Overview
overview
10Static
static
10HWID-SPOOF...rs.exe
windows11-21h2-x64
1HWID-SPOOF...s2.exe
windows11-21h2-x64
1HWID-SPOOF...ew.exe
windows11-21h2-x64
3HWID-SPOOF...ck.exe
windows11-21h2-x64
3HWID-SPOOF...te.vbs
windows11-21h2-x64
1HWID-SPOOF...ss.bat
windows11-21h2-x64
1HWID-SPOOF...er.sys
windows11-21h2-x64
1HWID-SPOOF...ED.exe
windows11-21h2-x64
8HWID-SPOOF...id.ps1
windows11-21h2-x64
1Analysis
-
max time kernel
450s -
max time network
1172s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/02/2024, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
HWID-SPOOFER-main/Commands/Hidden/Adapters.exe
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
HWID-SPOOFER-main/Commands/Hidden/Adapters2.exe
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
HWID-SPOOFER-main/Commands/Hidden/AlternateStreamView.exe
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
HWID-SPOOFER-main/Commands/Hidden/Block.exe
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
HWID-SPOOFER-main/Commands/Hidden/UnbanComplete.vbs
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
HWID-SPOOFER-main/Commands/Hidden/process.bat
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
HWID-SPOOFER-main/Commands/Hidden/spoofer.sys
Resource
win11-20240221-en
Behavioral task
behavioral8
Sample
HWID-SPOOFER-main/hwid spoofer COMPILED.exe
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
HWID-SPOOFER-main/hwid.ps1
Resource
win11-20240221-en
General
-
Target
HWID-SPOOFER-main/Commands/Hidden/process.bat
-
Size
1001B
-
MD5
2d3f9b2d001abd6e58ac6f0e7337c619
-
SHA1
7053a604a394f479b643783098adb056d69a404b
-
SHA256
ef702ce2f8fb1bc71fb60e8b95cb83cef4fa66aa96afd7ca4fd67c96530b6e53
-
SHA512
60d4a7e203e37194f4a78f1c581728197b3cd6581d70e185ba6d0d8206aca3a732319b28fef776028015615ebc0ab164a9c935081cd2496b866c63ad6358fccf
Malware Config
Signatures
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3692 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4748 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3692 tasklist.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1728 wrote to memory of 4748 1728 cmd.exe 80 PID 1728 wrote to memory of 4748 1728 cmd.exe 80 PID 1728 wrote to memory of 3692 1728 cmd.exe 83 PID 1728 wrote to memory of 3692 1728 cmd.exe 83 PID 1728 wrote to memory of 1976 1728 cmd.exe 84 PID 1728 wrote to memory of 1976 1728 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\HWID-SPOOFER-main\Commands\Hidden\process.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\PING.EXEping localhost2⤵
- Runs ping.exe
PID:4748
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"2⤵PID:1976
-