Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
TempSpoofer.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
TempSpoofer.exe
Resource
win10v2004-20240412-en
General
-
Target
TempSpoofer.exe
-
Size
625KB
-
MD5
e6b6c975e5b591288cc32e5459e823d8
-
SHA1
d234a345f28aa66adf2357b9a3253b12b204ed46
-
SHA256
7aef3228929bccd0715778c0eae7948f2fa233c5720d3b941e9dac152043a9ff
-
SHA512
203f4efb422c5fd6dbe5e4cb00cbee5e13920699d638fafc0d77b9d8be20b10213d3dc55d1c074e74c1f1b7d5089df7cf07ea4feb23e971d531e0d9563626f11
-
SSDEEP
12288:PFUNDakMcWUUysz/NhKjJPhM4/5bV/rvgE3:PFOakMcUDz/NEjlzxbVDvb
Malware Config
Extracted
lumma
https://cleartotalfisherwo.shop/api
https://worryfillvolcawoi.shop/api
https://enthusiasimtitleow.shop/api
https://dismissalcylinderhostw.shop/api
https://affordcharmcropwo.shop/api
https://diskretainvigorousiw.shop/api
https://communicationgenerwo.shop/api
https://pillowbrocccolipe.shop/api
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
Processes:
tempspoofer.exe icsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 908 tempspoofer.exe 1572 icsys.icn.exe 4580 explorer.exe 1892 spoolsv.exe 2500 svchost.exe 1400 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
Processes:
TempSpoofer.exeicsys.icn.exeexplorer.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe TempSpoofer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
TempSpoofer.exeicsys.icn.exepid process 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 3160 TempSpoofer.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 1572 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 4580 explorer.exe 2500 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
TempSpoofer.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 3160 TempSpoofer.exe 3160 TempSpoofer.exe 1572 icsys.icn.exe 1572 icsys.icn.exe 4580 explorer.exe 4580 explorer.exe 1892 spoolsv.exe 1892 spoolsv.exe 2500 svchost.exe 2500 svchost.exe 1400 spoolsv.exe 1400 spoolsv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
TempSpoofer.exeicsys.icn.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 3160 wrote to memory of 908 3160 TempSpoofer.exe tempspoofer.exe PID 3160 wrote to memory of 908 3160 TempSpoofer.exe tempspoofer.exe PID 3160 wrote to memory of 908 3160 TempSpoofer.exe tempspoofer.exe PID 3160 wrote to memory of 1572 3160 TempSpoofer.exe icsys.icn.exe PID 3160 wrote to memory of 1572 3160 TempSpoofer.exe icsys.icn.exe PID 3160 wrote to memory of 1572 3160 TempSpoofer.exe icsys.icn.exe PID 1572 wrote to memory of 4580 1572 icsys.icn.exe explorer.exe PID 1572 wrote to memory of 4580 1572 icsys.icn.exe explorer.exe PID 1572 wrote to memory of 4580 1572 icsys.icn.exe explorer.exe PID 4580 wrote to memory of 1892 4580 explorer.exe spoolsv.exe PID 4580 wrote to memory of 1892 4580 explorer.exe spoolsv.exe PID 4580 wrote to memory of 1892 4580 explorer.exe spoolsv.exe PID 1892 wrote to memory of 2500 1892 spoolsv.exe svchost.exe PID 1892 wrote to memory of 2500 1892 spoolsv.exe svchost.exe PID 1892 wrote to memory of 2500 1892 spoolsv.exe svchost.exe PID 2500 wrote to memory of 1400 2500 svchost.exe spoolsv.exe PID 2500 wrote to memory of 1400 2500 svchost.exe spoolsv.exe PID 2500 wrote to memory of 1400 2500 svchost.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TempSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\TempSpoofer.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3160 -
\??\c:\users\admin\appdata\local\temp\tempspoofer.exec:\users\admin\appdata\local\temp\tempspoofer.exe2⤵
- Executes dropped EXE
PID:908
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD59c9245810bad661af3d6efec543d34fd
SHA193e4f301156d120a87fe2c4be3aaa28b9dfd1a8d
SHA256f5f14b9073f86da926a8ed319b3289b893442414d1511e45177f6915fb4e5478
SHA51290d9593595511e722b733a13c53d2e69a1adc9c79b3349350deead2c1cdfed615921fb503597950070e9055f6df74bb64ccd94a60d7716822aa632699c70b767
-
Filesize
135KB
MD50b7ed43335e441dbaf1a66a6002a20fc
SHA16694e8a19f55b34fcfb85f6e04a37c640c8f9e7e
SHA25625ddd68e2e687be4fb1009f68db2c60efa1b8a93aeea4535d654630bc8de8452
SHA5120fc7312cd8f6ef9e39320f056f1b98f4d011a1232a202aae56a6ad4c174f12eed39bea3911921fbd83323ff6a6cb7353e19b89e9edf0dc1a69de09a0eb860646
-
Filesize
135KB
MD530cee1272f031af1f0ac832416173483
SHA1a984dc6d301ac807068ec4e2684ad2002ccbe598
SHA256788f85e902cd9b98cfd35c5ad5782ffd26499ab3f69fce6783a5ee902c17baad
SHA51218812a5c75f7b871720c595f9af610f3a26ba5df6238320d06d9a09ae94a03c895c4811a35fb09d9f1dabbb7341f372c9d94a475c016e99c6422add50cc6bfdd
-
Filesize
135KB
MD594490835947d9cc54a19aedc716104be
SHA144e4025fa8e342ea5e5f5036006c4d9b40a1acb6
SHA25641cb93eb0a6ef2e0076e58a0fde8530a7d2e275a0c94f7d1cca3d5a608053660
SHA512c877241f2910092bf12dfd9db2235782c226b37c7ca0a8156e8918809f375bd77420e754edb5be9182a4201dc5887af2dfbf3459ee73aa0102e4337fdb472244
-
Filesize
135KB
MD58d159525db913ec59928561eea085db4
SHA1db2ad84603b17353d47f9121dca11c97cb495cb8
SHA2566bce5a74190ef70058010a2995164629a989357a794d12aa48bbddd54553de8a
SHA5125dc37dc88a2fb9dcea4ab5f2b5301fdbca7b1b2557e67c42ee1339503b65d8dbf2caa6bfc01523e7663ef5537eff8a266ba8351723cb74b95e4879a82f56c3fe