General
-
Target
loader_spoff.exe
-
Size
14.8MB
-
Sample
240902-f29gcatflb
-
MD5
599a4fb8c831911b34006b625fdf01f8
-
SHA1
24d46fd642fc6054a50206fd2ac345b91aac33b6
-
SHA256
afa307461c073e2105ba5e46415ef924bc53473a4679c9c00a8f7289e64d4b2e
-
SHA512
1b3f74c74856236de0980a67900fdaeeec549fb8ee8f368eec3f0c57fc685a60f16513503c0b3c3c1f5e3cef9ce1454bc08139f5ef4fd4761ec4be34e9f242ba
-
SSDEEP
196608:o9huXbljcZCmOXWKlmADLZlAJK3SUMzN5UA+EU8M4doL/r+UAhphS9ulLLqJRxKb:o9GjcKWK0LKNiskVm/iFScRLGK3h1p6i
Behavioral task
behavioral1
Sample
loader_spoff.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
loader_spoff.exe
-
Size
14.8MB
-
MD5
599a4fb8c831911b34006b625fdf01f8
-
SHA1
24d46fd642fc6054a50206fd2ac345b91aac33b6
-
SHA256
afa307461c073e2105ba5e46415ef924bc53473a4679c9c00a8f7289e64d4b2e
-
SHA512
1b3f74c74856236de0980a67900fdaeeec549fb8ee8f368eec3f0c57fc685a60f16513503c0b3c3c1f5e3cef9ce1454bc08139f5ef4fd4761ec4be34e9f242ba
-
SSDEEP
196608:o9huXbljcZCmOXWKlmADLZlAJK3SUMzN5UA+EU8M4doL/r+UAhphS9ulLLqJRxKb:o9GjcKWK0LKNiskVm/iFScRLGK3h1p6i
-
Deletes NTFS Change Journal
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Server Software Component: Terminal Services DLL
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Time Providers
1Create or Modify System Process
1Windows Service
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Time Providers
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
1Indicator Removal
1File Deletion
1Virtualization/Sandbox Evasion
1