Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
SpoofX.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SpoofX.exe
Resource
win10v2004-20241007-en
General
-
Target
SpoofX.exe
-
Size
2.9MB
-
MD5
bafe98fde65f7b51b1f2a1dbc62a6c88
-
SHA1
1bf16c146dedf6bb2e6a272abb8c9883525a9649
-
SHA256
b2e8dbdaf60dbf348e715a5643a767cbd5eeabd0699988eedc78eb80595d0f5d
-
SHA512
9219fef6ec1438964d5aa7c1813f852ce581491025d7e9448095ca4416de951f4fc68361c2bc5460154407f4aca4a4270ed5b72b3d3c5c98df1815405de97765
-
SSDEEP
49152:ttGrOk4cHGD8Y9f3/QKYQ+C4ykOdSmssUnlKn2jybt:UOxc6GNM1M+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 2852 spoofx.exe 2124 icsys.icn.exe 2904 explorer.exe 2788 spoolsv.exe 2876 svchost.exe 3008 spoolsv.exe -
Loads dropped DLL 6 IoCs
pid Process 2748 SpoofX.exe 2748 SpoofX.exe 2124 icsys.icn.exe 2904 explorer.exe 2788 spoolsv.exe 2876 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe SpoofX.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpoofX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2692 schtasks.exe 2064 schtasks.exe 1800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2748 SpoofX.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2904 explorer.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe 2876 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2904 explorer.exe 2876 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2748 SpoofX.exe 2748 SpoofX.exe 2124 icsys.icn.exe 2124 icsys.icn.exe 2904 explorer.exe 2904 explorer.exe 2788 spoolsv.exe 2788 spoolsv.exe 2876 svchost.exe 2876 svchost.exe 3008 spoolsv.exe 3008 spoolsv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2852 2748 SpoofX.exe 30 PID 2748 wrote to memory of 2852 2748 SpoofX.exe 30 PID 2748 wrote to memory of 2852 2748 SpoofX.exe 30 PID 2748 wrote to memory of 2852 2748 SpoofX.exe 30 PID 2748 wrote to memory of 2124 2748 SpoofX.exe 31 PID 2748 wrote to memory of 2124 2748 SpoofX.exe 31 PID 2748 wrote to memory of 2124 2748 SpoofX.exe 31 PID 2748 wrote to memory of 2124 2748 SpoofX.exe 31 PID 2124 wrote to memory of 2904 2124 icsys.icn.exe 32 PID 2124 wrote to memory of 2904 2124 icsys.icn.exe 32 PID 2124 wrote to memory of 2904 2124 icsys.icn.exe 32 PID 2124 wrote to memory of 2904 2124 icsys.icn.exe 32 PID 2904 wrote to memory of 2788 2904 explorer.exe 33 PID 2904 wrote to memory of 2788 2904 explorer.exe 33 PID 2904 wrote to memory of 2788 2904 explorer.exe 33 PID 2904 wrote to memory of 2788 2904 explorer.exe 33 PID 2788 wrote to memory of 2876 2788 spoolsv.exe 34 PID 2788 wrote to memory of 2876 2788 spoolsv.exe 34 PID 2788 wrote to memory of 2876 2788 spoolsv.exe 34 PID 2788 wrote to memory of 2876 2788 spoolsv.exe 34 PID 2876 wrote to memory of 3008 2876 svchost.exe 35 PID 2876 wrote to memory of 3008 2876 svchost.exe 35 PID 2876 wrote to memory of 3008 2876 svchost.exe 35 PID 2876 wrote to memory of 3008 2876 svchost.exe 35 PID 2904 wrote to memory of 2244 2904 explorer.exe 36 PID 2904 wrote to memory of 2244 2904 explorer.exe 36 PID 2904 wrote to memory of 2244 2904 explorer.exe 36 PID 2904 wrote to memory of 2244 2904 explorer.exe 36 PID 2876 wrote to memory of 2692 2876 svchost.exe 37 PID 2876 wrote to memory of 2692 2876 svchost.exe 37 PID 2876 wrote to memory of 2692 2876 svchost.exe 37 PID 2876 wrote to memory of 2692 2876 svchost.exe 37 PID 2876 wrote to memory of 2064 2876 svchost.exe 40 PID 2876 wrote to memory of 2064 2876 svchost.exe 40 PID 2876 wrote to memory of 2064 2876 svchost.exe 40 PID 2876 wrote to memory of 2064 2876 svchost.exe 40 PID 2876 wrote to memory of 1800 2876 svchost.exe 43 PID 2876 wrote to memory of 1800 2876 svchost.exe 43 PID 2876 wrote to memory of 1800 2876 svchost.exe 43 PID 2876 wrote to memory of 1800 2876 svchost.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpoofX.exe"C:\Users\Admin\AppData\Local\Temp\SpoofX.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\users\admin\appdata\local\temp\spoofx.exec:\users\admin\appdata\local\temp\spoofx.exe2⤵
- Executes dropped EXE
PID:2852
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 14:43 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 14:44 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2064
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 14:45 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1800
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2244
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD5e6acb564763adbc0c7af1e7c1de314a3
SHA177c5fde92d723c2b0c47b27a6559ee461a9079aa
SHA256be477d54367117c635c42cd3d360996a15fc3c1ad264238c25b179d9070396d2
SHA512764703f25556bf50ac19bc648d3246f90fc6055ef1340517144758b5028a4a135855035dfe91a30fdbb7ab9aabf0eb5f4fe65cff12348a6c887b36b3bf67c1cb
-
Filesize
135KB
MD59d784d1b70d22a7fad8328ea7a417c0a
SHA142ed0f6ee5cccb4df948f0ed07973fa8bd876da6
SHA256aa0a36ede6c2e2e5c49a3843aebc88b3aa3e8f2e4a1415dcd96cc566e0a936dd
SHA512d9db7bf42efb8485726ab8036322c6a095a0a8147aa7f2ff2994706df9ab3c999531b5cb2826a57a810e9c674800f36c7c41d6bbce3d59d8d586f5f199c0c250
-
Filesize
135KB
MD5bb5c74fe047e063455fd82211aeb86f5
SHA1e62545fa23913c20c8f365ef8654189ee03d2b79
SHA25613e727a78869653195db6645679146cdb19614d35b8bda5b8cea961d6b9ebed7
SHA512521cd6a4f42bf3ddab85c131e7952d4c36f8e610c811b4f0f7fb7da7894324cc4bfba6dcca7a471f05d2c768e4561e5d303c2bae991d424e51057540419841e2
-
Filesize
135KB
MD5d4bd692e9ec589210189592be6562b0a
SHA113381aba597e20fcdaf453394836ae160a48a1ca
SHA2567afb6ea8dd7d28755768acb44e453739219cbf7cd1ed69626b28ab213041d52c
SHA512b181bc5417810eccd6d98bf47fda25d50348e4219e19051886090121cdefd1d6e93be8e91fe70c694f67d3fa0b25630d534b418ed43ef7d99ce910c18fdfc543
-
Filesize
135KB
MD5807b2ee0977bd1db66001c9077d96687
SHA163cef6f00637250f8a796e4f858610b98a4a9f59
SHA256ebd37b095536a5ddcc7ad5fc919a92fa54896594e4cbd5f51c25cce43f7ff19c
SHA51227b9c231bd7b114a7ee941349cc4530789502d4a596412b05fc8378982d880a6ace6cd74695f4303cea563c3406c562f70697dddb11efdfdb71096c90b7d2e7f