Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 16:42
Static task
static1
Behavioral task
behavioral1
Sample
Spoofer.rar
Resource
win10v2004-20240709-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
Spoofer.rar
-
Size
422KB
-
MD5
cdc6779a69ce4a1e319c316dbf21c1e7
-
SHA1
921679277b6af0283b827c0faf0bbdf8c6fcd3f4
-
SHA256
c6768339c3b46430d12d13c5fc0571a677f68a420f44cad5d10e09c698bbbe11
-
SHA512
faf8a677de0f0e8e1dc436686eb4686430c8e9a39b4daded9206fca471bfffc274867997be910a60bba269c0389c493868231da72d7222b1460eca25049141ab
-
SSDEEP
6144:wvzWowkowg29s20s3/jZiAHgAKD4YtdepFsKMtfcO/LgRTu0tRIUp42y:+WkI2BsAKDjIpKCFTLRA2y
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2756 OpenWith.exe 2276 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2276 7zFM.exe Token: 35 2276 7zFM.exe -
Suspicious use of SetWindowsHookEx 41 IoCs
pid Process 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe 2756 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Spoofer.rar1⤵
- Modifies registry class
PID:1448
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2756
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2276