Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:49
Static task
static1
Behavioral task
behavioral1
Sample
75224889052303d6957df2a245c8f1c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75224889052303d6957df2a245c8f1c6.exe
Resource
win10v2004-20231215-en
General
-
Target
75224889052303d6957df2a245c8f1c6.exe
-
Size
24KB
-
MD5
75224889052303d6957df2a245c8f1c6
-
SHA1
79d79d01d5a4cb2d175756b20357ee8266eee9d4
-
SHA256
33f043312c6c19078478d8d511bda5658bd2833dece84b8bcc65f883d846c0bb
-
SHA512
60a4635db483f1229e7658bb84089e9ae8e03297aafd49ff887f3aad00384460e7b087f2b5e67de4d0d55ca5456d227f63a0b35f3bfa85fb70cb16a1b8b95e4a
-
SSDEEP
384:E3eVES+/xwGkRKJ0gDrOUlM61qmTTMVF9/q5h0:bGS+ZfbJLWUO8qYoA+
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 75224889052303d6957df2a245c8f1c6.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 75224889052303d6957df2a245c8f1c6.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1660 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2200 ipconfig.exe 2796 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1660 tasklist.exe Token: SeDebugPrivilege 2796 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2536 75224889052303d6957df2a245c8f1c6.exe 2536 75224889052303d6957df2a245c8f1c6.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2204 2536 75224889052303d6957df2a245c8f1c6.exe 28 PID 2536 wrote to memory of 2204 2536 75224889052303d6957df2a245c8f1c6.exe 28 PID 2536 wrote to memory of 2204 2536 75224889052303d6957df2a245c8f1c6.exe 28 PID 2536 wrote to memory of 2204 2536 75224889052303d6957df2a245c8f1c6.exe 28 PID 2204 wrote to memory of 2188 2204 cmd.exe 30 PID 2204 wrote to memory of 2188 2204 cmd.exe 30 PID 2204 wrote to memory of 2188 2204 cmd.exe 30 PID 2204 wrote to memory of 2188 2204 cmd.exe 30 PID 2204 wrote to memory of 2200 2204 cmd.exe 31 PID 2204 wrote to memory of 2200 2204 cmd.exe 31 PID 2204 wrote to memory of 2200 2204 cmd.exe 31 PID 2204 wrote to memory of 2200 2204 cmd.exe 31 PID 2204 wrote to memory of 1660 2204 cmd.exe 32 PID 2204 wrote to memory of 1660 2204 cmd.exe 32 PID 2204 wrote to memory of 1660 2204 cmd.exe 32 PID 2204 wrote to memory of 1660 2204 cmd.exe 32 PID 2204 wrote to memory of 2772 2204 cmd.exe 34 PID 2204 wrote to memory of 2772 2204 cmd.exe 34 PID 2204 wrote to memory of 2772 2204 cmd.exe 34 PID 2204 wrote to memory of 2772 2204 cmd.exe 34 PID 2772 wrote to memory of 2776 2772 net.exe 35 PID 2772 wrote to memory of 2776 2772 net.exe 35 PID 2772 wrote to memory of 2776 2772 net.exe 35 PID 2772 wrote to memory of 2776 2772 net.exe 35 PID 2204 wrote to memory of 2796 2204 cmd.exe 36 PID 2204 wrote to memory of 2796 2204 cmd.exe 36 PID 2204 wrote to memory of 2796 2204 cmd.exe 36 PID 2204 wrote to memory of 2796 2204 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\75224889052303d6957df2a245c8f1c6.exe"C:\Users\Admin\AppData\Local\Temp\75224889052303d6957df2a245c8f1c6.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2188
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2200
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2776
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD53e7af06fb180a06ca9e968f7fb3d0484
SHA1a2ec30635ad4d0bb7eb03e8267f73e93daffb777
SHA2567aa5d8a28b67f321fc5c9d994c07410f4e8e1e46325197b99d3286dfd180bb30
SHA5127b82d20b9b55c889bca8353b87e174c23d08245c6aa789e765f55c85f49e0d0d1b91889e81b05c9b6cf274a005266d3c19e878ecc3f8dac29e06d2b04a23b895