Overview
overview
9Static
static
3Cleaner1 R...IN.bat
windows7-x64
8Cleaner1 R...IN.bat
windows10-2004-x64
8Cleaner2.bat
windows7-x64
7Cleaner2.bat
windows10-2004-x64
1Cleaner3.bat
windows7-x64
1Cleaner3.bat
windows10-2004-x64
1Cleaner4.bat
windows7-x64
8Cleaner4.bat
windows10-2004-x64
8Cleaner5.bat
windows7-x64
7Cleaner5.bat
windows10-2004-x64
5Cleaner6.bat
windows7-x64
7Cleaner6.bat
windows10-2004-x64
7Cleaner7.bat
windows7-x64
8Cleaner7.bat
windows10-2004-x64
8MAC.cmd
windows7-x64
1MAC.cmd
windows10-2004-x64
1PH Spoofer.exe
windows7-x64
9PH Spoofer.exe
windows10-2004-x64
9Analysis
-
max time kernel
148s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
Cleaner1 RUN ALL AS ADMIN.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Cleaner1 RUN ALL AS ADMIN.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Cleaner2.bat
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
Cleaner2.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
Cleaner3.bat
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Cleaner3.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
Cleaner4.bat
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Cleaner4.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Cleaner5.bat
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Cleaner5.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
Cleaner6.bat
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Cleaner6.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Cleaner7.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Cleaner7.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
MAC.cmd
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
MAC.cmd
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
PH Spoofer.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
PH Spoofer.exe
Resource
win10v2004-20240426-en
General
-
Target
PH Spoofer.exe
-
Size
309KB
-
MD5
ae570e5768742a572e36ac8d999c03f5
-
SHA1
9eabf7fdc94adeb65248f7593cd6f0abd1448ef8
-
SHA256
7db7e8ba889c41199e657fa9d263c5f18830a35bab6b810e267baadae1d938ae
-
SHA512
8f46023ad4b561f9fcec5c62eba6a384e95b07dca8baeadcce9bf3039a07fb9adc6f2312a386689d291dad26d8f1476b72d8f5f7bc6a62220683f3ef221552e0
-
SSDEEP
6144:qKjViFkFl/AAGbFd1cUp3AJEFzqlOcWluW4bLcCCQvjQL85d:2rA6Bl7GcCCQvjQL4d
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
PH Spoofer.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions PH Spoofer.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
PH Spoofer.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools PH Spoofer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
PH Spoofer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PH Spoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PH Spoofer.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
PH Spoofer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PH Spoofer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 PH Spoofer.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
PH Spoofer.exepid process 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe 3624 PH Spoofer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PH Spoofer.exedescription pid process Token: SeDebugPrivilege 3624 PH Spoofer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PH Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\PH Spoofer.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624