Overview
overview
7Static
static
7Temp Spoofer.zip
windows7-x64
1Temp Spoofer.zip
windows10-2004-x64
1Temp Spoof...er.bat
windows7-x64
1Temp Spoof...er.bat
windows10-2004-x64
1Temp Spoof...on.pdf
windows7-x64
3Temp Spoof...on.pdf
windows10-2004-x64
3Temp Spoof...ent.7z
windows7-x64
3Temp Spoof...ent.7z
windows10-2004-x64
3client.exe
windows7-x64
1client.exe
windows10-2004-x64
1Temp Spoof...ol.rar
windows7-x64
3Temp Spoof...ol.rar
windows10-2004-x64
3dControl/dControl.exe
windows7-x64
7dControl/dControl.exe
windows10-2004-x64
7out.exe
windows7-x64
out.exe
windows10-2004-x64
dControl/dControl.ini
windows7-x64
1dControl/dControl.ini
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 09:27
Behavioral task
behavioral1
Sample
Temp Spoofer.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Temp Spoofer.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Temp Spoofer/Checker.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Temp Spoofer/Checker.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Temp Spoofer/Temp Spoofer Instruction.pdf
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Temp Spoofer/Temp Spoofer Instruction.pdf
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Temp Spoofer/client.7z
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Temp Spoofer/client.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
client.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
client.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Temp Spoofer/dControl.rar
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Temp Spoofer/dControl.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
dControl/dControl.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
dControl/dControl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
out.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
dControl/dControl.ini
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
dControl/dControl.ini
Resource
win10v2004-20240802-en
General
-
Target
Temp Spoofer/Temp Spoofer Instruction.pdf
-
Size
56KB
-
MD5
c5de0e69118d9c42a607c1f522a6d5e7
-
SHA1
facda6392bde8c76f6123b944343adaa949e189f
-
SHA256
60173e95c0a0bcbc6084e3453a6e8898ab23e9efda7fd30c5eec9874b41d1dc2
-
SHA512
58bd985d98dbd55715ba859d952ec89c9665d404af832c4e2ba812e33c7dafa23bd9450d844491010554bf4e45ffe28660ee00d575ad1b071263955c7d0289fe
-
SSDEEP
1536:sCVWGndgCZmNMd8xTjxJhzhOrnWA+jsWpdVS8di:frd9Q/FxJhz3AQsCdVSui
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2232 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2232 AcroRd32.exe 2232 AcroRd32.exe 2232 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Temp Spoofer\Temp Spoofer Instruction.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56334401746bd2d2fd4ee1a7a7df0eabe
SHA112ab88715eaf1e7e19a9264ab8b29845e9c81b6e
SHA256325bdf5b06bc8803b2240c219db6d9d5d26ab02c6b50ee621f2639806fd32deb
SHA512a7dcc8e873f4b639b4653fe2953b39e8f27bb79e21fddcbd4717d6ca51d01c5bfa37b6d6694d7a0f9c5750711f87fd13c0b73c226824918ff7d05d588f604b18