Analysis
-
max time kernel
125s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27/08/2023, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win10-20230703-en
General
-
Target
spoofer.exe
-
Size
15.3MB
-
MD5
5964a31f5f2c64f8ee7abaee0ac3a65e
-
SHA1
c52bb1668274df052b1c7f10baeeed62c20ea787
-
SHA256
b6e5cc7b33d3e6053e86d09d76763af2552bd9d8cbad6c52d060a31aab047439
-
SHA512
3fdae9a9fc80735366b59ce35ca4eca1084e27e7f8eecf405875d6ce6c5e8c142dfc90b8b63a8a4e03f4152b7f3350edb824216238fb9d0cc960840fb7f846f0
-
SSDEEP
393216:h/Ld4ELgKnC2rKQl2EUGj+350J7CstgBxDw5pZvg5hnJSdAvDge6bu+wyUNZRU+q:h/Ld4ELgKnC2rKQl2EUGj+350J7CstgI
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4760 spoofer.exe -
resource yara_rule behavioral1/files/0x000700000001afb1-6.dat themida behavioral1/files/0x000700000001afb1-8.dat themida behavioral1/memory/4760-9-0x00007FFD7A800000-0x00007FFD7B384000-memory.dmp themida behavioral1/memory/4760-12-0x00007FFD7A800000-0x00007FFD7B384000-memory.dmp themida behavioral1/memory/4760-19-0x00007FFD7A800000-0x00007FFD7B384000-memory.dmp themida behavioral1/memory/4760-22-0x00007FFD7A800000-0x00007FFD7B384000-memory.dmp themida behavioral1/memory/4760-24-0x00007FFD7A800000-0x00007FFD7B384000-memory.dmp themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4760 spoofer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe 4760 spoofer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4760 spoofer.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD505b012457488a95a05d0541e0470d392
SHA174f541d6a8365508c794ef7b4ac7c297457f9ce3
SHA2561f77a0749ac730500f203b8c4d072587923ac679e184a3859aeb855c2a2e7d8d
SHA5126d6e7b838d4425d49ac8d3738135374ef5357f0677b07cecb7afbf5feddc1997bf6dce68d48787eff8a74c4728def8880c8f01842eda35b5815fb561fa401ae6
-
Filesize
4.2MB
MD505b012457488a95a05d0541e0470d392
SHA174f541d6a8365508c794ef7b4ac7c297457f9ce3
SHA2561f77a0749ac730500f203b8c4d072587923ac679e184a3859aeb855c2a2e7d8d
SHA5126d6e7b838d4425d49ac8d3738135374ef5357f0677b07cecb7afbf5feddc1997bf6dce68d48787eff8a74c4728def8880c8f01842eda35b5815fb561fa401ae6