Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
VEX SPOOFER/Poofer.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
VEX SPOOFER/Poofer.exe
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral3
Sample
VEX SPOOFER/instructions.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral4
Sample
VEX SPOOFER/instructions.html
Resource
android-x64-arm64-20220823-en
General
-
Target
VEX SPOOFER/Poofer.exe
-
Size
1.2MB
-
MD5
d406a0693d263ed93bf082b8cf9f1ea6
-
SHA1
c8fefc408181d4cbd98acd8fabee8561aa8bfcb0
-
SHA256
a73a8dab43ba92dc9e7474d980f367b70250956fae95ae16ff0c8b5c275fb459
-
SHA512
f968c2f6e8392e89b25db15927309224b4bab47150f3da2ef6decbb03efb32d74f557301eadd6b0fbc7927adba0f5cd9d3c4465bd46942fbb18d5b36e78754de
-
SSDEEP
24576:pqDEvCTbMWu7rQYlBQcBiT6rprG8aozCCViE7fSW/J4DU8ee8Ub:pTvC/MTQYxsWR7ao+TWB6ew
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\Drivers\Etc\hosts cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 LoaderPoof.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1124 2988 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe 2988 LoaderPoof.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2716 Poofer.exe 2716 Poofer.exe 2716 Poofer.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2716 Poofer.exe 2716 Poofer.exe 2716 Poofer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2988 2716 Poofer.exe 85 PID 2716 wrote to memory of 2988 2716 Poofer.exe 85 PID 2716 wrote to memory of 4320 2716 Poofer.exe 87 PID 2716 wrote to memory of 4320 2716 Poofer.exe 87 PID 2716 wrote to memory of 4320 2716 Poofer.exe 87 PID 2988 wrote to memory of 2260 2988 LoaderPoof.exe 89 PID 2988 wrote to memory of 2260 2988 LoaderPoof.exe 89 PID 2988 wrote to memory of 208 2988 LoaderPoof.exe 92 PID 2988 wrote to memory of 208 2988 LoaderPoof.exe 92 PID 208 wrote to memory of 3572 208 cmd.exe 93 PID 208 wrote to memory of 3572 208 cmd.exe 93 PID 208 wrote to memory of 728 208 cmd.exe 94 PID 208 wrote to memory of 728 208 cmd.exe 94 PID 208 wrote to memory of 1120 208 cmd.exe 95 PID 208 wrote to memory of 1120 208 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\VEX SPOOFER\Poofer.exe"C:\Users\Admin\AppData\Local\Temp\VEX SPOOFER\Poofer.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\LoaderPoof.exeC:\Users\Admin\AppData\Local\Temp/LoaderPoof.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\LoaderPoof.exe" MD5 | find /i /v "md5" | find /i /v "certutil"3⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\LoaderPoof.exe" MD54⤵PID:3572
-
-
C:\Windows\system32\find.exefind /i /v "md5"4⤵PID:728
-
-
C:\Windows\system32\find.exefind /i /v "certutil"4⤵PID:1120
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2988 -s 12483⤵
- Program crash
PID:1124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp/host.bat2⤵
- Drops file in Drivers directory
PID:4320
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 2988 -ip 29881⤵PID:2920
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
892KB
MD5a233f3c7989ee7f2bd86f8077e3fc332
SHA18433b621aaab5fda6d7223068c01fce66250a15f
SHA25654a0f3b57a8d605dc00078d99e37148f84c5cd2aff38190d6b400c12b4b29846
SHA51274cbe8487bcdeae0134061fbdd0aff7cc834ce6a650ab5981f7961466980ed21c37c03581a919127681e646f438e81486d001f6cf9a61f05edc53bff4c117e4e
-
Filesize
892KB
MD5a233f3c7989ee7f2bd86f8077e3fc332
SHA18433b621aaab5fda6d7223068c01fce66250a15f
SHA25654a0f3b57a8d605dc00078d99e37148f84c5cd2aff38190d6b400c12b4b29846
SHA51274cbe8487bcdeae0134061fbdd0aff7cc834ce6a650ab5981f7961466980ed21c37c03581a919127681e646f438e81486d001f6cf9a61f05edc53bff4c117e4e
-
Filesize
173B
MD52d60ad1f974f5265f663a3bf905a614c
SHA17df61cb3348a56298095bbfed4a0a8fd03ca29ee
SHA2560ccb031ebeb8b01822903e23807230c959902526a231535d73d07f76858706dc
SHA51257e00ee7a55668cb42cf1835d4f827e09a4362685a8e28bfd0380f2e34a9da3958d64d1292213564919cdd5a379e203f00888be8eb7794404f8e56fc59fc7706