Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
9a6c81270e9d4047693fc5703370cc8f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a6c81270e9d4047693fc5703370cc8f.exe
Resource
win10v2004-20231215-en
General
-
Target
9a6c81270e9d4047693fc5703370cc8f.exe
-
Size
24KB
-
MD5
9a6c81270e9d4047693fc5703370cc8f
-
SHA1
6a44e5b71bb308e820927c69a8101722114f11a6
-
SHA256
553bd8b27964362c6da9d6e943f142612c486aeca99930e2e36a914300319e47
-
SHA512
95304f46b3ef9484d1ce3d07dd001ee0515daaad4fd7bc28ce1c0a3636a464b5cfe79fdf7cb272a7f2d3317e9c872175ba43ba99d2b0f23500f76c240c5a8b35
-
SSDEEP
384:E3eVES+/xwGkRKJ5lM61qmTTMVF9/q5/0:bGS+ZfbJ5O8qYoA8
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 9a6c81270e9d4047693fc5703370cc8f.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 9a6c81270e9d4047693fc5703370cc8f.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2760 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2816 NETSTAT.EXE 2640 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2760 tasklist.exe Token: SeDebugPrivilege 2816 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2148 9a6c81270e9d4047693fc5703370cc8f.exe 2148 9a6c81270e9d4047693fc5703370cc8f.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1548 2148 9a6c81270e9d4047693fc5703370cc8f.exe 28 PID 2148 wrote to memory of 1548 2148 9a6c81270e9d4047693fc5703370cc8f.exe 28 PID 2148 wrote to memory of 1548 2148 9a6c81270e9d4047693fc5703370cc8f.exe 28 PID 2148 wrote to memory of 1548 2148 9a6c81270e9d4047693fc5703370cc8f.exe 28 PID 1548 wrote to memory of 2844 1548 cmd.exe 30 PID 1548 wrote to memory of 2844 1548 cmd.exe 30 PID 1548 wrote to memory of 2844 1548 cmd.exe 30 PID 1548 wrote to memory of 2844 1548 cmd.exe 30 PID 1548 wrote to memory of 2640 1548 cmd.exe 31 PID 1548 wrote to memory of 2640 1548 cmd.exe 31 PID 1548 wrote to memory of 2640 1548 cmd.exe 31 PID 1548 wrote to memory of 2640 1548 cmd.exe 31 PID 1548 wrote to memory of 2760 1548 cmd.exe 32 PID 1548 wrote to memory of 2760 1548 cmd.exe 32 PID 1548 wrote to memory of 2760 1548 cmd.exe 32 PID 1548 wrote to memory of 2760 1548 cmd.exe 32 PID 1548 wrote to memory of 2556 1548 cmd.exe 34 PID 1548 wrote to memory of 2556 1548 cmd.exe 34 PID 1548 wrote to memory of 2556 1548 cmd.exe 34 PID 1548 wrote to memory of 2556 1548 cmd.exe 34 PID 2556 wrote to memory of 2784 2556 net.exe 35 PID 2556 wrote to memory of 2784 2556 net.exe 35 PID 2556 wrote to memory of 2784 2556 net.exe 35 PID 2556 wrote to memory of 2784 2556 net.exe 35 PID 1548 wrote to memory of 2816 1548 cmd.exe 36 PID 1548 wrote to memory of 2816 1548 cmd.exe 36 PID 1548 wrote to memory of 2816 1548 cmd.exe 36 PID 1548 wrote to memory of 2816 1548 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a6c81270e9d4047693fc5703370cc8f.exe"C:\Users\Admin\AppData\Local\Temp\9a6c81270e9d4047693fc5703370cc8f.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2844
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2640
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2784
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5a03bf0eb4bebd32177d2e96c96abbeeb
SHA1e0966a6fde8123a5cc305eaf33f6f5d7b1430141
SHA256d4bcebda6bb31e4043d236e0a91895ce2a249fb5a4f1f489f7b1004ba605424a
SHA512b1d9be7314127985383626f5e6b1e6ddf67e62eb79c8d1393f973e4f381f4a4ffd38c418b699d3c4b2882b5daa111a6d3ebf4d95a9f70fa91634621a5a52063b