Overview
overview
10Static
static
10logitechs.rar
windows7-x64
3logitechs.rar
windows10-2004-x64
7Guna.UI2.dll
windows7-x64
1Guna.UI2.dll
windows10-2004-x64
1niggerspoofa.exe
windows7-x64
10niggerspoofa.exe
windows10-2004-x64
10niggerspoo...config
windows7-x64
3niggerspoo...config
windows10-2004-x64
3niggerspoofa.pdb
windows7-x64
3niggerspoofa.pdb
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 16:47
Behavioral task
behavioral1
Sample
logitechs.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
logitechs.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Guna.UI2.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Guna.UI2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
niggerspoofa.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
niggerspoofa.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
niggerspoofa.exe.config
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
niggerspoofa.exe.config
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
niggerspoofa.pdb
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
niggerspoofa.pdb
Resource
win10v2004-20240226-en
General
-
Target
niggerspoofa.exe
-
Size
179KB
-
MD5
6407d82ff6635e7332d0b38b34bd389b
-
SHA1
b68a5d70bb8348bdbeaf9beda5ecb5a131809d45
-
SHA256
7d2465a5912fac5f2950156aa608e32fdeaace6176ebfcfb0c99049be6cbd58c
-
SHA512
1bbbf962bbfa7315cc3c2d406ada6a94fcd9c31bf794d473d7102fe2ffcd6b49e4bda0b81f1d7e78cac5d5e9f3d1eeea5c0b272627bc72d91f46ea7c4ba6a804
-
SSDEEP
3072:aR9wrCMT9szA4tOicW7t9m4WJE7aYgpTS5G8WqhbJyOyx7aYgY7aYgORqY:aDwWlAiLcW7tBWJE7IkJfS7IY7IKq
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral6/memory/5180-6-0x0000000005890000-0x0000000005AA4000-memory.dmp family_agenttesla -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation niggerspoofa.exe -
Executes dropped EXE 1 IoCs
pid Process 840 kdmapper.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\randomization.sys niggerspoofa.exe File created C:\Windows\kdmapper.exe niggerspoofa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS niggerspoofa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer niggerspoofa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion niggerspoofa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5180 niggerspoofa.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5180 wrote to memory of 840 5180 niggerspoofa.exe 105 PID 5180 wrote to memory of 840 5180 niggerspoofa.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\niggerspoofa.exe"C:\Users\Admin\AppData\Local\Temp\niggerspoofa.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5180 -
C:\Windows\kdmapper.exe"C:\Windows\kdmapper.exe" C:\Windows\randomization.sys2⤵
- Executes dropped EXE
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD5e712f7853f09f263df3c012e4e9fad57
SHA10cee125bc2f87d9808fd09ddb291f029a6c43dba
SHA256990ebe210d7459c86374c5619291981062176930e857312974f89df1f72395a9
SHA512886bb345269f2cb3d97caee8b64e39328fd3bbe35766cfe9e63874bcd69e752b8e15ef54f33c201b4ad32160f954bb9cc096a28134c1b2ad2b10ef0b030dd379