Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3Spoofer-1....32.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI..._3.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows10-2004-x64
3$SYSDIR/Packet.dll
windows10-2004-x64
1$SYSDIR/pthreadVC.dll
windows10-2004-x64
1$SYSDIR/wpcap.dll
windows10-2004-x64
1WinPcapInstall.dll
windows10-2004-x64
3rpcapd.exe
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...86.exe
windows10-2004-x64
7firewall.vbs
windows10-2004-x64
1restore.exe
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3scamper.exe
windows10-2004-x64
1spoofer-cli.exe
windows10-2004-x64
1spoofer-gui.exe
windows10-2004-x64
1spoofer-prober.exe
windows10-2004-x64
1spoofer-scheduler.exe
windows10-2004-x64
1uninstall.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
Spoofer-1.4.12-win32.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/WinPcap_4_1_3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$SYSDIR/Packet.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
$SYSDIR/pthreadVC.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$SYSDIR/wpcap.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
WinPcapInstall.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
rpcapd.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/vc2012u4redist_x86.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
firewall.vbs
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
restore.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
scamper.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
spoofer-cli.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
spoofer-gui.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
spoofer-prober.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
spoofer-scheduler.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
uninstall.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
2ae993a2ffec0c137eb51c8832691bcb
-
SHA1
98e0b37b7c14890f8a599f35678af5e9435906e1
-
SHA256
681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
-
SHA512
2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
SSDEEP
192:vPtkumJX7zB22kGwfy0mtVgkCPOsE1un:k702k5qpdsEQn
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 632 4328 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2520 wrote to memory of 4328 2520 rundll32.exe 86 PID 2520 wrote to memory of 4328 2520 rundll32.exe 86 PID 2520 wrote to memory of 4328 2520 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 6203⤵
- Program crash
PID:632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4328 -ip 43281⤵PID:4132