Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Monotone-H...ox.bat
windows10-2004-x64
1Monotone-H...on.bat
windows10-2004-x64
1Monotone-H...rs.exe
windows10-2004-x64
1Monotone-H...s2.exe
windows10-2004-x64
1Monotone-H...ew.exe
windows10-2004-x64
3Monotone-H...ck.exe
windows10-2004-x64
7Monotone-H...te.vbs
windows10-2004-x64
1Monotone-H...ss.bat
windows10-2004-x64
1Monotone-H...er.sys
windows10-2004-x64
1Monotone-H...ut.exe
windows10-2004-x64
1Monotone-H...en.bat
windows10-2004-x64
1Monotone-H...ne.exe
windows10-2004-x64
1Monotone-H...64.exe
windows10-2004-x64
1Monotone-H...ox.exe
windows10-2004-x64
1Monotone-H...64.exe
windows10-2004-x64
1Monotone-H...id.ps1
windows10-2004-x64
1Analysis
-
max time kernel
102s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
Monotone-HWID-Spoofer-0.0.1/Box.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral2
Sample
Monotone-HWID-Spoofer-0.0.1/Button.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Adapters.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral4
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Adapters2.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/AlternateStreamView.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral6
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Block.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/UnbanComplete.vbs
Resource
win10v2004-20231023-en
Behavioral task
behavioral8
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/process.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/spoofer.sys
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
Monotone-HWID-Spoofer-0.0.1/GetInput.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Monotone-HWID-Spoofer-0.0.1/Getlen.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral12
Sample
Monotone-HWID-Spoofer-0.0.1/Monotone.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral13
Sample
Monotone-HWID-Spoofer-0.0.1/Volumeid64.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral14
Sample
Monotone-HWID-Spoofer-0.0.1/batbox.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Monotone-HWID-Spoofer-0.0.1/colorecho-vc10-x86_64.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
Monotone-HWID-Spoofer-0.0.1/hwid.ps1
Resource
win10v2004-20231020-en
General
-
Target
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Adapters.exe
-
Size
335KB
-
MD5
934bbc5411c532964f3bbe42cb1c1785
-
SHA1
dcddde340e7f080716abaa456971b9aa85bd084b
-
SHA256
b3de6d10d9f94037b88f736609e50a8a4c4d516ca50107dedd575797a654c28e
-
SHA512
8db126cb8381fe84afe25b25e854eb8de25e43f2638e0d87740ce3fe33338b032b09d9551655afedecfe39cb7482f88e72ccdb28afb59684474084a28da71cb2
-
SSDEEP
6144:QlGlXIiIGWbsTXO/P/bbUmmUhquD2S6FEJQzZnCvTkJCps9Q18RQj7dVJTrQkEj2:QlGlXIiIGWbsTXO/P/3mUhquD2S6DzZl
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 Adapters.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Adapters.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 Adapters.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags Adapters.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Adapters.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags Adapters.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 Adapters.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom Adapters.exe