Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20231128-en -
resource tags
arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-12-2023 22:54
Behavioral task
behavioral1
Sample
Spoof.zip
Resource
win11-20231129-en
Behavioral task
behavioral2
Sample
Spoof/Guna.UI2.dll
Resource
win11-20231129-en
Behavioral task
behavioral3
Sample
Spoof/WindowsFormsApp2.exe
Resource
win11-20231128-en
Behavioral task
behavioral4
Sample
Spoof/WindowsFormsApp2.exe.config
Resource
win11-20231128-en
Behavioral task
behavioral5
Sample
Spoof/WindowsFormsApp2.pdb
Resource
win11-20231128-en
General
-
Target
Spoof/WindowsFormsApp2.exe.config
-
Size
929B
-
MD5
2461fef5b61855125a31e3eeec83ea99
-
SHA1
e1c82f24d87e4ea79829f83cfb9b1b844df41613
-
SHA256
0d5a868ba40b717256b2b0d2d91b6771a2efe5e139079bcb7dd11d1039b3bc6d
-
SHA512
ba3eff240d48eb606043a9d5fd596289bfa600430508525768e928eba278319c35bf09dc4ad6579a7fd3ec8d2c5e18932d017db10696f64a034027909d227bc3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3167230361-3851490586-2616496888-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3167230361-3851490586-2616496888-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 792 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Spoof\WindowsFormsApp2.exe.config1⤵
- Modifies registry class
PID:2824
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:792