Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
SpoofX.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SpoofX.exe
Resource
win10v2004-20241007-en
General
-
Target
SpoofX.exe
-
Size
2.9MB
-
MD5
bafe98fde65f7b51b1f2a1dbc62a6c88
-
SHA1
1bf16c146dedf6bb2e6a272abb8c9883525a9649
-
SHA256
b2e8dbdaf60dbf348e715a5643a767cbd5eeabd0699988eedc78eb80595d0f5d
-
SHA512
9219fef6ec1438964d5aa7c1813f852ce581491025d7e9448095ca4416de951f4fc68361c2bc5460154407f4aca4a4270ed5b72b3d3c5c98df1815405de97765
-
SSDEEP
49152:ttGrOk4cHGD8Y9f3/QKYQ+C4ykOdSmssUnlKn2jybt:UOxc6GNM1M+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 720 spoofx.exe 748 icsys.icn.exe 4892 explorer.exe 3936 spoolsv.exe 1816 svchost.exe 860 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe SpoofX.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpoofX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 3264 SpoofX.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe 748 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4892 explorer.exe 1816 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3264 SpoofX.exe 3264 SpoofX.exe 748 icsys.icn.exe 748 icsys.icn.exe 4892 explorer.exe 4892 explorer.exe 3936 spoolsv.exe 3936 spoolsv.exe 1816 svchost.exe 1816 svchost.exe 860 spoolsv.exe 860 spoolsv.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3264 wrote to memory of 720 3264 SpoofX.exe 82 PID 3264 wrote to memory of 720 3264 SpoofX.exe 82 PID 3264 wrote to memory of 748 3264 SpoofX.exe 83 PID 3264 wrote to memory of 748 3264 SpoofX.exe 83 PID 3264 wrote to memory of 748 3264 SpoofX.exe 83 PID 748 wrote to memory of 4892 748 icsys.icn.exe 84 PID 748 wrote to memory of 4892 748 icsys.icn.exe 84 PID 748 wrote to memory of 4892 748 icsys.icn.exe 84 PID 4892 wrote to memory of 3936 4892 explorer.exe 85 PID 4892 wrote to memory of 3936 4892 explorer.exe 85 PID 4892 wrote to memory of 3936 4892 explorer.exe 85 PID 3936 wrote to memory of 1816 3936 spoolsv.exe 86 PID 3936 wrote to memory of 1816 3936 spoolsv.exe 86 PID 3936 wrote to memory of 1816 3936 spoolsv.exe 86 PID 1816 wrote to memory of 860 1816 svchost.exe 87 PID 1816 wrote to memory of 860 1816 svchost.exe 87 PID 1816 wrote to memory of 860 1816 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpoofX.exe"C:\Users\Admin\AppData\Local\Temp\SpoofX.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3264 -
\??\c:\users\admin\appdata\local\temp\spoofx.exec:\users\admin\appdata\local\temp\spoofx.exe2⤵
- Executes dropped EXE
PID:720
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:860
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD5e6acb564763adbc0c7af1e7c1de314a3
SHA177c5fde92d723c2b0c47b27a6559ee461a9079aa
SHA256be477d54367117c635c42cd3d360996a15fc3c1ad264238c25b179d9070396d2
SHA512764703f25556bf50ac19bc648d3246f90fc6055ef1340517144758b5028a4a135855035dfe91a30fdbb7ab9aabf0eb5f4fe65cff12348a6c887b36b3bf67c1cb
-
Filesize
135KB
MD5d24c709f44ad59e5040a33a8b36e87ee
SHA1b95067de4d9cd6dac16d74035c52848f2d394f23
SHA256326ee1f64276e0df2965ba0efd0d77021b642d48039c221008e3fdab3ed5245b
SHA512a0997e4788a2564207c564c02cf8ddebad70327626da3562ce763257d2486710b3daac70da6e9424c154946e1e7d5f4216f13d1b6a2b9deb23d3d2c29a205396
-
Filesize
135KB
MD5bb5c74fe047e063455fd82211aeb86f5
SHA1e62545fa23913c20c8f365ef8654189ee03d2b79
SHA25613e727a78869653195db6645679146cdb19614d35b8bda5b8cea961d6b9ebed7
SHA512521cd6a4f42bf3ddab85c131e7952d4c36f8e610c811b4f0f7fb7da7894324cc4bfba6dcca7a471f05d2c768e4561e5d303c2bae991d424e51057540419841e2
-
Filesize
135KB
MD5d02ea687cf81f205f03c81f70e132592
SHA15feabbb69b7d44360796ee36868cd7ea74dc054f
SHA256dafab65e956fb7c1a48120d0c77d9c4e9d43b064dd5598427cbb58df50036c6f
SHA512f594ee9bbb48a3af21381f51d0c52717272baef882fe3f8771183a6162c5ef16d890fc10d2895777db838aa2f09a5485e7857e89b52ca39f1e4de3a7947afd7a
-
Filesize
135KB
MD5f563c129ebfee83faa9dcdd998a670aa
SHA192beea032e020b118d61120d437eeaa388ecd835
SHA256a381a20697c67ab77b86d1ec7844b105bd5bef41d78e217f2962744d9b14501b
SHA512d3978ea7546d62ed99772e751ba96e9139fcb1fa490d41e6ee340fbb9e127caa9dc60bbd856ae39f6de2eb5acb91a894b0107617597187e552508e2136ddb926