Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 09:18
Behavioral task
behavioral1
Sample
RippleSpoofer.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
RippleSpoofer.exe
Resource
win10v2004-20241007-en
General
-
Target
RippleSpoofer.exe
-
Size
15.6MB
-
MD5
76ed914a265f60ff93751afe02cf35a4
-
SHA1
4f8ea583e5999faaec38be4c66ff4849fcf715c6
-
SHA256
51bd245f8cb24c624674cd2bebcad4152d83273dab4d1ee7d982e74a0548890b
-
SHA512
83135f8b040b68cafb896c4624bd66be1ae98857907b9817701d46952d4be9aaf7ad1ab3754995363bb5192fa2c669c26f526cafc6c487b061c2edcceebde6ac
-
SSDEEP
393216:QAiUmWQEnjaa4cqmAa4ICSSF1a0HPRV8gtFlSiZh5ZlZ:bhnGhMAXSmHXFA+
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ RippleSpoofer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RippleSpoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RippleSpoofer.exe -
resource yara_rule behavioral1/memory/2084-5-0x0000000000880000-0x0000000002500000-memory.dmp themida behavioral1/memory/2084-6-0x0000000000880000-0x0000000002500000-memory.dmp themida behavioral1/memory/2084-16-0x0000000000880000-0x0000000002500000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RippleSpoofer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 16 discord.com 17 discord.com 18 discord.com 15 discord.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2084 RippleSpoofer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000000a7826690f2a51fbb7cdd3b5bc1bf6bc87d5b2c1242c5798afe631d51bce7fdc000000000e8000000002000020000000db3718738915f9f9871cf2acaea361a585a04ea5efde3aba8364e09ffd97db06200000009a1370fd16eb5456e3d78e67eb4f94b389e5fb95ce481ae2446e12b716454567400000000c9bba5d889f5a00c61e2fa965ef7b016227ef0e7a9a908a4edce8ccf3d7a0d884ea4c004e8140fd7bf5d7fe162f0a1bd7c444f8818101ffd94f8ec35dd3eae9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DOMStorage\discord.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502fdb52094edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DOMStorage\discord.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B489C21-B9FC-11EF-B387-F234DE72CD42} = "0" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2084 RippleSpoofer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2820 2084 RippleSpoofer.exe 31 PID 2084 wrote to memory of 2820 2084 RippleSpoofer.exe 31 PID 2084 wrote to memory of 2820 2084 RippleSpoofer.exe 31 PID 2820 wrote to memory of 3012 2820 iexplore.exe 32 PID 2820 wrote to memory of 3012 2820 iexplore.exe 32 PID 2820 wrote to memory of 3012 2820 iexplore.exe 32 PID 2820 wrote to memory of 3012 2820 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\RippleSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\RippleSpoofer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/Qt5NMSgdzU2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b3fc5a4b175fbdeedb4eb55ee74ef2
SHA1b0bacf69a1687879d6d92c0bdf0700dd1c4a64ba
SHA2563250cce822b754d47791abad79de0133ac0512a865fdef5bd02f232240dc13b8
SHA51232e7cfbc9ba90b0b313a7508c61909b4073217f975828d32397418fab42dfd0dddcbda24122983224fc4968031aa127bb8b1228c5ec6d2a88985b8394379eda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c6d8207bcadb029d9653f076b7c036
SHA1bb379eda1a7bc9d3334ccc526546fb44b61c1668
SHA2563060f72ba7cda390f45a982d1b09b5c81aa6fa280e8ac58737fa56852d48faac
SHA51289a377ee1075309d6dbd9c3c75364dcca32d6621ea6f53a2b9fad6411a4065879980519043cacee32190faf852db77de431a89646940a929a2f33624ada74fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51511046c7f5cc2e641928bc1b8a525ac
SHA16c542aa65e9d2ffa80610ff25ff175e349a9f72a
SHA256e386179fe0742c3f069a4855ad948e542c9d9dcb05c67fc221dfa82b7d4aa68c
SHA5120c232bef6561ba44ba263d948af7f69752363b50c62180193b3b3eabceb3973d3f72dbf74f06f3a6d1c2ff1c53bebe937c5f0a9a9605abdb05f1b366bead9b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4795e8b40f38b5df45db4e70248538d
SHA10d9c8cffaffacffadaa507977f4d659c00d082e3
SHA256ec8118b18378823fed31e6c08fb846eb20d2d5b7252bc75d7f20d22a34c3f57e
SHA51259cf3aa50dd73aa551d4814b403082b1584457e8a0e5a182c3d812d3f16b03780118b3ea784c4d7425ea905edde904ba8407b087b12058246d8418190be359dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53930e7688ca811eb7c881eb08ec6c0aa
SHA1c99438b5bc961e57b8a9dc0333da0072131f4baa
SHA25623f4324ec6efd28ad317dea68aa58eaa924c8e97d2bd1dd0c91a458f41d6c16c
SHA512996e56c76836cb83ba701fb2bf414f2649d60d68bbe185fd5c27aead82ee32d9bd9a1707836a88dbae7fe74089fbb838e7bfd1fa38b930db0540cffd3209778a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31d1aab1af7c85f638fee74b0011389
SHA16e2947b7f2e82c83a3366ac96bc7cd9d911dafe0
SHA25673810663f0263a450f425e52399dc36b3925c37c618f88a3912327ded7b302ae
SHA5129b80b83aa572c717301d2e8ceaac35bcec26a9e6a1f95bfdf1a0290724fd72a12261d6c59122cfedd60fff907c68e128def5315c9e1fd9eba0f4c24fa4ffa422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a599bc4726b452ba2f4df2bc31d6007e
SHA1e50fc8d75d22085fb55406f51df77011f3f9d85b
SHA25607cd5d3087695e552395231125d4f1ae5648ff1549bc82ce6fd8012d4098c257
SHA512f494ce1a8e8c2cb2b66d9d113eb729577bccfc70e764d5af6ed1fd129bda7063004106c4d9b07e56dd6f23d0bef3cc88ffa7d4531bbb30e831e59a306076cb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ad9ff178c82bf5b54fe5c438543385
SHA1db8b9c426d437d716db7519b966e8078c1bb8a8d
SHA2564d7a01b21236b87d19ccbeea3f6a8dd253a34a29916d15b5b328d90daa73670a
SHA512608390d97e1b36b032c74dafaaa3f5a5b0c8c1c7df906565174c4b009f987ed48e2da2e378efe5d70c612f0e253617118cfa972d51959f40bbb692df6e430db5
-
Filesize
24KB
MD5592588a123b30a8e3799610bcd8a01c4
SHA19b776c0468302629c71086ebda7f78ad3cd55aa6
SHA2566d79b0d3b38efcab43404aae6c2c4d87462450a427e7c8af408e753ecec40205
SHA5126d06e59890bf9c507080963cba0dc993e5146c1c986b97c2d431ce89c607f950d387813f2e4427e9740f33f494126105610ea81fe1bd0be770174ba719504073
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\favicon[1].ico
Filesize23KB
MD5ec2c34cadd4b5f4594415127380a85e6
SHA1e7e129270da0153510ef04a148d08702b980b679
SHA256128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7
SHA512c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b