854d670fe76a4d6d98f93b.exe 5088 4bc2a1b3f8854d670fe76a4d6d98f93b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5088 wrote to memory of 2364 5088 4bc2a1b3f8854d670fe76a4d6d98f93b.exe 27 PID 5088 wrote to memory of 2364 5088 4bc2a1b3f8854d670fe76a4d6d98f93b.exe 27 PID 5088 wrote to memory of 2364 5088 4bc2a1b3f8854d670fe76a4d6d98f93b.exe 27 PID 2364 wrote to memory of 2096 2364 cmd.exe 17 PID 2364 wrote to memory of 2096 2364 cmd.exe 17 PID 2364 wrote to memory of 2096 2364 cmd.exe 17 PID 2364 wrote to memory of 2336 2364 cmd.exe 26 PID 2364 wrote to memory of 2336 2364 cmd.exe 26 PID 2364 wrote to memory of 2336 2364 cmd.exe 26 PID 2364 wrote to memory of 828 2364 cmd.exe 18 PID 2364 wrote to memory of 828 2364 cmd.exe 18 PID 2364 wrote to memory of 828 2364 cmd.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bc2a1b3f8854d670fe76a4d6d98f93b.exe"C:\Users\Admin\AppData\Local\Temp\4bc2a1b3f8854d670fe76a4d6d98f93b.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2364
-
-
C:\Windows\SysWOW64\cmd.execmd /c set1⤵PID:2096
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start1⤵PID:4540
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an1⤵
- Gathers network information
PID:4956
-
C:\Windows\SysWOW64\net.exenet start1⤵PID:396
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all1⤵
- Gathers network information
PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5e392818f690e24b9123291e2c934a26f
SHA14bae6b28cca7fc052697fd372fe1a66b39c1d7ca
SHA2565372f8da9ffac221d584f8b4d59c0d02a401a1c52fe16fff830bfc4261573f19
SHA512f3f9177f57efb010e8a90a2e4c67cd60439ec2f68d91f82c656e7a7a91415e60777f4168546cc5b904e3c576c63aedec15f637729c61aee83d62626f26c99209