Analysis
-
max time kernel
41s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 21:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SpooferHwID.exe
Resource
win10-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
SpooferHwID.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral3
Sample
SpooferHwID.exe
Resource
win11-20231222-en
4 signatures
150 seconds
General
-
Target
SpooferHwID.exe
-
Size
5.2MB
-
MD5
831062e7a290c88f2e2e60ee105a634b
-
SHA1
339110f520d416879c0ddd8c636ebc3b92471799
-
SHA256
169617d19dbaa44c07e49891bc0bd14a99d3b900ac211206649439f2153daa21
-
SHA512
e8277462575ac0b58f1280df7657dbe0d6498bde0b6887c0e736bc06d345051bcc8b0d1f489efcb469d2dcba0296efc3a5674fc585e8ee5a03c33c578822568e
-
SSDEEP
98304:p6cnHWv35owmpSpTiQEwtTuvPKBoswGnAiysZw0UW6Gp:cMY3XmfdwcAwK9ysZw7
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5096 SpooferHwID.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5096 SpooferHwID.exe 5096 SpooferHwID.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5096 wrote to memory of 1956 5096 SpooferHwID.exe 93 PID 5096 wrote to memory of 1956 5096 SpooferHwID.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpooferHwID.exe"C:\Users\Admin\AppData\Local\Temp\SpooferHwID.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\INF\GoogleAssistant_x64.exe2⤵PID:1956
-