Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
b797d122dee68012e41d4eef6d6fabc7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b797d122dee68012e41d4eef6d6fabc7.exe
Resource
win10v2004-20240226-en
General
-
Target
b797d122dee68012e41d4eef6d6fabc7.exe
-
Size
24KB
-
MD5
b797d122dee68012e41d4eef6d6fabc7
-
SHA1
13b45d122b41135a4e347a7c77d17a8bb6427c17
-
SHA256
2da26109255cea5679100a9f5c60887ebbb93bc00cf7bc6badcd543446a110ba
-
SHA512
c1a131e9eb5200c2e0516a401601b7c174feb0c2081acf11827ca42620ec651ef2d9eeed08a64b594251b44ef8f50dd1a3717ffa7c740b7a9c37fd19fcfd5674
-
SSDEEP
384:E3eVES+/xwGkRKJQ4DblM61qmTTMVF9/q5L0:bGS+ZfbJZbO8qYoAA
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" b797d122dee68012e41d4eef6d6fabc7.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe b797d122dee68012e41d4eef6d6fabc7.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4388 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2020 NETSTAT.EXE 2040 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4388 tasklist.exe Token: SeDebugPrivilege 2020 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4820 b797d122dee68012e41d4eef6d6fabc7.exe 4820 b797d122dee68012e41d4eef6d6fabc7.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4820 wrote to memory of 2396 4820 b797d122dee68012e41d4eef6d6fabc7.exe 88 PID 4820 wrote to memory of 2396 4820 b797d122dee68012e41d4eef6d6fabc7.exe 88 PID 4820 wrote to memory of 2396 4820 b797d122dee68012e41d4eef6d6fabc7.exe 88 PID 2396 wrote to memory of 4252 2396 cmd.exe 90 PID 2396 wrote to memory of 4252 2396 cmd.exe 90 PID 2396 wrote to memory of 4252 2396 cmd.exe 90 PID 2396 wrote to memory of 2040 2396 cmd.exe 91 PID 2396 wrote to memory of 2040 2396 cmd.exe 91 PID 2396 wrote to memory of 2040 2396 cmd.exe 91 PID 2396 wrote to memory of 4388 2396 cmd.exe 92 PID 2396 wrote to memory of 4388 2396 cmd.exe 92 PID 2396 wrote to memory of 4388 2396 cmd.exe 92 PID 2396 wrote to memory of 1788 2396 cmd.exe 95 PID 2396 wrote to memory of 1788 2396 cmd.exe 95 PID 2396 wrote to memory of 1788 2396 cmd.exe 95 PID 1788 wrote to memory of 2192 1788 net.exe 97 PID 1788 wrote to memory of 2192 1788 net.exe 97 PID 1788 wrote to memory of 2192 1788 net.exe 97 PID 2396 wrote to memory of 2020 2396 cmd.exe 98 PID 2396 wrote to memory of 2020 2396 cmd.exe 98 PID 2396 wrote to memory of 2020 2396 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\b797d122dee68012e41d4eef6d6fabc7.exe"C:\Users\Admin\AppData\Local\Temp\b797d122dee68012e41d4eef6d6fabc7.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:4252
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2040
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2192
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD51b622d59fdad3c7848fa9c941c8624c7
SHA1a22cf8057eef859139b824c1202007b3beef35c7
SHA256fa1ce2d31a42be55ef010e78222af4c4ecee95a2ad44da7be8506c4f1a5d5d97
SHA5122a3b1e21236869223774019f9d8d3898cd671a363f5fec02f4b9b63fba39ab851773738d134389a8359655875715aa4a191707573ba837b93702d3f94ea81310