Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Monotone-H...ox.bat
windows10-2004-x64
1Monotone-H...on.bat
windows10-2004-x64
1Monotone-H...rs.exe
windows10-2004-x64
1Monotone-H...s2.exe
windows10-2004-x64
1Monotone-H...ew.exe
windows10-2004-x64
3Monotone-H...ck.exe
windows10-2004-x64
7Monotone-H...te.vbs
windows10-2004-x64
1Monotone-H...ss.bat
windows10-2004-x64
1Monotone-H...er.sys
windows10-2004-x64
1Monotone-H...ut.exe
windows10-2004-x64
1Monotone-H...en.bat
windows10-2004-x64
1Monotone-H...ne.exe
windows10-2004-x64
1Monotone-H...64.exe
windows10-2004-x64
1Monotone-H...ox.exe
windows10-2004-x64
1Monotone-H...64.exe
windows10-2004-x64
1Monotone-H...id.ps1
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
Monotone-HWID-Spoofer-0.0.1/Box.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral2
Sample
Monotone-HWID-Spoofer-0.0.1/Button.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Adapters.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral4
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Adapters2.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/AlternateStreamView.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral6
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Block.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/UnbanComplete.vbs
Resource
win10v2004-20231023-en
Behavioral task
behavioral8
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/process.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/spoofer.sys
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
Monotone-HWID-Spoofer-0.0.1/GetInput.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Monotone-HWID-Spoofer-0.0.1/Getlen.bat
Resource
win10v2004-20231020-en
Behavioral task
behavioral12
Sample
Monotone-HWID-Spoofer-0.0.1/Monotone.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral13
Sample
Monotone-HWID-Spoofer-0.0.1/Volumeid64.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral14
Sample
Monotone-HWID-Spoofer-0.0.1/batbox.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Monotone-HWID-Spoofer-0.0.1/colorecho-vc10-x86_64.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
Monotone-HWID-Spoofer-0.0.1/hwid.ps1
Resource
win10v2004-20231020-en
General
-
Target
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Block.exe
-
Size
119KB
-
MD5
5782b8d469bbc9045ebd2316c2aefbd5
-
SHA1
f679adea19ac0e88a50cfefb88825a086102f77d
-
SHA256
dfd08e1d7a34bae6836b3915b45b8637b85cdc998198c5bf148fba5e96f15c21
-
SHA512
e57ed92d3c916b89e5f830fb52a63b330e404ea91a7cc0e0b0e8cfb03f9bea7252f1fa8fcf3950ae2bd404dcd189eeac27bcdc1cf529acd8ebde0bc5f457d023
-
SSDEEP
3072:u2sMWkzbJh1qZ9QW69hd1MMdxPe9N9uA0hu9TBfcXnI:PbJhs7QW69hd1MMdxPe9N9uA0hu9TBKI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1114462139-3090196418-29517368-1000\Control Panel\International\Geo\Nation Block.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4340 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3780 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4340 tasklist.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3184 2084 Block.exe 87 PID 2084 wrote to memory of 3184 2084 Block.exe 87 PID 3184 wrote to memory of 3780 3184 cmd.exe 90 PID 3184 wrote to memory of 3780 3184 cmd.exe 90 PID 3184 wrote to memory of 4340 3184 cmd.exe 96 PID 3184 wrote to memory of 4340 3184 cmd.exe 96 PID 3184 wrote to memory of 1624 3184 cmd.exe 97 PID 3184 wrote to memory of 1624 3184 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Commands\Hidden\Block.exe"C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Commands\Hidden\Block.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A393.tmp\A394.tmp\A3A4.bat C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Commands\Hidden\Block.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\PING.EXEping localhost3⤵
- Runs ping.exe
PID:3780
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"3⤵PID:1624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234B
MD56bf25f359aa5fbd7e1dd035df781227c
SHA1f13a903548ba59fe28e1b6edca19bab5083b806d
SHA256db9b3975c87afa294cafdd40cac28ed305d39c6215aa170dc3cf6005e86f9e46
SHA512ea91c96d2d8a5c28e4d81af7ac0175b9dcd6757e97925609ac23ce4e1738698c10ffd05ce446610330d6f66b78f01336df1a997d1535ab8d0925eef2de9ae314