Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
9b82dbcdef378b319b956047daff7956.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9b82dbcdef378b319b956047daff7956.exe
Resource
win10v2004-20231215-en
General
-
Target
9b82dbcdef378b319b956047daff7956.exe
-
Size
24KB
-
MD5
9b82dbcdef378b319b956047daff7956
-
SHA1
269647b3bd5f6bfb5f40d52f5e682b3a4250c7b5
-
SHA256
aee87ab11d89ee8fceafdbe48882de46654cd6b07e8ace1c2268b1c12ab8864a
-
SHA512
c9d0f647cb5668452764b5d4702cd2d5f3f4b391370dc333090f5da53010054c0d2328815df81e0b486a8cf93228f49996a24604bfa0a04b81f9ef8df280e260
-
SSDEEP
384:E3eVES+/xwGkRKJrblM61qmTTMVF9/q5jk0:bGS+ZfbJvO8qYoAB
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 9b82dbcdef378b319b956047daff7956.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 9b82dbcdef378b319b956047daff7956.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1880 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2724 NETSTAT.EXE 2952 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1880 tasklist.exe Token: SeDebugPrivilege 2724 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2360 9b82dbcdef378b319b956047daff7956.exe 2360 9b82dbcdef378b319b956047daff7956.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2220 2360 9b82dbcdef378b319b956047daff7956.exe 28 PID 2360 wrote to memory of 2220 2360 9b82dbcdef378b319b956047daff7956.exe 28 PID 2360 wrote to memory of 2220 2360 9b82dbcdef378b319b956047daff7956.exe 28 PID 2360 wrote to memory of 2220 2360 9b82dbcdef378b319b956047daff7956.exe 28 PID 2220 wrote to memory of 2892 2220 cmd.exe 30 PID 2220 wrote to memory of 2892 2220 cmd.exe 30 PID 2220 wrote to memory of 2892 2220 cmd.exe 30 PID 2220 wrote to memory of 2892 2220 cmd.exe 30 PID 2220 wrote to memory of 2952 2220 cmd.exe 31 PID 2220 wrote to memory of 2952 2220 cmd.exe 31 PID 2220 wrote to memory of 2952 2220 cmd.exe 31 PID 2220 wrote to memory of 2952 2220 cmd.exe 31 PID 2220 wrote to memory of 1880 2220 cmd.exe 32 PID 2220 wrote to memory of 1880 2220 cmd.exe 32 PID 2220 wrote to memory of 1880 2220 cmd.exe 32 PID 2220 wrote to memory of 1880 2220 cmd.exe 32 PID 2220 wrote to memory of 2640 2220 cmd.exe 34 PID 2220 wrote to memory of 2640 2220 cmd.exe 34 PID 2220 wrote to memory of 2640 2220 cmd.exe 34 PID 2220 wrote to memory of 2640 2220 cmd.exe 34 PID 2640 wrote to memory of 2644 2640 net.exe 35 PID 2640 wrote to memory of 2644 2640 net.exe 35 PID 2640 wrote to memory of 2644 2640 net.exe 35 PID 2640 wrote to memory of 2644 2640 net.exe 35 PID 2220 wrote to memory of 2724 2220 cmd.exe 36 PID 2220 wrote to memory of 2724 2220 cmd.exe 36 PID 2220 wrote to memory of 2724 2220 cmd.exe 36 PID 2220 wrote to memory of 2724 2220 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b82dbcdef378b319b956047daff7956.exe"C:\Users\Admin\AppData\Local\Temp\9b82dbcdef378b319b956047daff7956.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2892
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2952
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2644
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5fa49c1f40208baa4ed3d6d982f5ca072
SHA14595484505f436f1b0e3aea99bd98c1972f2b8df
SHA25675c343217747e354524792055ba3b16d72cd3699fa90e4b4cfd0a3eb10255573
SHA512b31a77e64b5eb163f78c81c17c609904f8d40296a6f112b2032376ed899f825c78d27397ab439c93404d6e97e0047bd7198302e4f8b1e0f82a13562227c2ac23