Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2022, 00:46

General

  • Target

    Lethility Spoofer.exe

  • Size

    540KB

  • MD5

    067bf653c546b1fdfbf1bff16ecc7e5e

  • SHA1

    5d2f058754a942e5f84ed6d926eb415a8a8731f1

  • SHA256

    f2e2d8ca503155683d3b33a134b9f243b05ec74bffc1abbec4b9435d1ae0370b

  • SHA512

    f964b5ffe063150e88bad31905569bb8ea92061c8082e64ee3c9ae5e1add1c255b9359770f2dc882bfbb0bf368954fb54f2d02bc3f9588c9dfb2334e1dc7cdf5

  • SSDEEP

    12288:4uGj5je69oqAmj5oMqKyKAuqOAP0wu7eMb01JQntLOCHao0H0:4Xhe29AmjkKuu7emHaxU

Score
1/10

Malware Config

Signatures

  • Modifies registry class 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lethility Spoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\Lethility Spoofer.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
      2⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:1364

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1364-56-0x0000000000D40000-0x0000000000D48000-memory.dmp

          Filesize

          32KB

        • memory/1364-57-0x000007FEFC1F1000-0x000007FEFC1F3000-memory.dmp

          Filesize

          8KB

        • memory/1364-58-0x000000001B137000-0x000000001B156000-memory.dmp

          Filesize

          124KB

        • memory/1364-59-0x000000001B137000-0x000000001B156000-memory.dmp

          Filesize

          124KB

        • memory/1912-54-0x00000000763F1000-0x00000000763F3000-memory.dmp

          Filesize

          8KB