Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 11:36
Behavioral task
behavioral1
Sample
RecRoomSpoofer.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
RecRoomSpoofer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RecRoomSpoofer.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
RecRoomSpoofer.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
RecRoomSpoofer.exe
Resource
android-x64-arm64-20240624-en
General
-
Target
RecRoomSpoofer.exe
-
Size
76.9MB
-
MD5
85c4f9cbe4733d0a7d1da0d0ea37d94d
-
SHA1
e8af8ad99f62dfebf48f02b1ec98d647525c932f
-
SHA256
33345c8da65f428736167b3288162f115d62bcd67354ab8ba160375ab105b00b
-
SHA512
6a8b0f1744ce4a7079cf9fbc4efe073185cd7a0db4c00519c40ad1a7c708fff1ac670455127abed8438f52fa16e77f32649a1e600dc6a9f0d2a2667aeaf95532
-
SSDEEP
1572864:vvHcRlKWah7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+h+rFfEGV37U:vvHcRYJhTSkB05awcfLdMpuyh+r5to
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1940 RecRoomSpoofer.exe -
resource yara_rule behavioral1/files/0x00030000000209bd-1363.dat upx behavioral1/memory/1940-1365-0x000007FEF5880000-0x000007FEF5F45000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1940 1544 RecRoomSpoofer.exe 31 PID 1544 wrote to memory of 1940 1544 RecRoomSpoofer.exe 31 PID 1544 wrote to memory of 1940 1544 RecRoomSpoofer.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\RecRoomSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\RecRoomSpoofer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\RecRoomSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\RecRoomSpoofer.exe"2⤵
- Loads dropped DLL
PID:1940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD536e9be7e881d1dc29295bf7599490241
SHA15b6746aedac80f0e6f16fc88136bcdcbd64b3c65
SHA256ebef43e92267a17f44876c702c914aafa46b997b63223ff46b12149fd2a2616e
SHA512090d4e9092b7fe00180164b6f84b4bd1d1a1e12dc8fea042eaa0e75cc08bb9994c91c3853bedec390208db4ef2e3447cd9be20d7dc20c14e6deb52a141d554cf
-
C:\Users\Admin\AppData\Local\Temp\_MEI15442\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER
Filesize4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
1023B
MD5141643e11c48898150daa83802dbc65f
SHA10445ed0f69910eeaee036f09a39a13c6e1f37e12
SHA25686da0f01aeae46348a3c3d465195dc1ceccde79f79e87769a64b8da04b2a4741
SHA512ef62311602b466397baf0b23caca66114f8838f9e78e1b067787ceb709d09e0530e85a47bbcd4c5a0905b74fdb30df0cc640910c6cc2e67886e5b18794a3583f
-
Filesize
92B
MD543136dde7dd276932f6197bb6d676ef4
SHA16b13c105452c519ea0b65ac1a975bd5e19c50122
SHA256189eedfe4581172c1b6a02b97a8f48a14c0b5baa3239e4ca990fbd8871553714
SHA512e7712ba7d36deb083ebcc3b641ad3e7d19fb071ee64ae3a35ad6a50ee882b20cd2e60ca1319199df12584fe311a6266ec74f96a3fb67e59f90c7b5909668aee1