Analysis

  • max time kernel
    79s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 00:37

General

  • Target

    RippleSpoofer.exe

  • Size

    15.6MB

  • MD5

    76ed914a265f60ff93751afe02cf35a4

  • SHA1

    4f8ea583e5999faaec38be4c66ff4849fcf715c6

  • SHA256

    51bd245f8cb24c624674cd2bebcad4152d83273dab4d1ee7d982e74a0548890b

  • SHA512

    83135f8b040b68cafb896c4624bd66be1ae98857907b9817701d46952d4be9aaf7ad1ab3754995363bb5192fa2c669c26f526cafc6c487b061c2edcceebde6ac

  • SSDEEP

    393216:QAiUmWQEnjaa4cqmAa4ICSSF1a0HPRV8gtFlSiZh5ZlZ:bhnGhMAXSmHXFA+

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RippleSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\RippleSpoofer.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/Qt5NMSgdzU
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    1a0d9f7e85973412d65ef54e637ff1a1

    SHA1

    21007a3099fe6891939027d1dfbcb618bba57386

    SHA256

    f5a987643403e7a529d948e4a29b1196aa55da4f916e303bdb4fc533a772831a

    SHA512

    f6dacd1903875f6c0b0c134c78e6c5e73becb3061a506e412cdb4e0edd9ce5c651a8957176f3c5a62f68ef6f3f758840cf2263fe2c4803d5f701094264431e76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    176404530c6322a6bf10ee570310040d

    SHA1

    ff5344602df4573f97e9c061997fcd4937f77aef

    SHA256

    7d99e6a08f144eb68c2cbae6412fba66966caa5968c6b41bd7d334c1ca440184

    SHA512

    d40c9978dcc7de211295f98d09c8a39df31112038f83601d96195b69135d10d325894a3d598f2609ec6dfc1838519053e6d41bb880d3f8552bb123de2d67f03f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec2b26dd77abe549f4086c355ef93a26

    SHA1

    9b307f4eb11bdad79e7eb8f60de46d6b819d5ebe

    SHA256

    c13dfd29ff53a7822c12de1fc8d036cab873824a431ca97224404a3aca0775e5

    SHA512

    5868f2bee64dc5755df3971df516b5971c01765464801575bee95783c760cd5abf7b0dc450e9a040469aece7b0c98e176fc12b08331b5ffe8ff9d6f78dc44b39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    903a44515b07035842978e7d0e21d3a0

    SHA1

    c55e3a457bf39c7e3fb2cb068d528aa15383957e

    SHA256

    e97682a1245ae46603281dedd11eb4bf5c4b1300756c5c3bdc7bbc688fa6c24a

    SHA512

    f32784be10c7412e35dda536ec457bca561c5a4ac9d2123d1240998ef489ee715a8e5d0ebc4cb0003bc03b84e4e6342e09639cbdf19d95bade96b1098174b441

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d8dcc06a609450c5780c87e84c27fe4

    SHA1

    944efa46c35a988a1dc9a87d779628ae641b8969

    SHA256

    cf6a401daa544237a2c15117409c0407d028f947553631bd3dffecae3b6da9e5

    SHA512

    762d7e0f5f9262638dc6edcd9fc84da23023ae1b5b398ca2ffb556031ed9255dff5e233b7d1fb374501438edf7772af7c24224700ed1663f883d9382d2fb0696

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfd4c1e7a0f83fe2ea2c62b527f21010

    SHA1

    b2aa11f85102c799a78c0f7a616d28de45f62697

    SHA256

    f4b0386c3a7bfe5eba4e0ad862cb4e41e7e754f7c2f25152d781896426689e0e

    SHA512

    77203292e87b1e34041e3f53500b6a4194ffa3310018b3a522e1d9a4f785664228924b610f49c4b190b7f9876220fbc95370d43ad42846917f5976a5ce69bffe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b84782a459ffddcca9dc471fe0ee7384

    SHA1

    b64bd5f26640b68451f5a438c3922c1f8b075943

    SHA256

    24fbae4af00350311e3704ff348adb3ce0daa30c836e0af743d6a9139a41c561

    SHA512

    ea581c878ed0b614164690ed582bbd745a20d8d3b842bca11554d5191b733ee5d750855d5baf13a10be459592dc2079f5a7bc428fa2c812c7d715f72c3e9b3b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    621457be730a0d731c0d15479fb2c27f

    SHA1

    98aefb97d1878b58718c42f66441b98c4dba58d6

    SHA256

    aa7a3c53a9d501d55cc7631d311e1f98fc924096ea4813d26fbc9511314f3523

    SHA512

    7bf9f7027b189d52ddac82a3179394d61cac90915836935b37217b1917cee8cd018de6d1bd79c81d0771ace5a7490cb74696884495d6cdebb939a1dd8cb1d6f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1075e2543418920cc694f8c7d84ac70c

    SHA1

    4d0b461f05359acaf3b5618c8c83baccb5e1d084

    SHA256

    37fc8217d6c055e4a25a1366007c90ea4edea48ce49fbc09dddd0f23db8dc6aa

    SHA512

    5e94b540e601035eea9643636a36d8567edcf0865ac71bb4ee43ccc7435bf03f4524bc1b9d9171738dffa9e8df33b5ab9d87e53dab55d21ba2490c0e67d38caa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71c127a48dbc8ad0f73411678ce4e334

    SHA1

    430772de39b6f40f409f1088b82f3bbdd00a2b9a

    SHA256

    7723aaa3f91bb79ecca1f19b8434ded8acf339bf03245d910871a89e21241727

    SHA512

    fad6f5d17793583bed482ac1a26263eaed139776d2fce3f48896d6007e15687aa048e3cfe3813e67691926022cc0c43a93ffc0bd2fc2051e09d9b7351545092c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06d2ce3eb090d4c71ff8caea881669df

    SHA1

    813c180fe423b1e22480232e476e02be99733d5c

    SHA256

    bd85ed5998ad2d194aa2dbaf60c44e5d7be8f55a6405bfdcdc4c7a1e4db15501

    SHA512

    bda39df210cce977b122809188f43c5ae94271a9f30dd0091aa34ad7de43e227507ca49d6693c52831febd02aa4c626d1cca5d2b53c2aab8fdb79daba92db1fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    566e0c39fdc0a42aa8ffa3dae9450ec0

    SHA1

    9c78c9ee483b547adde73aa45a14036a015eeca1

    SHA256

    387b2766e16f960d04862ecb8da3a524e34efdc338a317a258936ddb7c7f4a28

    SHA512

    45b93d72c1d45b7a5af5b93c0df996762aebf2a9cd8da5ddb390f000c392473beb3201b045235d2b222488187778d73f9225cc4e1187f2abcc340f93ab43e0b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    758e6315273fb59e572c87988f39db03

    SHA1

    a76ea7dda08d31e3ee395e2df2e76a7ed8b306bd

    SHA256

    6ba840b52e5540d7d6d781c9a03dd54a17b97fc048e207da77a2f3cba0f38829

    SHA512

    05de9240060710ab7aac7da084ea427ba4180eda00c4fcbd5cb55c5bfab4486ad683ae5107842eff330d936345a668931e5d2cb76a4c9c52f712237ed4e6b3c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17d5c344039ca38e334dea8a52232b71

    SHA1

    71878f6c86fc87d5aa4c5bb9855a668719f53225

    SHA256

    0e146a4f429a294881f8c100bf84a670006f30e8f6c13d5e7fc54580edcdec2d

    SHA512

    76498c5d2d53ed75089285282364484a0fdda681b1b028d726151f6040fa6f3a8d19c8b2acfe159bb5bd9eb598c0125862107bd5928bac2de92916f65d6630ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08e787c4bb7bcddd0b5528558ab51d04

    SHA1

    e3368f94e9618d100fdb61fbe7d261b025eacdc8

    SHA256

    02ed9f32695f6a0595786a7ea3e8818d97ff0668d9e3e054f9dc2e3bff4248dc

    SHA512

    4eaf363038ce883978e0858d7d7459d37ce9e9dd17981ea6dad3daffbe8594bc184cc31f9af1ed59735bf055804ebfd17f00599e0f56a9fdc01036af1b966ed9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a929b1362b4df90cf2167759addbd0d

    SHA1

    476879e934fad9bb69b8e0f2adcf14d50da1ab44

    SHA256

    6858466e0113563f7864801d447d1333f8c715057eb04ecd4d8094e9448ad5e7

    SHA512

    2555b95f76b4e01f43cd4e8f4cf0eb437ed1bb8bda73b8bdb62fe5681d7307c96dc01268e1ef42d47a85a45c4c737c5c5f323909ecfb9d4441e03a8149e6e3a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdc4254496b5362d461753e2d3962b6e

    SHA1

    d6b4d131efd5226f68e149e4b643f230bf49fbf9

    SHA256

    8e69c33def8abb6c6da1074a4e0df36a083afed6fb04782936bbc824475d8197

    SHA512

    c51999a8864aeb2fe7156281447aee7e2f9b1b8880f519756097472fee715227404a793bc74881cd613edcda947eec9358e4e628d80a53201cb44dc3ce933821

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdf5a262874e24295cd8243e57ecded1

    SHA1

    33a877428e494637d6c46b55c6917ec4f4c7d7c2

    SHA256

    41f67c2b169db4281efc4b8ff0346d20c06f9ee06d611677d84567ad7e6323ce

    SHA512

    b951cd957d3e30359634c99a577cdcb217090fc62f10b22aca55713583c724a04590d8f1905f07195f3f2623ea697f699ee48a9fe5ed0ecc27264574051a15e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c09f07461ce8edea4ddb282d33fff07

    SHA1

    7c0eafb4f6acfc90d624fb8a260a461a794e521a

    SHA256

    b513b7a1f9b2d64ba2046fd755768f79842d6a4ca44cc7aa280e4f097f569117

    SHA512

    fd985c164f7b4ca6d5ba241a95cfc41b527242d15e7d792875ff6bb4248830f22529a5263673034c0ee97a7c57cfd2ba2f6c405b7e052c5f4d88f0e70c08911f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb45e26479f439c59e2502c23b4df498

    SHA1

    1797360a26f195737675600b7209ddcb5105400b

    SHA256

    2e12e99760e1d680e6cb3d4b8501443d8caca2b9874ab8625ae31ae66f91dc72

    SHA512

    67d0fa3ba2f7e1dbe985f994ee256a6ac7d7194fd1856678742ddb760c9f707c6d6d7a32e48b9000ac94d0ea351af0a22a917acc30829efab3b2ac8fb27a92b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d573ae2418180b64cbc577c3b2cf056

    SHA1

    f7df0782486e4eed76fa777acb32799319007880

    SHA256

    06efab396e12e08765c39763626c8144380c79e421c7cafc1ef6874230669b4e

    SHA512

    9f019890d95b1bca854bbb317447983e3699ba8efb30269bcc0e175e84ab484375d7605917fe9b6af2a7aaf9f92b01606bf5c4fbd16b8ede2718456b3fdd913c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    3734caf96210c47930954aa368828e94

    SHA1

    b5e648fa9a5ca9916d9e00f69ef1c135d007dd7c

    SHA256

    9a459c779b65d27d75e6893336d91545871e9bdf67c52df8f0dd01a55f90dd52

    SHA512

    dd41f215f3cd7a01df251f0f9817e84f9b39b352ba5529c2d1aab42d73d0504a95b491336e420eb4a44e087fdaaa1ef68fb81a8b3d22222698e8fd2ef6328721

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\pzrzu69\imagestore.dat

    Filesize

    24KB

    MD5

    04da9ebc453cf6891b4534c1bdbe3245

    SHA1

    e4afef3c57533e6d5cffc4799b7f16716205b533

    SHA256

    70839460940fed6da9a22ae1c88aa514a253c763c5df249e483068ebb0f2f3ca

    SHA512

    564e5579a43e61db730f4c646219fb8063e8fff127a5597e90e94adb75e6a7a9d16991123a841d8ba646670aca88f4cf9eba0d24ee9f8ad63ba4a35aeb9f4b2d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\favicon[1].ico

    Filesize

    23KB

    MD5

    ec2c34cadd4b5f4594415127380a85e6

    SHA1

    e7e129270da0153510ef04a148d08702b980b679

    SHA256

    128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

    SHA512

    c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

  • C:\Users\Admin\AppData\Local\Temp\Cab83B3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar83B4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1956-16-0x000007FEFD490000-0x000007FEFD4FC000-memory.dmp

    Filesize

    432KB

  • memory/1956-10-0x00000000041F0000-0x00000000042A2000-memory.dmp

    Filesize

    712KB

  • memory/1956-0-0x0000000000220000-0x0000000001EA0000-memory.dmp

    Filesize

    28.5MB

  • memory/1956-4-0x000007FEFD490000-0x000007FEFD4FC000-memory.dmp

    Filesize

    432KB

  • memory/1956-6-0x0000000000220000-0x0000000001EA0000-memory.dmp

    Filesize

    28.5MB

  • memory/1956-8-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/1956-9-0x000007FEFD490000-0x000007FEFD4FC000-memory.dmp

    Filesize

    432KB

  • memory/1956-5-0x0000000000220000-0x0000000001EA0000-memory.dmp

    Filesize

    28.5MB

  • memory/1956-11-0x0000000000220000-0x0000000001EA0000-memory.dmp

    Filesize

    28.5MB

  • memory/1956-12-0x000007FEFD490000-0x000007FEFD4FC000-memory.dmp

    Filesize

    432KB

  • memory/1956-1-0x000007FEFD4A3000-0x000007FEFD4A4000-memory.dmp

    Filesize

    4KB

  • memory/1956-2-0x000007FEFD490000-0x000007FEFD4FC000-memory.dmp

    Filesize

    432KB

  • memory/1956-14-0x000007FEFD490000-0x000007FEFD4FC000-memory.dmp

    Filesize

    432KB

  • memory/1956-17-0x0000000000220000-0x0000000001EA0000-memory.dmp

    Filesize

    28.5MB