Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 17:31
Static task
static1
Behavioral task
behavioral1
Sample
8ced149198b6ac0543192ba3f9393328.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ced149198b6ac0543192ba3f9393328.exe
Resource
win10v2004-20231215-en
General
-
Target
8ced149198b6ac0543192ba3f9393328.exe
-
Size
24KB
-
MD5
8ced149198b6ac0543192ba3f9393328
-
SHA1
9189767a4f415b57d3c639e1de27ef9643e61d56
-
SHA256
335c29de75eed3033213e7005a82e72d228c843d821af81201710f345373730c
-
SHA512
d9fef993e35341215790b907dff4a11d021a572b507247bf21bbb982a2068b87f9c21e31a2d490c6450a5ffd023c5bb19918695b5e75ca4f9c911e0865363e60
-
SSDEEP
384:E3eVES+/xwGkRKJXzlM61qmTTMVF9/q5v0:bGS+ZfbJXzO8qYoAM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 8ced149198b6ac0543192ba3f9393328.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 8ced149198b6ac0543192ba3f9393328.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2712 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2416 ipconfig.exe 2076 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2712 tasklist.exe Token: SeDebugPrivilege 2076 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2236 8ced149198b6ac0543192ba3f9393328.exe 2236 8ced149198b6ac0543192ba3f9393328.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2260 2236 8ced149198b6ac0543192ba3f9393328.exe 28 PID 2236 wrote to memory of 2260 2236 8ced149198b6ac0543192ba3f9393328.exe 28 PID 2236 wrote to memory of 2260 2236 8ced149198b6ac0543192ba3f9393328.exe 28 PID 2236 wrote to memory of 2260 2236 8ced149198b6ac0543192ba3f9393328.exe 28 PID 2260 wrote to memory of 2772 2260 cmd.exe 30 PID 2260 wrote to memory of 2772 2260 cmd.exe 30 PID 2260 wrote to memory of 2772 2260 cmd.exe 30 PID 2260 wrote to memory of 2772 2260 cmd.exe 30 PID 2260 wrote to memory of 2416 2260 cmd.exe 31 PID 2260 wrote to memory of 2416 2260 cmd.exe 31 PID 2260 wrote to memory of 2416 2260 cmd.exe 31 PID 2260 wrote to memory of 2416 2260 cmd.exe 31 PID 2260 wrote to memory of 2712 2260 cmd.exe 32 PID 2260 wrote to memory of 2712 2260 cmd.exe 32 PID 2260 wrote to memory of 2712 2260 cmd.exe 32 PID 2260 wrote to memory of 2712 2260 cmd.exe 32 PID 2260 wrote to memory of 2136 2260 cmd.exe 34 PID 2260 wrote to memory of 2136 2260 cmd.exe 34 PID 2260 wrote to memory of 2136 2260 cmd.exe 34 PID 2260 wrote to memory of 2136 2260 cmd.exe 34 PID 2136 wrote to memory of 2844 2136 net.exe 35 PID 2136 wrote to memory of 2844 2136 net.exe 35 PID 2136 wrote to memory of 2844 2136 net.exe 35 PID 2136 wrote to memory of 2844 2136 net.exe 35 PID 2260 wrote to memory of 2076 2260 cmd.exe 36 PID 2260 wrote to memory of 2076 2260 cmd.exe 36 PID 2260 wrote to memory of 2076 2260 cmd.exe 36 PID 2260 wrote to memory of 2076 2260 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ced149198b6ac0543192ba3f9393328.exe"C:\Users\Admin\AppData\Local\Temp\8ced149198b6ac0543192ba3f9393328.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2772
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2416
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2844
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5370483edd0a183255188b4770a66387b
SHA189751a3971929668469cee4d1aa289a44ccbd22b
SHA256454c6685f5b50dd3d8a157f33b64ff523afcad817cada5129b9a955a6d777b7a
SHA512e96dcff2d856679ab5644a15baa21c3e2c14f0df64575a6f9780a4423ec17c9b8cc87aa0eb53e1c73fcac284debf07cc45c2f9817feeffe7e8b0b371c3e21852