Overview
overview
3Static
static
3New Compre...er.zip
windows7-x64
1New Compre...er.zip
windows10-2004-x64
1net8.0/JObject.dll
windows7-x64
1net8.0/JObject.dll
windows10-2004-x64
1net8.0/New...on.dll
windows7-x64
1net8.0/New...on.dll
windows10-2004-x64
1net8.0/Spo...s.json
windows7-x64
3net8.0/Spo...s.json
windows10-2004-x64
3net8.0/Spo...se.exe
windows7-x64
1net8.0/Spo...se.exe
windows10-2004-x64
1net8.0/Spo...se.exe
windows7-x64
1net8.0/Spo...se.exe
windows10-2004-x64
1net8.0/Spo...se.pdb
windows7-x64
3net8.0/Spo...se.pdb
windows10-2004-x64
3net8.0/Spo...g.json
windows7-x64
3net8.0/Spo...g.json
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
New Compressed (zipped) Folder.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
New Compressed (zipped) Folder.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
net8.0/JObject.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
net8.0/JObject.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
net8.0/Newtonsoft.Json.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
net8.0/Newtonsoft.Json.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
net8.0/Spoofer Base.deps.json
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
net8.0/Spoofer Base.deps.json
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
net8.0/Spoofer Base.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
net8.0/Spoofer Base.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
net8.0/Spoofer Base.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
net8.0/Spoofer Base.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
net8.0/Spoofer Base.pdb
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
net8.0/Spoofer Base.pdb
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
net8.0/Spoofer Base.runtimeconfig.json
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
net8.0/Spoofer Base.runtimeconfig.json
Resource
win10v2004-20240508-en
General
-
Target
net8.0/Spoofer Base.deps.json
-
Size
1KB
-
MD5
6505f505d9826ce6a4a8eaa049e9c1a1
-
SHA1
0f1e89fc96dcdc109b4cd891de1baa6f5bdf0c4c
-
SHA256
287819587c448f925431384eb750f2dfeb6d2570757553512ef615b2060fbe86
-
SHA512
740765d4b1f04016af01b0795ab8f247f956d3035ebe0a343df5be480113333361a37c90040758253b5ce01494f740d2f6e55ef38e43a280c90aa4c073f3e176
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.json rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2336 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2336 AcroRd32.exe 2336 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2636 1916 cmd.exe 29 PID 1916 wrote to memory of 2636 1916 cmd.exe 29 PID 1916 wrote to memory of 2636 1916 cmd.exe 29 PID 2636 wrote to memory of 2336 2636 rundll32.exe 30 PID 2636 wrote to memory of 2336 2636 rundll32.exe 30 PID 2636 wrote to memory of 2336 2636 rundll32.exe 30 PID 2636 wrote to memory of 2336 2636 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\net8.0\Spoofer Base.deps.json"1⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\net8.0\Spoofer Base.deps.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\net8.0\Spoofer Base.deps.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD554df021ab6d463d7b89f31c8d4576ba3
SHA1b9ad871428ff7df9219c4cbe81b27bcee8346e78
SHA25684f421bc4f57ec999da5c69f1b571dd7d02daddbb57aa3f032039faddd9c94c0
SHA512f45fe8d65533001ce6ed6a6ae3bca3e1e5ac1afb7aa94931fe9339dbb9558e29b1061ddf185553d7763666c7548775e3e024cbd5239e27f3c0a4216ee5f3cf68