Analysis
-
max time kernel
24s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
Free Temp Spoofer.exe
Resource
win10v2004-20240226-en
General
-
Target
Free Temp Spoofer.exe
-
Size
309KB
-
MD5
ae570e5768742a572e36ac8d999c03f5
-
SHA1
9eabf7fdc94adeb65248f7593cd6f0abd1448ef8
-
SHA256
7db7e8ba889c41199e657fa9d263c5f18830a35bab6b810e267baadae1d938ae
-
SHA512
8f46023ad4b561f9fcec5c62eba6a384e95b07dca8baeadcce9bf3039a07fb9adc6f2312a386689d291dad26d8f1476b72d8f5f7bc6a62220683f3ef221552e0
-
SSDEEP
6144:qKjViFkFl/AAGbFd1cUp3AJEFzqlOcWluW4bLcCCQvjQL85d:2rA6Bl7GcCCQvjQL4d
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Free Temp Spoofer.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Free Temp Spoofer.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" map.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Free Temp Spoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Free Temp Spoofer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Free Temp Spoofer.exe -
Executes dropped EXE 2 IoCs
pid Process 4824 map.exe 4824 map.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Free Temp Spoofer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Free Temp Spoofer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\fqasf.bin Free Temp Spoofer.exe File created C:\Windows\asdf.bin Free Temp Spoofer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe 3176 Free Temp Spoofer.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 4824 map.exe 4824 map.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3176 Free Temp Spoofer.exe Token: SeDebugPrivilege 3176 Free Temp Spoofer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3176 wrote to memory of 784 3176 Free Temp Spoofer.exe 102 PID 3176 wrote to memory of 784 3176 Free Temp Spoofer.exe 102 PID 3176 wrote to memory of 784 3176 Free Temp Spoofer.exe 102 PID 784 wrote to memory of 4824 784 cmd.exe 104 PID 784 wrote to memory of 4824 784 cmd.exe 104 PID 3176 wrote to memory of 2384 3176 Free Temp Spoofer.exe 109 PID 3176 wrote to memory of 2384 3176 Free Temp Spoofer.exe 109 PID 3176 wrote to memory of 2384 3176 Free Temp Spoofer.exe 109 PID 3176 wrote to memory of 784 3176 Free Temp Spoofer.exe 102 PID 3176 wrote to memory of 784 3176 Free Temp Spoofer.exe 102 PID 3176 wrote to memory of 784 3176 Free Temp Spoofer.exe 102 PID 784 wrote to memory of 4824 784 cmd.exe 104 PID 784 wrote to memory of 4824 784 cmd.exe 104 PID 3176 wrote to memory of 2384 3176 Free Temp Spoofer.exe 109 PID 3176 wrote to memory of 2384 3176 Free Temp Spoofer.exe 109 PID 3176 wrote to memory of 2384 3176 Free Temp Spoofer.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\Free Temp Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Free Temp Spoofer.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Windows\map.exe C:\Windows\drv.sys2⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\map.exeC:\Windows\map.exe C:\Windows\drv.sys3⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
PID:4824
-
-
-
C:\Windows\SysWOW64\netsh.exe"netsh.exe" int set int name="Ethernet" disable2⤵PID:2384
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD590de08e941cab777451a9d3484d1038f
SHA1dd236756bee1d6df670a5d16b0c7bfd555eb5680
SHA2560cc27f375e388d45b4d970631815250487e4a58d95797f6d43bf56093695ec8c
SHA5121b6930b621d76c2513f78b9c05eec58cb8c0fc53354fed2c7134d4ecfa7c2356008b92c5329d58052c8a474c1e5b0c153ffc2bb4971523d6083bfaf2c851dcdd