Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
c4bd3c726364fd4b9d18041fe37b33cb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4bd3c726364fd4b9d18041fe37b33cb.exe
Resource
win10v2004-20231215-en
General
-
Target
c4bd3c726364fd4b9d18041fe37b33cb.exe
-
Size
24KB
-
MD5
c4bd3c726364fd4b9d18041fe37b33cb
-
SHA1
7eacdcbd33a7a43f142905b0b0c965ffebcee625
-
SHA256
c82a0063581ad97011b5f65395a37db5b51d469946599544bdd91fe6bcef9e88
-
SHA512
d68847bd0ead1f053ec543c67c333704cfececf6fe44add96852c8d762c81199bf42499a29ec9a408446d7cc42d956a8cbb0ba8b5d0fcf99d1d40813c4246926
-
SSDEEP
384:E3eVES+/xwGkRKJilM61qmTTMVF9/q5e0:bGS+ZfbJiO8qYoAX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" c4bd3c726364fd4b9d18041fe37b33cb.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe c4bd3c726364fd4b9d18041fe37b33cb.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 5096 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4792 ipconfig.exe 3688 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5096 tasklist.exe Token: SeDebugPrivilege 3688 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2932 c4bd3c726364fd4b9d18041fe37b33cb.exe 2932 c4bd3c726364fd4b9d18041fe37b33cb.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2932 wrote to memory of 5000 2932 c4bd3c726364fd4b9d18041fe37b33cb.exe 85 PID 2932 wrote to memory of 5000 2932 c4bd3c726364fd4b9d18041fe37b33cb.exe 85 PID 2932 wrote to memory of 5000 2932 c4bd3c726364fd4b9d18041fe37b33cb.exe 85 PID 5000 wrote to memory of 2904 5000 cmd.exe 87 PID 5000 wrote to memory of 2904 5000 cmd.exe 87 PID 5000 wrote to memory of 2904 5000 cmd.exe 87 PID 5000 wrote to memory of 4792 5000 cmd.exe 88 PID 5000 wrote to memory of 4792 5000 cmd.exe 88 PID 5000 wrote to memory of 4792 5000 cmd.exe 88 PID 5000 wrote to memory of 5096 5000 cmd.exe 89 PID 5000 wrote to memory of 5096 5000 cmd.exe 89 PID 5000 wrote to memory of 5096 5000 cmd.exe 89 PID 5000 wrote to memory of 2056 5000 cmd.exe 91 PID 5000 wrote to memory of 2056 5000 cmd.exe 91 PID 5000 wrote to memory of 2056 5000 cmd.exe 91 PID 2056 wrote to memory of 4860 2056 net.exe 92 PID 2056 wrote to memory of 4860 2056 net.exe 92 PID 2056 wrote to memory of 4860 2056 net.exe 92 PID 5000 wrote to memory of 3688 5000 cmd.exe 93 PID 5000 wrote to memory of 3688 5000 cmd.exe 93 PID 5000 wrote to memory of 3688 5000 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4bd3c726364fd4b9d18041fe37b33cb.exe"C:\Users\Admin\AppData\Local\Temp\c4bd3c726364fd4b9d18041fe37b33cb.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2904
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4792
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:4860
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD52995c2fe65121a782563e930c70c903b
SHA1e8e1d18a4e9ebc994c2a766596e08eb847d5a41b
SHA256f7257689192db2afb7d2e074a7a587f628b1d3b791351907c71f27771fe808fd
SHA5121b462d39a871413dcf34c58aec1f9641c4703b75c0c412884ed40b5b2ff3ce609e202e00ccfd8c6e4c17083c357ab4db225b1847581f413dc919600f800dcc4c