Analysis
-
max time kernel
111s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
spoofer.exe
Resource
win10v2004-20240802-en
General
-
Target
spoofer.exe
-
Size
18.6MB
-
MD5
65e4a56f0470b56cbb754bb1d910a480
-
SHA1
216b062f017a484bbfd8bcdf8957836eb1017c78
-
SHA256
94e9431789ddd3ba6e910053790bd126d43439404254faeb4a66941dbd061213
-
SHA512
e9256791635ce0eb8d82779a415488772999a89849beb9f79d35a8eb9ee3b87703b597b34e4623df0717aff861da03d46fd0f7227cbe4c107ae9246ef2b3cbe0
-
SSDEEP
393216:5a59h1CLAM/vYDuVAoDjakkwYpebelQgh9Ctx0nWjEp1z:5aAAy2oD7Y4bMQg3Ctx0nWjg
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2696 spoofer_12.8.0.exe 2512 spoofer_12.8.0.exe 1968 spoofer_12.8.0.exe 1956 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe -
Loads dropped DLL 29 IoCs
pid Process 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found 1272 Process not Found -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main spoofer.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2696 spoofer_12.8.0.exe 1968 spoofer_12.8.0.exe 2696 spoofer_12.8.0.exe 1968 spoofer_12.8.0.exe 2696 spoofer_12.8.0.exe 2696 spoofer_12.8.0.exe 1968 spoofer_12.8.0.exe 2696 spoofer_12.8.0.exe 1968 spoofer_12.8.0.exe 2696 spoofer_12.8.0.exe 1968 spoofer_12.8.0.exe 1968 spoofer_12.8.0.exe 2512 spoofer_12.8.0.exe 2512 spoofer_12.8.0.exe 1956 spoofer_12.8.0.exe 2512 spoofer_12.8.0.exe 2512 spoofer_12.8.0.exe 1956 spoofer_12.8.0.exe 2512 spoofer_12.8.0.exe 2512 spoofer_12.8.0.exe 1956 spoofer_12.8.0.exe 1956 spoofer_12.8.0.exe 1956 spoofer_12.8.0.exe 1956 spoofer_12.8.0.exe 1956 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 spoofer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2696 spoofer_12.8.0.exe Token: SeDebugPrivilege 1968 spoofer_12.8.0.exe Token: SeDebugPrivilege 2512 spoofer_12.8.0.exe Token: SeDebugPrivilege 1956 spoofer_12.8.0.exe Token: SeDebugPrivilege 2548 spoofer_12.8.0.exe Token: SeDebugPrivilege 2612 spoofer_12.8.0.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3020 spoofer.exe 3020 spoofer.exe 2696 spoofer_12.8.0.exe 2696 spoofer_12.8.0.exe 1968 spoofer_12.8.0.exe 1968 spoofer_12.8.0.exe 2512 spoofer_12.8.0.exe 2512 spoofer_12.8.0.exe 1956 spoofer_12.8.0.exe 1956 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2548 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe 2612 spoofer_12.8.0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\spoofer.exe"C:\Users\Admin\AppData\Local\Temp\spoofer.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3020
-
C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2696
-
C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2512
-
C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1968
-
C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1956
-
C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2548
-
C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19.4MB
MD5809d0f4710f40648d814eb3f8403d2ec
SHA18ff21ac05cb0dd3856b1b9cb749ed854f210cf06
SHA25643eaebe56ecf86435a620c9c181a5dddc0a1beea73765f75c77615cac84be955
SHA512c79a57c2a948b38af5430bc0ab38ca004c632c27519527d1fce795c39e6e643393f797341bdcbb52e4ce76fc9523b0f3c449c16c7681ba36d89c247ebdbeb16a