Analysis
-
max time kernel
100s -
max time network
77s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
25-03-2024 19:00
Behavioral task
behavioral1
Sample
Energetic Bear Implant.exe
Resource
win10-20240221-en
General
-
Target
Energetic Bear Implant.exe
-
Size
1.9MB
-
MD5
f901c645188f9c80afa8f49174f065ce
-
SHA1
272bc9298b394760d68e14dcf479233800a098a9
-
SHA256
9385d7e149bcda79e5a4291ad422c160be8297d029d04ee04c50240fe53aa900
-
SHA512
8de72f93ab1a507a08a283da4e8948756364d45fa70e8332da424b27a9cb8d6c3ad93cb5062343a6cc8cf0009d7c7d3fef8e209f99fedbe02b7d2d5c010c291c
-
SSDEEP
24576:7MWHiFDV07ECXo4tu619SbX7ZwwjeJJV+CBqAKngHu8LNZZ/LJCPlyPlVzOCr:WJ6qbroCn8u8jhL0PMtVSCr
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 344 taskmgr.exe 344 taskmgr.exe 344 taskmgr.exe 344 taskmgr.exe 344 taskmgr.exe 344 taskmgr.exe 344 taskmgr.exe 344 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2664 Energetic Bear Implant.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: 33 164 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 164 AUDIODG.EXE Token: SeDebugPrivilege 1740 taskmgr.exe Token: SeSystemProfilePrivilege 1740 taskmgr.exe Token: SeCreateGlobalPrivilege 1740 taskmgr.exe Token: 33 1740 taskmgr.exe Token: SeIncBasePriorityPrivilege 1740 taskmgr.exe Token: SeDebugPrivilege 344 taskmgr.exe Token: SeSystemProfilePrivilege 344 taskmgr.exe Token: SeCreateGlobalPrivilege 344 taskmgr.exe Token: 33 344 taskmgr.exe Token: SeIncBasePriorityPrivilege 344 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2664 Energetic Bear Implant.exe 2664 Energetic Bear Implant.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe 1740 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Energetic Bear Implant.exe"C:\Users\Admin\AppData\Local\Temp\Energetic Bear Implant.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2664
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3d41⤵
- Suspicious use of AdjustPrivilegeToken
PID:164
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1740
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD50d02b03a068d671348931cc20c048422
SHA167b6deacf1303acfcbab0b158157fdc03a02c8d5
SHA25644f4263d65889ea8f0db3c6e31a956a4664e9200aba2612c9be7016feeb323c0
SHA512805e7b4fafed39dec5ecc2ede0c65b6e103e6757e0bd43ecdce7c00932f59e3e7a68d2ea0818244dfeb691b022c1ccca590a3f4239f99e1cd8a29ba66daed358
-
Filesize
2KB
MD5a2942665b12ed000cd2ac95adef8e0cc
SHA1ac194f8d30f659131d1c73af8d44e81eccab7fde
SHA256bdc5de6c42c523a333c26160d212c62385b03f5ebdae5aa8c5d025ff3f8aa374
SHA5124e5ba962ba97656974c390b45302d60f4c82d604feb6199d44e80497a40d0b0a9fd119ca17ac184809ca0821ab6813292892c433ed7277f65c275f37a96070b9
-
Filesize
492KB
MD5979128b6017961ec9f5b961ede4d8fb3
SHA108163ba22e83273398a851b164c4a2cd364dc809
SHA256989101a0ae548a578aba8612ee89696bea81e899c92f0b697ea31e6db53f10fc
SHA512afc1a8c4f80c57b27cfb764ce6d8354c1700ae90baed4d7562796f235087f900dfeb486ecd7602bf3b50a2ff470e410925f5cdb7ff89fe7a576abaf18621a626