General
-
Target
Visual Services Spoofer.rar
-
Size
45.3MB
-
Sample
241124-bxq2zsxkew
-
MD5
bdf59ed18ba5cfe787ab94fdf50058b0
-
SHA1
ca5d92b6d6b5fc64c7a87997f7dbf004caa02266
-
SHA256
1a30aa1a7d5562799615d29430357d6bc8708d3ad1d0408ee09fbf3ce29846bd
-
SHA512
e89cd12011196049af2bfd535f7977065c3877d2de8ac9523be51aa93d60b8a85ee1c548def14a700ef7a6afcfaa4ae5b6e15af94ed96c5c4047c4eb708a43ac
-
SSDEEP
786432:Stsz65DqrK2OJMNetV5Ho5M71ngDvFpKVAz3HkO2HO30nQSgbkoGeeFmCIzGlGZ9:Sts2tEsMNetVBoq8pKCjHkO2Hy0nqWs9
Static task
static1
Behavioral task
behavioral1
Sample
Visual Services Spoofer.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Visual Services Spoofer.rar
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Visual Services Spoofer.rar
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Visual Services Spoofer.rar
-
Size
45.3MB
-
MD5
bdf59ed18ba5cfe787ab94fdf50058b0
-
SHA1
ca5d92b6d6b5fc64c7a87997f7dbf004caa02266
-
SHA256
1a30aa1a7d5562799615d29430357d6bc8708d3ad1d0408ee09fbf3ce29846bd
-
SHA512
e89cd12011196049af2bfd535f7977065c3877d2de8ac9523be51aa93d60b8a85ee1c548def14a700ef7a6afcfaa4ae5b6e15af94ed96c5c4047c4eb708a43ac
-
SSDEEP
786432:Stsz65DqrK2OJMNetV5Ho5M71ngDvFpKVAz3HkO2HO30nQSgbkoGeeFmCIzGlGZ9:Sts2tEsMNetVBoq8pKCjHkO2Hy0nqWs9
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1