Analysis
-
max time kernel
13s -
max time network
14s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
spoofer.bat
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
spoofer.bat
Resource
win10v2004-20231215-en
windows10-2004-x64
10 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
spoofer.bat
-
Size
26KB
-
MD5
71f3e121ed4c4edd93ed7e2eef18c60f
-
SHA1
c2c10acae7ffe7c0d5ded9fe7603b0804dd743db
-
SHA256
4b3c02fa1516c71b44708adee293fc0dff5a33fb989c1df8d26603ba3fcf0445
-
SHA512
b2cf5ed127a15851264e75791d8f44c2fad28a03fa85c628fda08634f6c05f165e145f3615f509e3f84a59c173a2fffdfd6790d57484fa5f73f3fad27a9e3d8c
-
SSDEEP
768:fBd3qX+ac4zOhpYBUtrwrhtAUIsTpt75qn:/4O
Score
8/10
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2716 attrib.exe 2828 attrib.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Greatgame reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2704 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2928 tskill.exe 2928 tskill.exe 2260 tskill.exe 2260 tskill.exe 2596 tskill.exe 2596 tskill.exe 2780 tskill.exe 2780 tskill.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 2300 shutdown.exe Token: SeRemoteShutdownPrivilege 2300 shutdown.exe Token: SeSystemtimePrivilege 1956 cmd.exe Token: SeSystemtimePrivilege 1956 cmd.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2088 1956 cmd.exe 37 PID 1956 wrote to memory of 2088 1956 cmd.exe 37 PID 1956 wrote to memory of 2088 1956 cmd.exe 37 PID 1956 wrote to memory of 2416 1956 cmd.exe 36 PID 1956 wrote to memory of 2416 1956 cmd.exe 36 PID 1956 wrote to memory of 2416 1956 cmd.exe 36 PID 1956 wrote to memory of 2668 1956 cmd.exe 35 PID 1956 wrote to memory of 2668 1956 cmd.exe 35 PID 1956 wrote to memory of 2668 1956 cmd.exe 35 PID 1956 wrote to memory of 2664 1956 cmd.exe 34 PID 1956 wrote to memory of 2664 1956 cmd.exe 34 PID 1956 wrote to memory of 2664 1956 cmd.exe 34 PID 1956 wrote to memory of 2704 1956 cmd.exe 33 PID 1956 wrote to memory of 2704 1956 cmd.exe 33 PID 1956 wrote to memory of 2704 1956 cmd.exe 33 PID 1956 wrote to memory of 2828 1956 cmd.exe 30 PID 1956 wrote to memory of 2828 1956 cmd.exe 30 PID 1956 wrote to memory of 2828 1956 cmd.exe 30 PID 1956 wrote to memory of 2716 1956 cmd.exe 38 PID 1956 wrote to memory of 2716 1956 cmd.exe 38 PID 1956 wrote to memory of 2716 1956 cmd.exe 38 PID 1956 wrote to memory of 2692 1956 cmd.exe 39 PID 1956 wrote to memory of 2692 1956 cmd.exe 39 PID 1956 wrote to memory of 2692 1956 cmd.exe 39 PID 1956 wrote to memory of 2448 1956 cmd.exe 40 PID 1956 wrote to memory of 2448 1956 cmd.exe 40 PID 1956 wrote to memory of 2448 1956 cmd.exe 40 PID 1956 wrote to memory of 2928 1956 cmd.exe 41 PID 1956 wrote to memory of 2928 1956 cmd.exe 41 PID 1956 wrote to memory of 2928 1956 cmd.exe 41 PID 1956 wrote to memory of 2260 1956 cmd.exe 42 PID 1956 wrote to memory of 2260 1956 cmd.exe 42 PID 1956 wrote to memory of 2260 1956 cmd.exe 42 PID 1956 wrote to memory of 2596 1956 cmd.exe 44 PID 1956 wrote to memory of 2596 1956 cmd.exe 44 PID 1956 wrote to memory of 2596 1956 cmd.exe 44 PID 1956 wrote to memory of 2780 1956 cmd.exe 43 PID 1956 wrote to memory of 2780 1956 cmd.exe 43 PID 1956 wrote to memory of 2780 1956 cmd.exe 43 PID 1956 wrote to memory of 2884 1956 cmd.exe 45 PID 1956 wrote to memory of 2884 1956 cmd.exe 45 PID 1956 wrote to memory of 2884 1956 cmd.exe 45 PID 1956 wrote to memory of 2756 1956 cmd.exe 47 PID 1956 wrote to memory of 2756 1956 cmd.exe 47 PID 1956 wrote to memory of 2756 1956 cmd.exe 47 PID 1956 wrote to memory of 2696 1956 cmd.exe 48 PID 1956 wrote to memory of 2696 1956 cmd.exe 48 PID 1956 wrote to memory of 2696 1956 cmd.exe 48 PID 1956 wrote to memory of 2796 1956 cmd.exe 49 PID 1956 wrote to memory of 2796 1956 cmd.exe 49 PID 1956 wrote to memory of 2796 1956 cmd.exe 49 PID 1956 wrote to memory of 2564 1956 cmd.exe 51 PID 1956 wrote to memory of 2564 1956 cmd.exe 51 PID 1956 wrote to memory of 2564 1956 cmd.exe 51 PID 1956 wrote to memory of 2300 1956 cmd.exe 52 PID 1956 wrote to memory of 2300 1956 cmd.exe 52 PID 1956 wrote to memory of 2300 1956 cmd.exe 52 PID 1956 wrote to memory of 1468 1956 cmd.exe 54 PID 1956 wrote to memory of 1468 1956 cmd.exe 54 PID 1956 wrote to memory of 1468 1956 cmd.exe 54 PID 1956 wrote to memory of 292 1956 cmd.exe 55 PID 1956 wrote to memory of 292 1956 cmd.exe 55 PID 1956 wrote to memory of 292 1956 cmd.exe 55 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2828 attrib.exe 2716 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\spoofer.bat"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\attrib.exeAttrib +r +h Greatgame.bat2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2828
-
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ2⤵
- Adds Run key to start application
- Modifies registry key
PID:2704
-
-
C:\Windows\system32\calc.execalc2⤵PID:2664
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2668
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2416
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2088
-
-
C:\Windows\system32\attrib.exeAttrib +r +h2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2716
-
-
C:\Windows\system32\rundll32.exeRUNDLL32 USER32.DLL.SwapMouseButton2⤵PID:2692
-
-
C:\Windows\system32\calc.execalc2⤵PID:2448
-
-
C:\Windows\system32\tskill.exetskill msnmsgr2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Windows\system32\tskill.exetskill LimeWire2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Windows\system32\tskill.exetskill NMain2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Windows\system32\tskill.exetskill iexplore2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2884
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2756
-
-
C:\Windows\system32\calc.execalc2⤵PID:2696
-
-
C:\Windows\system32\msg.exemsg * R.I.P2⤵PID:2796
-
-
C:\Windows\system32\msg.exemsg * R.I.P2⤵PID:2564
-
-
C:\Windows\system32\shutdown.exeshutdown -r -t 10 -c "VIRUS DETECTED"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1468
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:292
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2548
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1580