Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
7freeSpoofe...er.exe
windows7-x64
10freeSpoofe...er.exe
windows10-2004-x64
10freeSpoofe...64.exe
windows7-x64
1freeSpoofe...64.exe
windows10-2004-x64
1freeSpoofe...64.exe
windows7-x64
1freeSpoofe...64.exe
windows10-2004-x64
1freeSpoofe...64.sys
windows10-2004-x64
1freeSpoofe...64.exe
windows7-x64
1freeSpoofe...64.exe
windows10-2004-x64
1freeSpoofe...64.sys
windows10-2004-x64
1freeSpoofe..._2.exe
windows7-x64
9freeSpoofe..._2.exe
windows10-2004-x64
9freeSpoofe...64.sys
windows10-2004-x64
1freeSpoofe...er.exe
windows7-x64
7freeSpoofe...er.exe
windows10-2004-x64
7freeSpoofe...AC.exe
windows7-x64
3freeSpoofe...AC.exe
windows10-2004-x64
3freeSpoofe...p.html
windows7-x64
3freeSpoofe...p.html
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/01/2025, 16:02
Behavioral task
behavioral1
Sample
freeSpoofer/freeSpoofer.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
freeSpoofer/freeSpoofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
freeSpoofer/tools/AFUWINx64.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
freeSpoofer/tools/AFUWINx64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
freeSpoofer/tools/AMIDEWINx64.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
freeSpoofer/tools/AMIDEWINx64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
freeSpoofer/tools/LeCrud64.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
freeSpoofer/tools/Volumeid64.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
freeSpoofer/tools/Volumeid64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
freeSpoofer/tools/amigendrv64.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
freeSpoofer/tools/applecleaner_2.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
freeSpoofer/tools/applecleaner_2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
freeSpoofer/tools/lvafudrv64.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
freeSpoofer/tools/tmac/Installer.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
freeSpoofer/tools/tmac/Installer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
freeSpoofer/tools/tmac/TMAC.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
freeSpoofer/tools/tmac/TMAC.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
freeSpoofer/tools/tmac/help.html
Resource
win7-20241010-en
Behavioral task
behavioral19
Sample
freeSpoofer/tools/tmac/help.html
Resource
win10v2004-20241007-en
General
-
Target
freeSpoofer/tools/tmac/Installer.exe
-
Size
189KB
-
MD5
34636047a124a3bdb21ff9c2b9402250
-
SHA1
49ecf948cfd6e85f38007b4267792d75031da015
-
SHA256
0d3390d29cde2d1f4b147d70fc7008abe2107c5cfdc0d1bfa746a180b70e03fe
-
SHA512
607d9a123c9b0a3fb74503e78255ac2033177f36903272660f9f650639496662d16177f47e61204e699172ba4233cda23442be538e6a07a2e39632eb709c0e9d
-
SSDEEP
3072:68dMhw/SymvBpLYDhU6Fh/S1PcU8MsGlUbLB:6I/tmvBpLYDhU6q1PcUnsGubl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1992 Installer.exe -
Loads dropped DLL 4 IoCs
pid Process 1768 Installer.exe 1992 Installer.exe 1992 Installer.exe 1992 Installer.exe -
Drops file in Program Files directory 13 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\oui.db Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\normal_footer_back_h30.jpg Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\logo.gif Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\EULA.txt Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\Installer.exe Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\TMAC.exe Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\Read Me.txt Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\index.css Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\help.html Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\Default.tpf Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\CLIHelp.txt Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\normal_logo_back.jpg Installer.exe File opened for modification C:\Program Files (x86)\Technitium\TMACv6.0\normal_back_blue_w800.jpg Installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1768 Installer.exe 1992 Installer.exe 1992 Installer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1992 1768 Installer.exe 30 PID 1768 wrote to memory of 1992 1768 Installer.exe 30 PID 1768 wrote to memory of 1992 1768 Installer.exe 30 PID 1768 wrote to memory of 1992 1768 Installer.exe 30 PID 1768 wrote to memory of 1992 1768 Installer.exe 30 PID 1768 wrote to memory of 1992 1768 Installer.exe 30 PID 1768 wrote to memory of 1992 1768 Installer.exe 30 PID 1992 wrote to memory of 2728 1992 Installer.exe 32 PID 1992 wrote to memory of 2728 1992 Installer.exe 32 PID 1992 wrote to memory of 2728 1992 Installer.exe 32 PID 1992 wrote to memory of 2728 1992 Installer.exe 32 PID 1992 wrote to memory of 2728 1992 Installer.exe 32 PID 1992 wrote to memory of 2728 1992 Installer.exe 32 PID 1992 wrote to memory of 2728 1992 Installer.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\freeSpoofer\tools\tmac\Installer.exe"C:\Users\Admin\AppData\Local\Temp\freeSpoofer\tools\tmac\Installer.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\1107904314.99481\Installer.exe"C:\Users\Admin\AppData\Local\Temp\1107904314.99481\Installer.exe" /u2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7092553973.19794.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380B
MD591332154e8731417ded1f4c6601da595
SHA1dd003b1f6156e389e07419d98ab05a97ec3ed37c
SHA256e1486b075f6697f294fe1b156f87477b53398fe4d4750a135ed17b914ac55eec
SHA51247cb28f9f5e750df6d82d0dc58642af489c7d3fdaaa4f2b61291c210036459ca93d0040d82ae32a7b20ad1e0c39aa5fc47653e0b1931af6edf95084471d7de73
-
Filesize
189KB
MD534636047a124a3bdb21ff9c2b9402250
SHA149ecf948cfd6e85f38007b4267792d75031da015
SHA2560d3390d29cde2d1f4b147d70fc7008abe2107c5cfdc0d1bfa746a180b70e03fe
SHA512607d9a123c9b0a3fb74503e78255ac2033177f36903272660f9f650639496662d16177f47e61204e699172ba4233cda23442be538e6a07a2e39632eb709c0e9d