Overview
overview
7Static
static
3geode-inst...in.exe
windows7-x64
7geode-inst...in.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Geode.dll
windows7-x64
1Geode.dll
windows10-2004-x64
1GeodeUninstaller.exe
windows7-x64
7GeodeUninstaller.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3GeodeUpdater.exe
windows7-x64
1GeodeUpdater.exe
windows10-2004-x64
1VC_redist.x86.exe
windows7-x64
4VC_redist.x86.exe
windows10-2004-x64
4XInput9_1_0.dll
windows7-x64
1XInput9_1_0.dll
windows10-2004-x64
1Analysis
-
max time kernel
131s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-02-2024 11:01
Static task
static1
Behavioral task
behavioral1
Sample
geode-installer-v2.0.0-beta.19-win.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
geode-installer-v2.0.0-beta.19-win.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
Geode.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Geode.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
GeodeUninstaller.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
GeodeUninstaller.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
GeodeUpdater.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
GeodeUpdater.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
VC_redist.x86.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
VC_redist.x86.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
XInput9_1_0.dll
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
XInput9_1_0.dll
Resource
win10v2004-20231215-en
General
-
Target
geode-installer-v2.0.0-beta.19-win.exe
-
Size
25.8MB
-
MD5
7ed868c7785936197054c0a8ae724311
-
SHA1
80a2ae57a8b662554f889fecbf4602d9dfbb61c0
-
SHA256
0de54ccd8146146f7b7b5e92885b919779e2e923b2a12319f258d2e32d7777cd
-
SHA512
1f744301081c7f0380f91db86e57b60eb6fff9772a5d8b1c94d70736687044507c57bd483fb21fbe597846f2fd13413e1c82f2b59c6d6739b68d8263de62d177
-
SSDEEP
786432:uBhwPIbvjArPw7d81ntXB7Ep+zJfKcf2zuP9o:utbcM7S1ntXB7E4zH289o
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
Processes:
geode-installer-v2.0.0-beta.19-win.exepid process 2276 geode-installer-v2.0.0-beta.19-win.exe 2276 geode-installer-v2.0.0-beta.19-win.exe 2276 geode-installer-v2.0.0-beta.19-win.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2760 chrome.exe 2760 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
geode-installer-v2.0.0-beta.19-win.exepid process 2276 geode-installer-v2.0.0-beta.19-win.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
Processes:
chrome.exepid process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
chrome.exepid process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2760 wrote to memory of 2728 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2728 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2728 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2064 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 1944 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 1944 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 1944 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe PID 2760 wrote to memory of 2932 2760 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\geode-installer-v2.0.0-beta.19-win.exe"C:\Users\Admin\AppData\Local\Temp\geode-installer-v2.0.0-beta.19-win.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2276
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6649758,0x7fef6649768,0x7fef66497782⤵PID:2728
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1096 --field-trial-handle=1312,i,5963077247328197615,14657358913447043008,131072 /prefetch:22⤵PID:2064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1312,i,5963077247328197615,14657358913447043008,131072 /prefetch:82⤵PID:1944
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1532 --field-trial-handle=1312,i,5963077247328197615,14657358913447043008,131072 /prefetch:82⤵PID:2932
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1312,i,5963077247328197615,14657358913447043008,131072 /prefetch:12⤵PID:1208
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1312,i,5963077247328197615,14657358913447043008,131072 /prefetch:12⤵PID:1892
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1464 --field-trial-handle=1312,i,5963077247328197615,14657358913447043008,131072 /prefetch:22⤵PID:2108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3212 --field-trial-handle=1312,i,5963077247328197615,14657358913447043008,131072 /prefetch:12⤵PID:1516
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD59c48008bb795f1981ae487766beafa75
SHA1cc2a22e120acabf952fd6462fe0b68c16b4f6471
SHA25637e7b3772b19ef814bc092b76603ebdfe2133258ff8b43a2724e6cc068f2e543
SHA5127fb6443c154478187aa023b9fc8956d968f65da15c3c914ca91c3adffcd6586dd9b69094e9625362208e7bfc539a101b4b048820bf00c18e279222c93901f469
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
5KB
MD550016010fb0d8db2bc4cd258ceb43be5
SHA144ba95ee12e69da72478cf358c93533a9c7a01dc
SHA25632230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e
SHA512ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
Filesize
9KB
MD51d8f01a83ddd259bc339902c1d33c8f1
SHA19f7806af462c94c39e2ec6cc9c7ad05c44eba04e
SHA2564b7d17da290f41ebe244827cc295ce7e580da2f7e9f7cc3efc1abc6898e3c9ed
SHA51228bf647374b4b500a0f3dbced70c2b256f93940e2b39160512e6e486ac31d1d90945acecef578f61b0a501f27c7106b6ffc3deab2ec3bfb3d9af24c9449a1567