Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
bc5191f949e6580061ae90f56d83266b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc5191f949e6580061ae90f56d83266b.exe
Resource
win10v2004-20240226-en
General
-
Target
bc5191f949e6580061ae90f56d83266b.exe
-
Size
24KB
-
MD5
bc5191f949e6580061ae90f56d83266b
-
SHA1
4c202f0e14bd3b9132895e838085c47bb2251077
-
SHA256
639c4e1a77e91073efcd55180cc8171062b49442cb829ccc960688cdb34c1b05
-
SHA512
deb1f045824d2629bcfcffe7431321a6f3cc669e0ae805904097238571c460fadd21b0cdb0a2afc92b97dccbe46d5c4448e0da147026b47b81f2e27559ddaa08
-
SSDEEP
384:E3eVES+/xwGkRKJKgr6slM61qmTTMVF9/q5/0:bGS+ZfbJKgHO8qYoA8
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" bc5191f949e6580061ae90f56d83266b.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe bc5191f949e6580061ae90f56d83266b.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2576 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3032 ipconfig.exe 2520 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2576 tasklist.exe Token: SeDebugPrivilege 2520 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2232 bc5191f949e6580061ae90f56d83266b.exe 2232 bc5191f949e6580061ae90f56d83266b.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1692 2232 bc5191f949e6580061ae90f56d83266b.exe 28 PID 2232 wrote to memory of 1692 2232 bc5191f949e6580061ae90f56d83266b.exe 28 PID 2232 wrote to memory of 1692 2232 bc5191f949e6580061ae90f56d83266b.exe 28 PID 2232 wrote to memory of 1692 2232 bc5191f949e6580061ae90f56d83266b.exe 28 PID 1692 wrote to memory of 2716 1692 cmd.exe 30 PID 1692 wrote to memory of 2716 1692 cmd.exe 30 PID 1692 wrote to memory of 2716 1692 cmd.exe 30 PID 1692 wrote to memory of 2716 1692 cmd.exe 30 PID 1692 wrote to memory of 3032 1692 cmd.exe 31 PID 1692 wrote to memory of 3032 1692 cmd.exe 31 PID 1692 wrote to memory of 3032 1692 cmd.exe 31 PID 1692 wrote to memory of 3032 1692 cmd.exe 31 PID 1692 wrote to memory of 2576 1692 cmd.exe 32 PID 1692 wrote to memory of 2576 1692 cmd.exe 32 PID 1692 wrote to memory of 2576 1692 cmd.exe 32 PID 1692 wrote to memory of 2576 1692 cmd.exe 32 PID 1692 wrote to memory of 2368 1692 cmd.exe 34 PID 1692 wrote to memory of 2368 1692 cmd.exe 34 PID 1692 wrote to memory of 2368 1692 cmd.exe 34 PID 1692 wrote to memory of 2368 1692 cmd.exe 34 PID 2368 wrote to memory of 2124 2368 net.exe 35 PID 2368 wrote to memory of 2124 2368 net.exe 35 PID 2368 wrote to memory of 2124 2368 net.exe 35 PID 2368 wrote to memory of 2124 2368 net.exe 35 PID 1692 wrote to memory of 2520 1692 cmd.exe 36 PID 1692 wrote to memory of 2520 1692 cmd.exe 36 PID 1692 wrote to memory of 2520 1692 cmd.exe 36 PID 1692 wrote to memory of 2520 1692 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc5191f949e6580061ae90f56d83266b.exe"C:\Users\Admin\AppData\Local\Temp\bc5191f949e6580061ae90f56d83266b.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2716
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:3032
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2124
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD52ff869d131053c0d3ca070da2cd9fb91
SHA19fbe1bc6bd6accf0c4f0421aa8fc3ce3569750d8
SHA256c205e3df3f0d139919a6f8f5bff4a76f214d488d0f8736c6a222dddedd3a0414
SHA512287405345dde0127739e1c90031c1ab0efc5c6ece69ba792489ba0c8316b6f2caf18f1b30d3359f6809d62b0cad7bef5bc3b64af341d0026c06bba5ee839d89b