Resubmissions

05/10/2024, 15:05

241005-sf8zxazfna 7

05/10/2024, 15:02

241005-sesxaszfle 3

Analysis

  • max time kernel
    111s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 15:05

General

  • Target

    spoofer.exe

  • Size

    18.6MB

  • MD5

    65e4a56f0470b56cbb754bb1d910a480

  • SHA1

    216b062f017a484bbfd8bcdf8957836eb1017c78

  • SHA256

    94e9431789ddd3ba6e910053790bd126d43439404254faeb4a66941dbd061213

  • SHA512

    e9256791635ce0eb8d82779a415488772999a89849beb9f79d35a8eb9ee3b87703b597b34e4623df0717aff861da03d46fd0f7227cbe4c107ae9246ef2b3cbe0

  • SSDEEP

    393216:5a59h1CLAM/vYDuVAoDjakkwYpebelQgh9Ctx0nWjEp1z:5aAAy2oD7Y4bMQg3Ctx0nWjg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 29 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\spoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\spoofer.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3020
  • C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe
    "C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2696
  • C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe
    "C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2512
  • C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe
    "C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1968
  • C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe
    "C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1956
  • C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe
    "C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2548
  • C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe
    "C:\Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\Desktop\spoofer\spoofer_12.8.0.exe

    Filesize

    19.4MB

    MD5

    809d0f4710f40648d814eb3f8403d2ec

    SHA1

    8ff21ac05cb0dd3856b1b9cb749ed854f210cf06

    SHA256

    43eaebe56ecf86435a620c9c181a5dddc0a1beea73765f75c77615cac84be955

    SHA512

    c79a57c2a948b38af5430bc0ab38ca004c632c27519527d1fce795c39e6e643393f797341bdcbb52e4ce76fc9523b0f3c449c16c7681ba36d89c247ebdbeb16a

  • memory/1956-35-0x00000000035E0000-0x0000000003692000-memory.dmp

    Filesize

    712KB

  • memory/1968-34-0x0000000003570000-0x0000000003622000-memory.dmp

    Filesize

    712KB

  • memory/2548-44-0x0000000001260000-0x00000000025D0000-memory.dmp

    Filesize

    19.4MB

  • memory/2696-23-0x00000000002F0000-0x0000000001660000-memory.dmp

    Filesize

    19.4MB

  • memory/2696-24-0x000000001D460000-0x000000001D5BE000-memory.dmp

    Filesize

    1.4MB

  • memory/2696-25-0x0000000003730000-0x00000000037E2000-memory.dmp

    Filesize

    712KB

  • memory/2696-27-0x000000001DDE0000-0x000000001E700000-memory.dmp

    Filesize

    9.1MB

  • memory/2696-36-0x0000000022490000-0x0000000022896000-memory.dmp

    Filesize

    4.0MB