Analysis
-
max time kernel
122s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 00:08
Behavioral task
behavioral1
Sample
Spoofer By Runtz (CRACKED).exe
Resource
win7-20240903-en
General
-
Target
Spoofer By Runtz (CRACKED).exe
-
Size
45KB
-
MD5
722eb89eb60b302bc2e07bc5fe73455a
-
SHA1
5af9d5b2ad0891e86170bad7e29f15fb0089ff97
-
SHA256
7dad8bde1930921c2dd4b769af27b5aa9b3889688ac7270d5807187335d2fcc4
-
SHA512
fe8ac25aee120c929614068a8315e4646572fd4d9ba0be55fef3ec59413b1a0d2a45016f357b699fba436f05ffa951cab2ed3c80ff7c666125f100da849d2a6b
-
SSDEEP
768:xdhO/poiiUcjlJInxQH9Xqk5nWEZ5SbTDan0WI7CPW5Z:vw+jjgnqH9XqcnW85SbTG0WIx
Malware Config
Extracted
xenorat
syfhnuc714-20814.portmap.host
Celex_Cracked
-
delay
5000
-
install_path
temp
-
port
8080
-
startup_name
Steam_Service
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 Spoofer By Runtz (CRACKED).exe -
Loads dropped DLL 1 IoCs
pid Process 276 Spoofer By Runtz (CRACKED).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spoofer By Runtz (CRACKED).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spoofer By Runtz (CRACKED).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2268 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 276 wrote to memory of 2052 276 Spoofer By Runtz (CRACKED).exe 31 PID 276 wrote to memory of 2052 276 Spoofer By Runtz (CRACKED).exe 31 PID 276 wrote to memory of 2052 276 Spoofer By Runtz (CRACKED).exe 31 PID 276 wrote to memory of 2052 276 Spoofer By Runtz (CRACKED).exe 31 PID 2052 wrote to memory of 2268 2052 Spoofer By Runtz (CRACKED).exe 32 PID 2052 wrote to memory of 2268 2052 Spoofer By Runtz (CRACKED).exe 32 PID 2052 wrote to memory of 2268 2052 Spoofer By Runtz (CRACKED).exe 32 PID 2052 wrote to memory of 2268 2052 Spoofer By Runtz (CRACKED).exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Spoofer By Runtz (CRACKED).exe"C:\Users\Admin\AppData\Local\Temp\Spoofer By Runtz (CRACKED).exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\Spoofer By Runtz (CRACKED).exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\Spoofer By Runtz (CRACKED).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Steam_Service" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF660.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD522afe6eb6dfc8761fc89d9e648844dc5
SHA19ab18b9ad6e1fd2512c5aaee8d54cfc0884d1082
SHA25674636be3f882e9cee04e4635a24b3929a527109a88f19cc05e986bbbc1d37210
SHA512dec6ee6ec78de45e11f94d45af819ba97317145e5030953ecf1298e166dcb0d847ad4cf2ff79b713064513d2f61104db8282b90ec96f657be1297480458f0702
-
Filesize
45KB
MD5722eb89eb60b302bc2e07bc5fe73455a
SHA15af9d5b2ad0891e86170bad7e29f15fb0089ff97
SHA2567dad8bde1930921c2dd4b769af27b5aa9b3889688ac7270d5807187335d2fcc4
SHA512fe8ac25aee120c929614068a8315e4646572fd4d9ba0be55fef3ec59413b1a0d2a45016f357b699fba436f05ffa951cab2ed3c80ff7c666125f100da849d2a6b