Resubmissions

12/01/2025, 14:29

250112-rt355symal 9

12/01/2025, 08:56

250112-kv337svqgw 10

Analysis

  • max time kernel
    836s
  • max time network
    836s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2025, 14:29

General

  • Target

    RippleSpoofer.exe

  • Size

    15.6MB

  • MD5

    76ed914a265f60ff93751afe02cf35a4

  • SHA1

    4f8ea583e5999faaec38be4c66ff4849fcf715c6

  • SHA256

    51bd245f8cb24c624674cd2bebcad4152d83273dab4d1ee7d982e74a0548890b

  • SHA512

    83135f8b040b68cafb896c4624bd66be1ae98857907b9817701d46952d4be9aaf7ad1ab3754995363bb5192fa2c669c26f526cafc6c487b061c2edcceebde6ac

  • SSDEEP

    393216:QAiUmWQEnjaa4cqmAa4ICSSF1a0HPRV8gtFlSiZh5ZlZ:bhnGhMAXSmHXFA+

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RippleSpoofer.exe
    C:\Users\Admin\AppData\Local\Temp\RippleSpoofer.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://discord.gg/Qt5NMSgdzU
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    b8eda4b7509604347a842c6c6e753ea5

    SHA1

    bf6aad93153180fd31faa1fd2a21c8a1620d321b

    SHA256

    932b324cf394aab8039c07532414c85a59c0267c006b06ebfbf0174a8e5dbe81

    SHA512

    67a9c228a0df1ed7390342876238f006c1066cf63d01ca4f440901e5fa8ef802e387856c7388116b20bfb855646f15dcbe82e3bd8629ce7e07dadc9f7a828307

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0423877575e3ccacd650181302670a58

    SHA1

    3b645b81b6be23c466fa5fb2438d0ad46e9813ae

    SHA256

    52e98e2f7ee161bbac8d4eeffd28a260cb8f69cf1a478e6ae7102644f2b87031

    SHA512

    fc966b4aa114dbeb84d9ca87aa3da31f3b79ec5cc941ebf6a677f56d3b5115556666df28bf801a5c36cdaed419679b4837f7e8af3f4864f66088bd43006b0f8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5e73e2ff25b2af4a7371254332a9d9b

    SHA1

    e755e3143c3bea13a3fe8c614c8b263106545d1c

    SHA256

    cf73d19577e2372a9657e1fb5f947a312d7137bd16303a19ae2cc1b749d90275

    SHA512

    6c69c980aa30241985f5fe6c70a84616a3d519cdc12fa524de81687019dc9b18b819b27a4aa7948d23cbc92ce54e2daa99ad4cd40109126d3cbcb2efdf456c60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8696cb5fb4467321471249910cbbff72

    SHA1

    5020a45776fa58cd7786f14a41abfe3dba8e8dcf

    SHA256

    ef490a3122eda0e0298de55065279d7ed369b3fc507860e86207cf3e949eb29e

    SHA512

    4d042ca2f5d977aedc0f3e2bada041e6bf3b41f9176367c498ad1e17898836d4ace713863ac7904308517194106fd166265bf475f6fa0fbc0673e4f9a9a53430

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fddd98edb00d12491ddbda2d77211194

    SHA1

    cae28c2d85efa0a503024b4d28e00c3381d2d4fe

    SHA256

    5aba5dee1bba0175daad50f3044ef6a1e89c2fdf170d6d6119e384e10a5cecf7

    SHA512

    473c4efa163f133230babf5b01a612205867b4426eba2dd10e1e06d822c3876aea0cc1a80e963f4178364fd25e089e61e723ee46676d5370dbf8935c6cac4062

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e441eb2961f4ca670ae65b5ee172dff8

    SHA1

    1e3c6036f120858ce5c263dcf4aefd6707d879a4

    SHA256

    4602d65eed88367a3ffc0f8847f7b418b4839a17ea54a7ef5db70577fd5d4f33

    SHA512

    f9fa0502611e6b48c2b0669577597ef09ea9499def1d0035e4d35d85b932816404c5e2d4ae71086b18b0ae25bbd88fe54ca954dbcfc93ffcb42f4a0be19a395f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c47c3849dd915d6943d1db88b2b6f18

    SHA1

    3cf99f6a9fcdc4b4a400461224ede4fac1e6fb9d

    SHA256

    faf645c7c2dc6898050d1397e1fe3a050684d669595c4876d70253f6758262c5

    SHA512

    642909d0b9fad9f921338866dd2a1bfecff2d168ecd1a4a04974769618028fcc823cbfccc4273c95ecad54c8e0d6104af06fa954e9f7a6ff007e856acbacf87c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d882433e545f298c618f7fe2e21bc929

    SHA1

    fed35a45ff91baaefa7e4f173085de602c5fd914

    SHA256

    316edfeaafc7b97fde29170e75300f8d92d283d828f8bedcc6f1b20fac4fbe90

    SHA512

    1b5c96285545cdede009473d5c5365e2070a1aae624a3084ecfd1cd42eda7aaa80d63a98b6bf0e6b969733d3b677934363483ebb0e149b42453ac26a903bbd91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b44b9f2f2ad71edc71854f197e3a2eb8

    SHA1

    5e444c119ef9a3cd850a546075518866bd0637f7

    SHA256

    529594bbfe88a51dd00498818106b6d19bf84a9309f83448f5c7315bef7c049c

    SHA512

    4fbb16e6e09df0aef4251b2912349a009c8044a971671f290d8dec74b516c290f9e6ef3e5d81a6e4acad8d577d9817876264f0f01ea8c6c24757337d585a81d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b28f6131398a7270a841c20648e902b

    SHA1

    17f1ceaae685b564b5cb3c034b8650a556e1e22e

    SHA256

    abd2bca424fcb0bdf3e70de22583db1ac5cbdc2bd4a8f5a2fa554e377a4f0ddf

    SHA512

    fe94319ccd024152634980dcc71b00d2cf1aed8b271af0f35e9f893aa22f22601b4b39dda8b0a0165319f11d8d868179f49b8a097eb114b366ed80a077723c19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80c412f9949dedaace9b8a6f34c9a832

    SHA1

    97d695978b913b7d49fab042187404d620156257

    SHA256

    20c497d282743a2eafeed260b945714a590bc8df7d4a183ad37826b85d3c5468

    SHA512

    e51570930eada09e48a5e45ea527a3d502a71887d54e378bfde74998e0b3810dfec0549b13020abb27e57845375a19408ea20a0ee722f64381a1dcfa76683bd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d67e8665e967ea19981b6ce16e2c6632

    SHA1

    d3a475c49358a14a184c3a8cbcdd81932ec65cd4

    SHA256

    682cef6b31910145ba384167471e87e36e65482bbb47c42db0f312537d1dd8b8

    SHA512

    8961a6eaaceadaf1d8ae896597ff372d390a1eef42ba5927b21ba5fb050d7c1516e34ffee9ff1f8db7dd8147ef0a743712df5bd0d49bf87431e472044cc8b2ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    062910f59d4d8d573bb16011653fee13

    SHA1

    2dac2466aabdfa0200a9e4e843cb9b0b4e3f6929

    SHA256

    2a9b53cbdce66a9e4d46f47d1268e57357734457a0936b53527a5a3e368942b4

    SHA512

    4649e5b417cd9bad435d9e611229ebbc02b2df7700438784347bed959b31068bf4d71077c952aaf56e6ecf2796850b0e1aeade23cd70a48e53eff26e91ada2ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1a5d5e9c1d9ab0c329f7bb532c228a1

    SHA1

    7b66071e639c3807eb57c4501be0623d3f09fcb1

    SHA256

    f75aeb73e2812a5fb751c7154a9888bcf95d5801a3154438465634afa5a3bca5

    SHA512

    8a2242c28322234b8ea82f28a22a3cdac91773fd608a99ac0ae0c9eb3949dc7ce16e5a67341150fd8129285a3689c7edcb27d10ca9e58a0fb7875acce53244b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccbf1d6da5f8e7e6f26315b9658241fe

    SHA1

    17700d14258e90f6021c5bce7eb69e65cf48a18e

    SHA256

    1bba783917f6fa39a821c5686d8f647bf9b13ebe914dae8d428a6be929ebb053

    SHA512

    9f6e1173cee8fba7be152d9541350e8e62ae8dec07b88ddd3c10e6418c3dbcd6a47c14e659c1e83b340d89244c88f359135395726d4fc0038b1e24be6ec00f68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c866c5aee4c523ed5055d36634a17bf

    SHA1

    d3ae75e1e211cfc7980705053c25623d8d8f8e24

    SHA256

    ed971fa491d8a10940c630f98f346459808e4a23dff83165017bdc503eedef91

    SHA512

    6a3c69d747c4f96cd6a158f41d5d07c89e74dfed402f1c39a870df4ccfc30b01eb5dffe06bed8b11f9ec516d95a374a3fb0905179fcf0df0b3c62d25eebd0e59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22e896c905b293f4008e3a7d9e904c24

    SHA1

    bfeecd61c678b633d2fff0ea4b249ba5bf668f0c

    SHA256

    6d776f0a18cc9bab62994db7e7282ab520371660bc9feac60834f8e10b077d9e

    SHA512

    9b5f1bd13eb82cbff025ee56f85f7e9102a1bf927937e7b92c9eef0570b895e79565d23b97f16ec8dc4051ef5a9a7e6183a2b58664feea85e853f370a33cb34c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c833cf500b1cac44b3e08900105b1bb

    SHA1

    d8b2761812d4f37771ed0b740736f4f95c4c182d

    SHA256

    271fe9da4e2131e71bb439cec798efe6630338eea1002b293996e8dcca88bba3

    SHA512

    ea609f3de0facef7cab1de9963d89eac8f556708767b701c03082ab9aea23d393f94163d080ba005b4386ce1bf3e90de3dcd4a3694cadf804c57b5501da38013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ca0d8e8c67100fee4d5f819db85a5b6

    SHA1

    4e93d6be0b62b500dd51a948ca91fa32b2e9dcc2

    SHA256

    7959ffb521744c372719b0e2578023d2d96a904a04c436699e830586a8c421b6

    SHA512

    4054f2e4b26349b3a3ef939d5ab2e2d15c4be7bf3b1699711639124da48105c80d5b67b1d7e7b5468d16ec466c39c9595997072332e0da06fbd75fccda48b967

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfe8efcdf45cea67a55c4d12c9a57283

    SHA1

    53203f666caf0de17e1fa18f4d84c5af35a5fa6a

    SHA256

    582cfbce1a2af49e994ac87cb7da2e2852b365f7d27652a01b4ad02506171c15

    SHA512

    0147ab3ce29f66600e53409c5e427fb6dd8b480a55eb8bbc41d8e0ce9a6537851c2dd022db8265ee4230c55df7ca2b4c9d5392f220c66ea02dca08017a7a3afa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    056369cd16d71d29f2088dca70cf5e7c

    SHA1

    eb2ac94e4811271108ef3f6106a6d43f2c75f980

    SHA256

    d8c21259b5e7cbd80f30e39e355be1382917b8f8a17d592f2a408cc36f217890

    SHA512

    412e281d0d8de466c44d9a3db2a5de1945b930f073d75a4aad8d1145e6b50962296835f3a411da86878cb5d556a2d9e88a18212b425a82d334bbe1b3f2303878

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\njqq61f\imagestore.dat

    Filesize

    24KB

    MD5

    4e03579e6f594237b657550b0ddd710a

    SHA1

    644cb6f207d19062e1f4a31031c8243c82703f24

    SHA256

    4c39eddf19384e026ffad17413ecafd2340c6532eaf3b7a3df63e19c45d0073b

    SHA512

    ebf17290f770c2a61ca79d059c777110f94865fde33daf024905592d8524b78e7e4afb98bad453d7c2ea2bb662df5e045b27adfd84bfc99ff1f41f671a11d0b0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\favicon[1].ico

    Filesize

    23KB

    MD5

    ec2c34cadd4b5f4594415127380a85e6

    SHA1

    e7e129270da0153510ef04a148d08702b980b679

    SHA256

    128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

    SHA512

    c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

  • C:\Users\Admin\AppData\Local\Temp\Cab2DF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2E2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2340-11-0x0000000000E00000-0x0000000002A80000-memory.dmp

    Filesize

    28.5MB

  • memory/2340-15-0x000007FEFD9E0000-0x000007FEFDA4C000-memory.dmp

    Filesize

    432KB

  • memory/2340-12-0x000007FEFD9E0000-0x000007FEFDA4C000-memory.dmp

    Filesize

    432KB

  • memory/2340-0-0x0000000000E00000-0x0000000002A80000-memory.dmp

    Filesize

    28.5MB

  • memory/2340-16-0x0000000000E00000-0x0000000002A80000-memory.dmp

    Filesize

    28.5MB

  • memory/2340-10-0x000000001DA90000-0x000000001DB42000-memory.dmp

    Filesize

    712KB

  • memory/2340-9-0x000007FEFD9E0000-0x000007FEFDA4C000-memory.dmp

    Filesize

    432KB

  • memory/2340-8-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/2340-6-0x0000000000E00000-0x0000000002A80000-memory.dmp

    Filesize

    28.5MB

  • memory/2340-5-0x0000000000E00000-0x0000000002A80000-memory.dmp

    Filesize

    28.5MB

  • memory/2340-4-0x000007FEFD9E0000-0x000007FEFDA4C000-memory.dmp

    Filesize

    432KB

  • memory/2340-2-0x000007FEFD9E0000-0x000007FEFDA4C000-memory.dmp

    Filesize

    432KB

  • memory/2340-1-0x000007FEFD9F3000-0x000007FEFD9F4000-memory.dmp

    Filesize

    4KB