Resubmissions
18-04-2024 13:53
240418-q62bmseh86 10Analysis
-
max time kernel
57s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18-04-2024 13:53
Static task
static1
General
-
Target
spoofer.exe
-
Size
304KB
-
MD5
01c62c914f47273aa259f018ff2d2cf5
-
SHA1
6b692198f3d97a95ffecb320a7b6ccb05e2d1f7d
-
SHA256
38c4626697bece1ce2266633a4df1529b9090a538c9751fedfa89bcfbe0f957e
-
SHA512
5d5cbef10973551032d05f21235626ee6300ac40eeab42ed7996b9edb824874d5fdfcb0c7cc36d02a5a59c01e651eec9645fa80faceab998c7ea23df10a6722e
-
SSDEEP
6144:vKC69Wu6YlTFQbIjUzEngrtcYbTUYWWYQSdndHPzoOCPaq9sbgABl:iCs6YZFQEOEnItiQStdHbz3zN
Malware Config
Extracted
lumma
https://entitlementappwo.shop/api
https://economicscreateojsu.shop/api
https://pushjellysingeywus.shop/api
https://absentconvicsjawun.shop/api
https://suitcaseacanehalk.shop/api
https://bordersoarmanusjuw.shop/api
https://mealplayerpreceodsju.shop/api
https://wifeplasterbakewis.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
spoofer.exedescription pid process target process PID 4800 set thread context of 1612 4800 spoofer.exe RegAsm.exe -
Drops file in Windows directory 2 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
Processes:
taskmgr.exepid process 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 5088 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 5088 taskmgr.exe Token: SeSystemProfilePrivilege 5088 taskmgr.exe Token: SeCreateGlobalPrivilege 5088 taskmgr.exe Token: 33 5088 taskmgr.exe Token: SeIncBasePriorityPrivilege 5088 taskmgr.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
taskmgr.exepid process 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe -
Suspicious use of SendNotifyMessage 59 IoCs
Processes:
taskmgr.exepid process 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe 5088 taskmgr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
spoofer.exedescription pid process target process PID 4800 wrote to memory of 1612 4800 spoofer.exe RegAsm.exe PID 4800 wrote to memory of 1612 4800 spoofer.exe RegAsm.exe PID 4800 wrote to memory of 1612 4800 spoofer.exe RegAsm.exe PID 4800 wrote to memory of 1612 4800 spoofer.exe RegAsm.exe PID 4800 wrote to memory of 1612 4800 spoofer.exe RegAsm.exe PID 4800 wrote to memory of 1612 4800 spoofer.exe RegAsm.exe PID 4800 wrote to memory of 1612 4800 spoofer.exe RegAsm.exe PID 4800 wrote to memory of 1612 4800 spoofer.exe RegAsm.exe PID 4800 wrote to memory of 1612 4800 spoofer.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\spoofer.exe"C:\Users\Admin\AppData\Local\Temp\spoofer.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1612
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4704