Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
b48e765d7f061f96a521740d8d4220a4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b48e765d7f061f96a521740d8d4220a4.exe
Resource
win10v2004-20240226-en
General
-
Target
b48e765d7f061f96a521740d8d4220a4.exe
-
Size
24KB
-
MD5
b48e765d7f061f96a521740d8d4220a4
-
SHA1
88d48d7a6084208d55ee28791cff573af5bcc583
-
SHA256
a3aeb5aaec19bd9197d6a1e509d000ccce59971b65d11dead4f7f687753a99fd
-
SHA512
96e851944f4f95c65301ac2b6f18d83af36b8f5f9c8f80d7f76aa03b5b63ad12253b04d9288b0605ac6bc290c2258c0cd4a60421dd23bb2a4653136ba28f07d4
-
SSDEEP
384:E3eVES+/xwGkRKJilM61qmTTMVF9/q5O0:bGS+ZfbJiO8qYoAn
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" b48e765d7f061f96a521740d8d4220a4.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe b48e765d7f061f96a521740d8d4220a4.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 984 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4316 ipconfig.exe 2788 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 984 tasklist.exe Token: SeDebugPrivilege 2788 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1100 b48e765d7f061f96a521740d8d4220a4.exe 1100 b48e765d7f061f96a521740d8d4220a4.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1100 wrote to memory of 4484 1100 b48e765d7f061f96a521740d8d4220a4.exe 88 PID 1100 wrote to memory of 4484 1100 b48e765d7f061f96a521740d8d4220a4.exe 88 PID 1100 wrote to memory of 4484 1100 b48e765d7f061f96a521740d8d4220a4.exe 88 PID 4484 wrote to memory of 4020 4484 cmd.exe 90 PID 4484 wrote to memory of 4020 4484 cmd.exe 90 PID 4484 wrote to memory of 4020 4484 cmd.exe 90 PID 4484 wrote to memory of 4316 4484 cmd.exe 91 PID 4484 wrote to memory of 4316 4484 cmd.exe 91 PID 4484 wrote to memory of 4316 4484 cmd.exe 91 PID 4484 wrote to memory of 984 4484 cmd.exe 93 PID 4484 wrote to memory of 984 4484 cmd.exe 93 PID 4484 wrote to memory of 984 4484 cmd.exe 93 PID 4484 wrote to memory of 3644 4484 cmd.exe 97 PID 4484 wrote to memory of 3644 4484 cmd.exe 97 PID 4484 wrote to memory of 3644 4484 cmd.exe 97 PID 3644 wrote to memory of 4896 3644 net.exe 98 PID 3644 wrote to memory of 4896 3644 net.exe 98 PID 3644 wrote to memory of 4896 3644 net.exe 98 PID 4484 wrote to memory of 2788 4484 cmd.exe 99 PID 4484 wrote to memory of 2788 4484 cmd.exe 99 PID 4484 wrote to memory of 2788 4484 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b48e765d7f061f96a521740d8d4220a4.exe"C:\Users\Admin\AppData\Local\Temp\b48e765d7f061f96a521740d8d4220a4.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:4020
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4316
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:4896
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD535bdf63280240fd73743f08a5cf3d598
SHA1d16789420b358dce463f17407ae1b38ddfa021af
SHA25669b00aaee5629d9fcd9b62cef28d70a582592ad1c0869a0147084568abc94211
SHA512f65a8fc64de8974fff577b1ea67eef6c37345414696bd869c8e281eea96c1b76727a4a44d97d074a540c61bc26d81a7bf1d2948c77d7c9e7cd13b58f5664020e