Resubmissions

17/08/2024, 20:52

240817-zn1f3awekf 3

17/08/2024, 20:48

240817-zljerswcrc 5

17/08/2024, 20:44

240817-zjkvtawbqa 5

Analysis

  • max time kernel
    147s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 20:48

General

  • Target

    GreedyExecutor-main/GreedyExecutor.zip

  • Size

    3B

  • MD5

    bc949ea893a9384070c31f083ccefd26

  • SHA1

    cbb8391cb65c20e2c05a2f29211e55c49939c3db

  • SHA256

    6bdf66b5bf2a44e658bea2ee86695ab150a06e600bf67cd5cce245ad54962c61

  • SHA512

    e4288e71070485637ec5825f510a7daa7e75ef6c71a1b755f51e1b0f2e58e5066837f58408ea74d75db42c49372c6027d433a869904fc5efaf4876dfcfde1287

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\GreedyExecutor-main\GreedyExecutor.zip
    1⤵
      PID:3064
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:800
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x550
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2876
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:2896
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 508 512 520 65536 516
          2⤵
          • Modifies data under HKEY_USERS
          PID:2936
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\GreedyExecutor-main\README.md
        1⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:756
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\GreedyExecutor-main\README.md
          2⤵
            PID:2548

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                Filesize

                1024KB

                MD5

                7b6ac66ede0afe071d47aa1261ee90ba

                SHA1

                2bc61e836bcb3f445d8ac6c2d5d65092a9799be9

                SHA256

                1d336c28b20e2f446d109ed833cd3aa4ceb3142f97d67466b357c7640b51e9b1

                SHA512

                445e79371c2d4707a8e2c7d2c5d19d08779957f9c0dd9ee8223ae1df78cc123ed33ed73ff067ab77464f489ca36fa8201069351e811f3b90aa7ca47fb84766ef

              • memory/2720-66-0x0000000003220000-0x0000000003228000-memory.dmp

                Filesize

                32KB

              • memory/2720-77-0x0000000003900000-0x0000000003908000-memory.dmp

                Filesize

                32KB

              • memory/2720-42-0x0000000002F00000-0x0000000002F08000-memory.dmp

                Filesize

                32KB

              • memory/2720-43-0x0000000001440000-0x0000000001441000-memory.dmp

                Filesize

                4KB

              • memory/2720-49-0x0000000001440000-0x0000000001448000-memory.dmp

                Filesize

                32KB

              • memory/2720-51-0x00000000013F0000-0x00000000013F1000-memory.dmp

                Filesize

                4KB

              • memory/2720-0-0x0000000001AD0000-0x0000000001AE0000-memory.dmp

                Filesize

                64KB

              • memory/2720-73-0x0000000003910000-0x0000000003918000-memory.dmp

                Filesize

                32KB

              • memory/2720-60-0x0000000002F10000-0x0000000002F18000-memory.dmp

                Filesize

                32KB

              • memory/2720-74-0x0000000003900000-0x0000000003901000-memory.dmp

                Filesize

                4KB

              • memory/2720-16-0x0000000001BD0000-0x0000000001BE0000-memory.dmp

                Filesize

                64KB

              • memory/2720-81-0x0000000003CD0000-0x0000000003CD1000-memory.dmp

                Filesize

                4KB

              • memory/2720-87-0x0000000003CD0000-0x0000000003CD8000-memory.dmp

                Filesize

                32KB

              • memory/2720-90-0x0000000005570000-0x0000000005578000-memory.dmp

                Filesize

                32KB

              • memory/2720-91-0x0000000003CF0000-0x0000000003CF1000-memory.dmp

                Filesize

                4KB