Analysis

  • max time kernel
    36s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2024 13:53

General

  • Target

    SecHex-Spoofy V1.5.8.zip

  • Size

    2.0MB

  • MD5

    5e4cd0586fdded65e8227c768a087fb0

  • SHA1

    7585d2682d3ab3d9360cf8545ef7ab77e955b9fc

  • SHA256

    2864750adbdd9e79a043c3f281c2e0d6b7d2d5009ebfd4268f8a7b112745a3d6

  • SHA512

    2007fa21c0b6f12c560648e0985a59112365725d159e04cf2761e1e0adb9b833a6325cdf5ebfb86f75ae1320ce22f11d95f7b2912de7ef2c29856d74cfccf37e

  • SSDEEP

    24576:+tYIdI9xQSIwGy5p6s5Bc2rKBf0hnuPAqQUwV1bC410vaV6rrUW1N24Jdd2GfcNd:ff9uKv5rKBunuPAqyVdCvvL1lFcev2v

Malware Config

Signatures

  • Modifies RDP port number used by Windows 1 TTPs
  • Maps connected drives based on registry 3 TTPs 5 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Remote Services: SMB/Windows Admin Shares 1 TTPs 1 IoCs

    Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\SecHex-Spoofy V1.5.8.zip"
    1⤵
      PID:1900
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3896
      • C:\Users\Admin\Desktop\SecHex-Spoofy V1.5.8\SecHex-GUI.exe
        "C:\Users\Admin\Desktop\SecHex-Spoofy V1.5.8\SecHex-GUI.exe"
        1⤵
        • Enumerates system info in registry
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1284
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Disable-NetAdapter -Name '{7B9652F0-418C-4AB1-8951-FD52F0A28BA6}'; Start-Sleep -Seconds 5; Enable-NetAdapter -Name '{7B9652F0-418C-4AB1-8951-FD52F0A28BA6}'"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3124
        • C:\Windows\SYSTEM32\reg.exe
          "reg" export HKEY_LOCAL_MACHINE\SYSTEM "C:\Users\Admin\Desktop\SecHex-Spoofy V1.5.8\Backup\backup.reg" /y
          2⤵
          • Maps connected drives based on registry
          • Remote Services: SMB/Windows Admin Shares
          • System Location Discovery: System Language Discovery
          • Checks SCSI registry key(s)
          PID:2460
        • C:\Windows\SYSTEM32\reg.exe
          "reg" export HKEY_LOCAL_MACHINE\HARDWARE "C:\Users\Admin\Desktop\SecHex-Spoofy V1.5.8\Backup\backup.reg" /y
          2⤵
            PID:4328
          • C:\Windows\SYSTEM32\reg.exe
            "reg" export HKEY_LOCAL_MACHINE\SOFTWARE "C:\Users\Admin\Desktop\SecHex-Spoofy V1.5.8\Backup\backup.reg" /y
            2⤵
              PID:560

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\REG1846.tmp

            Filesize

            36.7MB

            MD5

            43a0c86463e237cd21b6b61b7c9b7a91

            SHA1

            4bc8676d88c350d9ff69fac0ca34dedfadbdb8a7

            SHA256

            c60e5b136e9a9c61b73dc59dc2d708d28af26b6fc2d46975d96152ff357ec12b

            SHA512

            2f95011c18452ee3cced26373499ae75c3ec005b5679c6130df310bf6bf1d65345826e7f15f905d65a82f9145f8dcdac467cd1839484bf3f4494f44aa7a53821

          • C:\Users\Admin\AppData\Local\Temp\REG21FA.tmp

            Filesize

            218KB

            MD5

            6bbc1244e83ab205194b9c767aebd6ef

            SHA1

            ca13d5ef1f07d2b52cc5ee04f8d6889eda7e7b08

            SHA256

            4aeb2332735b9d4d7d2cbde6f050ed6f74c1d8daadb0e5ea68c51e973f205a66

            SHA512

            6aa673d9ed6cc9bf51bb3b61e0ef09bbaf1305c5adf4a1fed7ce294e84fff4563819a0e9c222f2dc2cdf5887d165e7048b4ecaadcb2c486f298538319c4bb7a0

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yccsj5dy.d4f.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\Desktop\SecHex-Spoofy V1.5.8\Backup\backup.reg

            Filesize

            218KB

            MD5

            7535ad8cb284c009c088035dea2f14a6

            SHA1

            4e0a3f4aff2d1159669bcb769ef4aa57a9856172

            SHA256

            86bbe53643202b40bccef8739053200908577095c656887e91902caa5fb44c73

            SHA512

            bac10a497a9f953118e87e0a3b01e4c8c6e61761f73948eb17bb69481d61bf8baed7276cef9f4fda5b70bf2b130525f2e162ef62c4e2f0e2b0036eae632640e6

          • memory/1284-0-0x00007FFB422CB000-0x00007FFB422CC000-memory.dmp

            Filesize

            4KB

          • memory/1284-29-0x00007FFB422CB000-0x00007FFB422CC000-memory.dmp

            Filesize

            4KB

          • memory/3124-22-0x000002176CD60000-0x000002176CD82000-memory.dmp

            Filesize

            136KB