Overview
overview
10Static
static
10logitechs.rar
windows7-x64
3logitechs.rar
windows10-2004-x64
7Guna.UI2.dll
windows7-x64
1Guna.UI2.dll
windows10-2004-x64
1niggerspoofa.exe
windows7-x64
10niggerspoofa.exe
windows10-2004-x64
10niggerspoo...config
windows7-x64
3niggerspoo...config
windows10-2004-x64
3niggerspoofa.pdb
windows7-x64
3niggerspoofa.pdb
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 16:47
Behavioral task
behavioral1
Sample
logitechs.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
logitechs.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Guna.UI2.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Guna.UI2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
niggerspoofa.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
niggerspoofa.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
niggerspoofa.exe.config
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
niggerspoofa.exe.config
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
niggerspoofa.pdb
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
niggerspoofa.pdb
Resource
win10v2004-20240226-en
General
-
Target
niggerspoofa.exe.config
-
Size
189B
-
MD5
9dbad5517b46f41dbb0d8780b20ab87e
-
SHA1
ef6aef0b1ea5d01b6e088a8bf2f429773c04ba5e
-
SHA256
47e5a0f101af4151d7f13d2d6bfa9b847d5b5e4a98d1f4674b7c015772746cdf
-
SHA512
43825f5c26c54e1fc5bffcce30caad1449a28c0c9a9432e9ce17d255f8bf6057c1a1002d9471e5b654ab1de08fb6eabf96302cdb3e0fb4b63ba0ff186e903be8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2480 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2480 AcroRd32.exe 2480 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2480 2204 cmd.exe 29 PID 2204 wrote to memory of 2480 2204 cmd.exe 29 PID 2204 wrote to memory of 2480 2204 cmd.exe 29 PID 2204 wrote to memory of 2480 2204 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\niggerspoofa.exe.config1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\niggerspoofa.exe.config"2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51865a76a1ba16a39badbb69a18cf598a
SHA1af0a9706c0db1904e9295887bcb6c5305f8508ea
SHA2561095cae51317dae727ff1bfad44e8e8d20db0185a17bb8e800d52123c4ef10ea
SHA5123664bbe9649214e8a6bcd88a00a87e094719bc076b529b3cd964384b00cbd943492043db83fa5910f2ee802a04db2dd63842dd1f05dfdb51c443fe33b5561058