Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 07:09
Behavioral task
behavioral1
Sample
Impulse Spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Impulse Spoofer.exe
Resource
win10v2004-20241007-en
General
-
Target
Impulse Spoofer.exe
-
Size
7.4MB
-
MD5
6beb2c6d6377317765af8c3152019a55
-
SHA1
8f9f1ba5dfd50c3b6244d107aa12c5a6c424a6d6
-
SHA256
82eecfa550a557610974d63089b866e0856941841404adb9d82e7dc9e5fc16a0
-
SHA512
ed94312914984ae07bd08b587b74dafb11c9105c18e00f0eddf9818a6ba408525fe0d7042597aac08e92e50159e7c140303a2fe910f438a947c2cf8090e93815
-
SSDEEP
196608:ut8Pu5GLjv+bhqNVoB0SEsucQZ41JBbIEs1LP:I8PPL+9qz80SJHQK1J9shP
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 320 Impulse Spoofer.exe -
resource yara_rule behavioral1/files/0x000500000001945c-21.dat upx behavioral1/memory/320-23-0x000007FEF6630000-0x000007FEF6C1E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2180 wrote to memory of 320 2180 Impulse Spoofer.exe 30 PID 2180 wrote to memory of 320 2180 Impulse Spoofer.exe 30 PID 2180 wrote to memory of 320 2180 Impulse Spoofer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Impulse Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Impulse Spoofer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Impulse Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Impulse Spoofer.exe"2⤵
- Loads dropped DLL
PID:320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD576eb1ad615ba6600ce747bf1acde6679
SHA1d3e1318077217372653be3947635b93df68156a4
SHA25630be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1
SHA5122b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb