| File name: | Spoofer.zip |
| Full analysis: | https://app.any.run/tasks/7b480003-03a7-427a-bf38-ad535ddb276e |
| Verdict: | Malicious activity |
| Analysis date: | April 23, 2025, 22:37:58 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract, compression method=store |
| MD5: | 52A813BF6C6459ABD5CFA2FC634CE239 |
| SHA1: | 010D866A2EF39839E97185C03E55C61BB302A2AF |
| SHA256: | 41C28661B1453F4470E5799AECFCBFC46FDA8D62D9642919918F13A0C49D822B |
| SSDEEP: | 98304:T14WXCzA1zukBCAFZn+6Br1YRab/Jx6evd+/lgl6zCOfrdAMcB4QaZiD1LiOEBSX:TjfgrqFv |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2023:03:19 14:08:40 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | - |
| ZipUncompressedSize: | - |
| ZipFileName: | classify_spoofer-main/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 536 | "C:\WINDOWS\sysnative\cmd" /c "C:\Users\admin\AppData\Local\Temp\E793.tmp\E794.tmp\E795.bat C:\Users\admin\AppData\Roaming\dump\mac.exe" | C:\Windows\System32\cmd.exe | — | mac.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 632 | "C:\Users\admin\Desktop\os_cleaner_two.exe" | C:\Users\admin\Desktop\os_cleaner_two.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 644 | reg delete HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist /f | C:\Windows\System32\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 720 | tool.exe /BLC "Default string" | C:\Users\admin\AppData\Roaming\dump\tool.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 216 Modules
| |||||||||||||||
| 720 | C:\WINDOWS\system32\cmd.exe /c RMDIR /S /Q C:\Users\%username%\AppData\Local\VALORANT | C:\Windows\System32\cmd.exe | — | valorant_cleaner.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 736 | tool.exe /SU "AUTO" | C:\Users\admin\AppData\Roaming\dump\tool.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 216 Modules
| |||||||||||||||
| 736 | Volumeid64.exe E: 0664-7001 | C:\Users\admin\AppData\Roaming\dump\Volumeid64.exe | — | cmd.exe | |||||||||||
User: admin Company: Sysinternals - www.sysinternals.com Integrity Level: HIGH Description: Set disk volume id Exit code: 1 Version: 2.1 Modules
| |||||||||||||||
| 780 | "load.exe" | C:\Users\admin\AppData\Roaming\dump\load.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 216 Modules
| |||||||||||||||
| 780 | Volumeid64.exe F: 4989-6601 | C:\Users\admin\AppData\Roaming\dump\Volumeid64.exe | — | cmd.exe | |||||||||||
User: admin Company: Sysinternals - www.sysinternals.com Integrity Level: HIGH Description: Set disk volume id Exit code: 1 Version: 2.1 Modules
| |||||||||||||||
| 856 | wmic nic where physicaladapter=true get deviceid | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1168) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (1168) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (1168) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (1168) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\Spoofer.zip | |||
| (PID) Process: | (1168) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (1168) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (1168) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (1168) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (5256) reg.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0010 |
| Operation: | write | Name: | NetworkAddress |
Value: 82B4D48519B7 | |||
| (PID) Process: | (5204) reg.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0010 |
| Operation: | write | Name: | PnPCapabilities |
Value: 24 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5332 | cpu_mac_spoofer.exe | C:\Users\admin\AppData\Roaming\dump\DevManView.chm | binary | |
MD5:FCB3C9E1524CAFB62E98A4883C72E53D | SHA256:94D08A83B3B3509FA17860BCDDD6ED038BE29F3BD99251433E235111A8F381EC | |||
| 5332 | cpu_mac_spoofer.exe | C:\Users\admin\AppData\Roaming\dump\convert.bat | text | |
MD5:9154D12F6AE25EEE3A2350A4D419E51C | SHA256:9BFCE540D339A8371E6EBBF7CD2EF8CE6DEAC8B179061D74F520269317D40409 | |||
| 5332 | cpu_mac_spoofer.exe | C:\Users\admin\AppData\Roaming\dump\amifldrv64.sys | executable | |
MD5:785045F8B25CD2E937DDC6B09DEBE01A | SHA256:37073E42FFA0322500F90CD7E3C8D02C4CDD695D31C77E81560ABEC20BFB68BA | |||
| 5332 | cpu_mac_spoofer.exe | C:\Users\admin\AppData\Roaming\dump\DevManView.exe | executable | |
MD5:33D7A84F8EF67FD005F37142232AE97E | SHA256:A1BE60039F125080560EDF1EEBEE5B6D9E2D6039F5F5AC478E6273E05EDADB4B | |||
| 5332 | cpu_mac_spoofer.exe | C:\Users\admin\AppData\Roaming\dump\DriveCleanup.exe | executable | |
MD5:6F6D0FD357DDD2661F0035F3440C0EC4 | SHA256:7DF319E036EB145DC9ADF9AD0AFC03EB4D18D72851CBCCA8A00C574BCA86FC78 | |||
| 5332 | cpu_mac_spoofer.exe | C:\Users\admin\AppData\Roaming\dump\fix.bat | text | |
MD5:5703EBCD2FD73ECDC737D34A9B3E9E6B | SHA256:07A94D172B1CF6BE8646B4476491CED60996CDCAA0511B966690DF56E2901EFD | |||
| 5332 | cpu_mac_spoofer.exe | C:\Users\admin\AppData\Roaming\dump\DevManView.cfg | text | |
MD5:F71E8C379C76568CE0472A9F94F399E5 | SHA256:43788AA272943CA270314FD0EC0D2BF9F30179093001FE2D846162C51F8A3DB7 | |||
| 2236 | Volumeid64.exe | \Device\HarddiskVolume2 | — | |
MD5:— | SHA256:— | |||
| 5332 | cpu_mac_spoofer.exe | C:\Users\admin\AppData\Local\Temp\D747.tmp\D748.tmp\D749.bat | text | |
MD5:05A549C77B6F9502328216ADC3A07D17 | SHA256:2390A95953E364F99CEC3C7FE535FCAA9BBD9A8F4A946DB4FC08FD23340EA55D | |||
| 5332 | cpu_mac_spoofer.exe | C:\Users\admin\AppData\Local\Temp\D747.tmp\D748.tmp\extd.exe | executable | |
MD5:C14CE13AB09B4829F67A879D735A10A1 | SHA256:EF2699BA677FCDB8A3B70A711A59A5892D8439E108E3AC4D27A7F946C4D01A4A | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4024 | RUXIMICS.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 304 | 4.175.87.197:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
4024 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
472 | SIHClient.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
472 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
472 | SIHClient.exe | GET | 200 | 2.20.245.137:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
472 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
472 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
472 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 13.95.31.18:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4024 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4024 | RUXIMICS.exe | 2.20.245.137:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
4024 | RUXIMICS.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
2196 | svchost.exe | 224.0.0.251:5353 | — | — | — | unknown |
2196 | svchost.exe | 224.0.0.252:5355 | — | — | — | whitelisted |
472 | SIHClient.exe | 4.175.87.197:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |