Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:49
Static task
static1
Behavioral task
behavioral1
Sample
75224889052303d6957df2a245c8f1c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75224889052303d6957df2a245c8f1c6.exe
Resource
win10v2004-20231215-en
General
-
Target
75224889052303d6957df2a245c8f1c6.exe
-
Size
24KB
-
MD5
75224889052303d6957df2a245c8f1c6
-
SHA1
79d79d01d5a4cb2d175756b20357ee8266eee9d4
-
SHA256
33f043312c6c19078478d8d511bda5658bd2833dece84b8bcc65f883d846c0bb
-
SHA512
60a4635db483f1229e7658bb84089e9ae8e03297aafd49ff887f3aad00384460e7b087f2b5e67de4d0d55ca5456d227f63a0b35f3bfa85fb70cb16a1b8b95e4a
-
SSDEEP
384:E3eVES+/xwGkRKJ0gDrOUlM61qmTTMVF9/q5h0:bGS+ZfbJLWUO8qYoA+
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 75224889052303d6957df2a245c8f1c6.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 75224889052303d6957df2a245c8f1c6.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3592 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4596 ipconfig.exe 2264 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3592 tasklist.exe Token: SeDebugPrivilege 2264 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3384 75224889052303d6957df2a245c8f1c6.exe 3384 75224889052303d6957df2a245c8f1c6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3384 wrote to memory of 3180 3384 75224889052303d6957df2a245c8f1c6.exe 87 PID 3384 wrote to memory of 3180 3384 75224889052303d6957df2a245c8f1c6.exe 87 PID 3384 wrote to memory of 3180 3384 75224889052303d6957df2a245c8f1c6.exe 87 PID 3180 wrote to memory of 4860 3180 cmd.exe 89 PID 3180 wrote to memory of 4860 3180 cmd.exe 89 PID 3180 wrote to memory of 4860 3180 cmd.exe 89 PID 3180 wrote to memory of 4596 3180 cmd.exe 90 PID 3180 wrote to memory of 4596 3180 cmd.exe 90 PID 3180 wrote to memory of 4596 3180 cmd.exe 90 PID 3180 wrote to memory of 3592 3180 cmd.exe 92 PID 3180 wrote to memory of 3592 3180 cmd.exe 92 PID 3180 wrote to memory of 3592 3180 cmd.exe 92 PID 3180 wrote to memory of 652 3180 cmd.exe 94 PID 3180 wrote to memory of 652 3180 cmd.exe 94 PID 3180 wrote to memory of 652 3180 cmd.exe 94 PID 652 wrote to memory of 2796 652 net.exe 95 PID 652 wrote to memory of 2796 652 net.exe 95 PID 652 wrote to memory of 2796 652 net.exe 95 PID 3180 wrote to memory of 2264 3180 cmd.exe 96 PID 3180 wrote to memory of 2264 3180 cmd.exe 96 PID 3180 wrote to memory of 2264 3180 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\75224889052303d6957df2a245c8f1c6.exe"C:\Users\Admin\AppData\Local\Temp\75224889052303d6957df2a245c8f1c6.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:4860
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4596
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2796
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5ab30baedde758b300938e40f88a97445
SHA1852e0f5a555bc12be84ea1b9dfa6c335fb05506f
SHA2568bf6ff41961d1f6ce3703953251a55bf71fc651a7534f55db4cbbb0c50ae8d33
SHA512bd840b9434a0e1a3496b0c97d4d1d8a23054238cd915eb93ec39b72b11f9d1edf19f86b342c1715a608186b541216eed4b1182dad62e77520b23fae6f1659092