Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20231128-en -
resource tags
arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/12/2023, 22:54 UTC
Behavioral task
behavioral1
Sample
Spoof.zip
Resource
win11-20231129-en
Behavioral task
behavioral2
Sample
Spoof/Guna.UI2.dll
Resource
win11-20231129-en
Behavioral task
behavioral3
Sample
Spoof/WindowsFormsApp2.exe
Resource
win11-20231128-en
Behavioral task
behavioral4
Sample
Spoof/WindowsFormsApp2.exe.config
Resource
win11-20231128-en
Behavioral task
behavioral5
Sample
Spoof/WindowsFormsApp2.pdb
Resource
win11-20231128-en
General
-
Target
Spoof/WindowsFormsApp2.exe.config
-
Size
929B
-
MD5
2461fef5b61855125a31e3eeec83ea99
-
SHA1
e1c82f24d87e4ea79829f83cfb9b1b844df41613
-
SHA256
0d5a868ba40b717256b2b0d2d91b6771a2efe5e139079bcb7dd11d1039b3bc6d
-
SHA512
ba3eff240d48eb606043a9d5fd596289bfa600430508525768e928eba278319c35bf09dc4ad6579a7fd3ec8d2c5e18932d017db10696f64a034027909d227bc3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3167230361-3851490586-2616496888-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3167230361-3851490586-2616496888-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 792 OpenWith.exe
Processes
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestself.events.data.microsoft.comIN AResponseself.events.data.microsoft.comIN CNAMEself-events-data.trafficmanager.netself-events-data.trafficmanager.netIN CNAMEonedscolprdcus14.centralus.cloudapp.azure.comonedscolprdcus14.centralus.cloudapp.azure.comIN A104.208.16.90
-
Remote address:8.8.8.8:53Requestctldl.windowsupdate.comIN AResponsectldl.windowsupdate.comIN CNAMEwu-bg-shim.trafficmanager.netwu-bg-shim.trafficmanager.netIN CNAMEdownload.windowsupdate.com.edgesuite.netdownload.windowsupdate.com.edgesuite.netIN CNAMEa767.dspw65.akamai.neta767.dspw65.akamai.netIN A96.17.178.180a767.dspw65.akamai.netIN A96.17.178.194
-
Remote address:8.8.8.8:53Requestocsp.digicert.comIN AResponseocsp.digicert.comIN CNAMEocsp.edge.digicert.comocsp.edge.digicert.comIN CNAMEfp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.2be4.phicdn.netIN CNAMEfp2e7a.wpc.phicdn.netfp2e7a.wpc.phicdn.netIN A192.229.221.95
-
Remote address:8.8.8.8:53Request90.16.208.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request180.178.17.96.in-addr.arpaIN PTRResponse180.178.17.96.in-addr.arpaIN PTRa96-17-178-180deploystaticakamaitechnologiescom
-
418 B 987 B 6 6
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
11.227.111.52.in-addr.arpa
DNS Request
self.events.data.microsoft.com
DNS Response
104.208.16.90
DNS Request
ctldl.windowsupdate.com
DNS Response
96.17.178.18096.17.178.194
DNS Request
ocsp.digicert.com
DNS Response
192.229.221.95
DNS Request
90.16.208.104.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
180.178.17.96.in-addr.arpa