Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2023, 20:40

General

  • Target

    Monotone-HWID-Spoofer-0.0.1/Monotone.exe

  • Size

    160KB

  • MD5

    cd6cddac2686df01814705f21e6da343

  • SHA1

    f29ad4efdc160ffba5cb63e01349ec9b84123e30

  • SHA256

    0f7f86530b7fa2e693a2a3a5bf69957e61c2f45d39418d077285a1ea6f4bb992

  • SHA512

    a673d521f316d3e0fa87a99effa33c5dc4fde315e72b7f6cbb828a94ffe8ebeed4bf9ca6fe858b3c69327aa4ce05ae02b37e2a392abb7cc728c4bbe2ab9a6de4

  • SSDEEP

    3072:yuo1MlSEqhqJhJy0WTHW69B9VjMdxPedN9ug0/9TBfsdZK0:y5oaqJhJMHW69B9VjMdxPedN9ug0/9Tk

Score
1/10

Malware Config

Signatures

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Monotone.exe
    "C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Monotone.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\75CC.tmp\75CD.tmp\75CE.bat C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Monotone.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3724
      • C:\Windows\system32\mode.com
        mode 80,20
        3⤵
          PID:4796
        • C:\Windows\system32\PING.EXE
          ping localhost
          3⤵
          • Runs ping.exe
          PID:2580
        • C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\colorecho-vc10-x86_64.exe
          colorecho-vc10-x86_64.exe " Monotone" 1
          3⤵
            PID:2988
          • C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exe
            batbox /c 0xf0 /g 21 17 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 21 16 /a 32 /d " " /a 32 /g 21 15 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x07
            3⤵
              PID:844
            • C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exe
              Batbox /g 23 16 /c 0xf0 /d " Enter " /c 0x07
              3⤵
                PID:3692
              • C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exe
                GetInput /M 21 15 39 17 /H 70 70
                3⤵
                  PID:2888

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\75CC.tmp\75CD.tmp\75CE.bat

                    Filesize

                    17KB

                    MD5

                    c5b9f5f77bee19857e4331300d080e3b

                    SHA1

                    50f5d39311cf12636d9ebe58aa4464578995f112

                    SHA256

                    a689ce9bdcdbc32ad39cbab6349453847a71a386cb4c4be4ffe2daff57fce52d

                    SHA512

                    ecb86677eb5bb0c0dc8b7c1d351cd7409772699393ebce902fcaa05442d46da112cfe8ca2215794ae2308c573d56fd51fd8920c488ff20c7b1c96cd7fced1dd1

                  • memory/844-2-0x0000000000400000-0x0000000000402000-memory.dmp

                    Filesize

                    8KB

                  • memory/844-3-0x0000000000400000-0x0000000000402000-memory.dmp

                    Filesize

                    8KB

                  • memory/3692-4-0x0000000000400000-0x0000000000402000-memory.dmp

                    Filesize

                    8KB