Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 17:36
Behavioral task
behavioral1
Sample
geekcatpingreducer.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
geekcatpingreducer.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
geekcatpingreducer.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
geekcatpingreducer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
�Y��}�.pyc
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
�Y��}�.pyc
Resource
win10v2004-20240802-en
General
-
Target
geekcatpingreducer.exe
-
Size
7.5MB
-
MD5
f8c63eca8b26883c30d2240008b07150
-
SHA1
ccfe5cf24b93114ceb5eca37d9412d3d5c9abd51
-
SHA256
1bbd2b8817ad1726c8bcc7a13611164010bf04f70527e0bc61c2e408c23330f4
-
SHA512
8b8f31931bc58dbefbaf74ca6072cdc91993eb5bfc2a683725939e44d935a5af53bf61a1fcfba4b061c362ad51b9efc45adffb94344cbf3806595272848d7f70
-
SSDEEP
196608:ar97YS6Kc5OshoKMuIkhVastRL5Di3uh1D7J9:CYS85OshouIkPftRL54YRJ9
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2848 geekcatpingreducer.exe -
resource yara_rule behavioral3/files/0x0005000000019203-22.dat upx -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2192 geekcatpingreducer.exe 2848 geekcatpingreducer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2848 2192 geekcatpingreducer.exe 30 PID 2192 wrote to memory of 2848 2192 geekcatpingreducer.exe 30 PID 2192 wrote to memory of 2848 2192 geekcatpingreducer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\geekcatpingreducer.exe"C:\Users\Admin\AppData\Local\Temp\geekcatpingreducer.exe"1⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\geekcatpingreducer.exe"C:\Users\Admin\AppData\Local\Temp\geekcatpingreducer.exe"2⤵
- Loads dropped DLL
- System Network Configuration Discovery: Internet Connection Discovery
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD55f6fd64ec2d7d73ae49c34dd12cedb23
SHA1c6e0385a868f3153a6e8879527749db52dce4125
SHA256ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967
SHA512c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab