Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
75aa4c6abb4836efdfbcb31f96a2b2c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75aa4c6abb4836efdfbcb31f96a2b2c6.exe
Resource
win10v2004-20231222-en
General
-
Target
75aa4c6abb4836efdfbcb31f96a2b2c6.exe
-
Size
24KB
-
MD5
75aa4c6abb4836efdfbcb31f96a2b2c6
-
SHA1
a39a0c9b54be7d228d8055d5d75400192a7f5ef3
-
SHA256
abcc08aa660f2667d68ff1a038d00f23e810669b807f9dcf368bd7e031b488f6
-
SHA512
677af12f0cce1a37b935df3124dbb9f32b5903cd49ddc65ef70cebd079aa752729f3577d30ab915101f7a9e1b9194bd0d932ecd164bda426d592e8c274133af3
-
SSDEEP
384:E3eVES+/xwGkRKJilM61qmTTMVF9/q5g0:bGS+ZfbJiO8qYoAZ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 75aa4c6abb4836efdfbcb31f96a2b2c6.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 75aa4c6abb4836efdfbcb31f96a2b2c6.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1840 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 5064 ipconfig.exe 692 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1840 tasklist.exe Token: SeDebugPrivilege 692 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4616 75aa4c6abb4836efdfbcb31f96a2b2c6.exe 4616 75aa4c6abb4836efdfbcb31f96a2b2c6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4992 4616 75aa4c6abb4836efdfbcb31f96a2b2c6.exe 84 PID 4616 wrote to memory of 4992 4616 75aa4c6abb4836efdfbcb31f96a2b2c6.exe 84 PID 4616 wrote to memory of 4992 4616 75aa4c6abb4836efdfbcb31f96a2b2c6.exe 84 PID 4992 wrote to memory of 3732 4992 cmd.exe 86 PID 4992 wrote to memory of 3732 4992 cmd.exe 86 PID 4992 wrote to memory of 3732 4992 cmd.exe 86 PID 4992 wrote to memory of 5064 4992 cmd.exe 87 PID 4992 wrote to memory of 5064 4992 cmd.exe 87 PID 4992 wrote to memory of 5064 4992 cmd.exe 87 PID 4992 wrote to memory of 1840 4992 cmd.exe 88 PID 4992 wrote to memory of 1840 4992 cmd.exe 88 PID 4992 wrote to memory of 1840 4992 cmd.exe 88 PID 4992 wrote to memory of 2768 4992 cmd.exe 92 PID 4992 wrote to memory of 2768 4992 cmd.exe 92 PID 4992 wrote to memory of 2768 4992 cmd.exe 92 PID 2768 wrote to memory of 208 2768 net.exe 93 PID 2768 wrote to memory of 208 2768 net.exe 93 PID 2768 wrote to memory of 208 2768 net.exe 93 PID 4992 wrote to memory of 692 4992 cmd.exe 94 PID 4992 wrote to memory of 692 4992 cmd.exe 94 PID 4992 wrote to memory of 692 4992 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\75aa4c6abb4836efdfbcb31f96a2b2c6.exe"C:\Users\Admin\AppData\Local\Temp\75aa4c6abb4836efdfbcb31f96a2b2c6.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:3732
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:5064
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:208
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5d3462adda4b24b1eed00aa1c1c64f694
SHA13919ef72c4d32cbe4dd593774331a6292a404a5c
SHA2567db748e4edd014f84af9dcf9dab6bd43322284ea66ae56db1f1484ccd59f99c3
SHA512433597e395d7b721db2cbf2e7c7957f720cb15ca652b5e5412a885b8a70fe60031b4a8493ed6d44c31558c27471ba130ad9e9889e5cf2ead7da930ceadca55e9