Analysis

  • max time kernel
    119s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 22:06

General

  • Target

    Frozen Spoofer/permunban.exe

  • Size

    33.1MB

  • MD5

    26a0ee034198a3163d7a4855dd246e63

  • SHA1

    71fbd2e16a4c4ddaba065f8fd1d81e9f365f38a7

  • SHA256

    28eae7cb4ab18555df3a1209513dffbfc27a8a098ad0b36754ac82eda131fd88

  • SHA512

    88d1c582dbaca74d3b28541d465c2d678c594763e6098e327cc14a86da237e59b9444e18aac31da3e4b4fc77c8124363a66b64564dc40234a93d7b1fb18a9d04

  • SSDEEP

    786432:5C1LbwgI7+I+w32BcdcfgEbZzIdUieRWacVqGiiihca:AYgI7GY2eGjbZzIheR/cVqGwh

Score
7/10

Malware Config

Signatures

  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Frozen Spoofer\permunban.exe
    "C:\Users\Admin\AppData\Local\Temp\Frozen Spoofer\permunban.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:2264

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    33a5867916866b9d83fa78f4c8f08c5c

    SHA1

    e7980970567c4d278acbb647fca0b637ab650acb

    SHA256

    e875f84172206c2e1462885bce1d4d5a8007faec4b7a102f68529901f23fde9f

    SHA512

    13cba4e96c7adb97c2a6cc3a6fab45f76936bea1f0fd869564ad3af2784c178ae4c185239a6b662b08a6d741dfeff71e2116530778b43aa983401355e46e11c3

  • C:\Users\Admin\AppData\Local\Temp\CabADBF.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAE4E.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2264-0-0x0000000074E0E000-0x0000000074E0F000-memory.dmp
    Filesize

    4KB

  • memory/2264-1-0x0000000000360000-0x0000000002472000-memory.dmp
    Filesize

    33.1MB

  • memory/2264-2-0x0000000074E00000-0x00000000754EE000-memory.dmp
    Filesize

    6.9MB

  • memory/2264-3-0x0000000006380000-0x00000000063D8000-memory.dmp
    Filesize

    352KB

  • memory/2264-4-0x0000000007420000-0x00000000077F6000-memory.dmp
    Filesize

    3.8MB

  • memory/2264-5-0x000000001A190000-0x000000001C278000-memory.dmp
    Filesize

    32.9MB

  • memory/2264-67-0x0000000074E0E000-0x0000000074E0F000-memory.dmp
    Filesize

    4KB

  • memory/2264-68-0x0000000074E00000-0x00000000754EE000-memory.dmp
    Filesize

    6.9MB