Overview
overview
7Static
static
3Spoof.rar
windows7-x64
7Spoof.rar
windows10-2004-x64
7Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1Spoofer.deps.json
windows7-x64
3Spoofer.deps.json
windows10-2004-x64
3Spoofer.exe
windows7-x64
1Spoofer.exe
windows10-2004-x64
1Spoofer.exe
windows7-x64
1Spoofer.exe
windows10-2004-x64
1Spoofer.pdb
windows7-x64
3Spoofer.pdb
windows10-2004-x64
3Spoofer.ru...g.json
windows7-x64
3Spoofer.ru...g.json
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
Spoof.rar
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Spoof.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Spoofer.deps.json
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Spoofer.deps.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Spoofer.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Spoofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Spoofer.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
Spoofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Spoofer.pdb
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Spoofer.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Spoofer.runtimeconfig.json
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Spoofer.runtimeconfig.json
Resource
win10v2004-20241007-en
General
-
Target
Spoofer.deps.json
-
Size
2KB
-
MD5
db8284dc2f8127518f3b11c53cdfc016
-
SHA1
42b3080b237a42a07685e67b543fa1c64271a82d
-
SHA256
2f9509d3abe2ed95f304d74137a542f56888cc821afb9f7b1f0e79e8e2625fe0
-
SHA512
90e89bde628afafef671257ece4e9bc2e3fff7b02dfd74f131c0ed48fb418cc00b9033fe71ca6c7d6381c85068508017660487bb27b1370f885ad854a925bdd5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2880 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 AcroRd32.exe 2880 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2900 2548 cmd.exe 31 PID 2548 wrote to memory of 2900 2548 cmd.exe 31 PID 2548 wrote to memory of 2900 2548 cmd.exe 31 PID 2900 wrote to memory of 2880 2900 rundll32.exe 33 PID 2900 wrote to memory of 2880 2900 rundll32.exe 33 PID 2900 wrote to memory of 2880 2900 rundll32.exe 33 PID 2900 wrote to memory of 2880 2900 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Spoofer.deps.json1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Spoofer.deps.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Spoofer.deps.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59dec1ab0cca7a443e0e5ff51386f6eba
SHA1f8bc8b8e3f31ba57768a8437541ac8884724c724
SHA256ab4784919f04acc1be1c876350c19180955ea459ea06cd52336b8ecca866d4a5
SHA512a3d49b58fc346ff3dcb5ad5766b7d3bf3d305fd1434e57128e3fc63abeed8ad6c21591710ff13cd249c351e5fffdb7e8fb341fd28e5acb0596750d6a0d9a90f4