Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 17:48
Behavioral task
behavioral1
Sample
vm.spoofer.rar
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
vm.spoofer.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
vm.spoofer (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
vm.spoofer (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Stub.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Stub.pyc
Resource
win10v2004-20241007-en
General
-
Target
vm.spoofer.rar
-
Size
12.6MB
-
MD5
d7284c837c00a754eb1b0ca456982ce9
-
SHA1
43514e3b6e1d78bef0498a3d469d779cd1a94e3d
-
SHA256
64896cf157af46d6f6047ba3c9af1100b46bf759a8f42b11e0be242a7addc8d6
-
SHA512
9c26e42734816e8a5833ca20e20ab566fb5211c054ceb5e34adcc3adf8f1bfb14b7e93d8a0f9e304d25943e7cf6c220a5fd19a885490c7782895b746058eaa62
-
SSDEEP
393216:hp04bbe2WvcgjxeVVyGkultjDLSGNgOlDgPxZ:T93ehjxe2G7lVLS7Ol4Z
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
vm.spoofer (2).exevm.spoofer (2).exepid process 1588 vm.spoofer (2).exe 3020 vm.spoofer (2).exe -
Loads dropped DLL 5 IoCs
Processes:
vm.spoofer (2).exepid process 1196 1196 3020 vm.spoofer (2).exe 1196 1196 -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI15882\python311.dll upx behavioral1/memory/3020-68-0x000007FEF6840000-0x000007FEF6E28000-memory.dmp upx -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule \Users\Admin\Desktop\vm.spoofer (2).exe pyinstaller -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 2452 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2452 7zFM.exe Token: 35 2452 7zFM.exe Token: SeSecurityPrivilege 2452 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zFM.exepid process 2452 7zFM.exe 2452 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
vm.spoofer (2).exedescription pid process target process PID 1588 wrote to memory of 3020 1588 vm.spoofer (2).exe vm.spoofer (2).exe PID 1588 wrote to memory of 3020 1588 vm.spoofer (2).exe vm.spoofer (2).exe PID 1588 wrote to memory of 3020 1588 vm.spoofer (2).exe vm.spoofer (2).exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\vm.spoofer.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2452
-
C:\Users\Admin\Desktop\vm.spoofer (2).exe"C:\Users\Admin\Desktop\vm.spoofer (2).exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\Desktop\vm.spoofer (2).exe"C:\Users\Admin\Desktop\vm.spoofer (2).exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5db09c9bbec6134db1766d369c339a0a1
SHA1c156d9f2d0e80b4cf41794cd9b8b1e8a352e0a0b
SHA256b1aac1e461174bbae952434e4dac092590d72b9832a04457c94bd9bb7ee8ad79
SHA512653a7fff6a2b6bffb9ea2c0b72ddb83c9c53d555e798eea47101b0d932358180a01af2b9dab9c27723057439c1eaffb8d84b9b41f6f9cd1c3c934f1794104d45
-
Filesize
12.9MB
MD5df104402ba4fc36be4e8e371c9c83418
SHA114264d2bb658299945600dec428f1775cf95b280
SHA256dbd839daf0a21e4a8226f7ccd54664777180293782693efc5141103c94a173d7
SHA512946df09a44ae8c7047333830944bd9416b8b96e2cd2c3539b3b3319196bedaa72155f1f3cc82071e11493a17418428b5049e5223e70de15008d18b1fc1360953