Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
Temp-Spoofer-LifeTime-main/Loader.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Temp-Spoofer-LifeTime-main/Loader.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Temp-Spoofer-LifeTime-main/imgui/imgui_widgets.vbs
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Temp-Spoofer-LifeTime-main/imgui/imgui_widgets.vbs
Resource
win10v2004-20240226-en
General
-
Target
Temp-Spoofer-LifeTime-main/Loader.exe
-
Size
412KB
-
MD5
ca63e74104cfd7ee90019875c0cffe6b
-
SHA1
44660ef376819e6a0d275885913e3d4f2a7e3f97
-
SHA256
868f78eac76904c7c8286243061396fa05a9c6c3cc4315f7a7848a358916ee29
-
SHA512
ca43d646d8f354977fd6a8745622b00098afce08760e850f4865b106407202a36a837683f0cab4c3b4b877f45c36036c9a835f4f40d32bc5881c17a7e016d715
-
SSDEEP
6144:62X+joLNTy6Yqj2ErwTt3ISmebEeHSTL0pq6vZ4retBHNU3ZkX7rQ:R+kLNhqErwFISmeyUvZ46nm3ZqQ
Malware Config
Extracted
lumma
https://turkeyunlikelyofw.shop/api
https://associationokeo.shop/api
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
taskmgr.exepid process 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 1140 taskmgr.exe Token: SeSystemProfilePrivilege 1140 taskmgr.exe Token: SeCreateGlobalPrivilege 1140 taskmgr.exe Token: 33 1140 taskmgr.exe Token: SeIncBasePriorityPrivilege 1140 taskmgr.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
Processes:
taskmgr.exepid process 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe -
Suspicious use of SendNotifyMessage 38 IoCs
Processes:
taskmgr.exepid process 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe 1140 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Temp-Spoofer-LifeTime-main\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Temp-Spoofer-LifeTime-main\Loader.exe"1⤵PID:3724
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1140