Overview
overview
7Static
static
3SecHex-Spo...in.rar
windows7-x64
7SecHex-Spo...in.rar
windows10-2004-x64
3SecHex-Spo...NG.yml
windows7-x64
3SecHex-Spo...NG.yml
windows10-2004-x64
3SecHex-Spo...ort.md
windows7-x64
3SecHex-Spo...ort.md
windows10-2004-x64
3SecHex-Spo...ignore
windows7-x64
3SecHex-Spo...ignore
windows10-2004-x64
3SecHex-Spo...ICENSE
windows7-x64
1SecHex-Spo...ICENSE
windows10-2004-x64
1SecHex-Spo...DME.md
windows7-x64
3SecHex-Spo...DME.md
windows10-2004-x64
3SecHex-Spo...ID.sln
windows7-x64
3SecHex-Spo...ID.sln
windows10-2004-x64
3SecHex-Spo...ram.js
windows7-x64
1SecHex-Spo...ram.js
windows10-2004-x64
1SecHex-Spo...csproj
windows7-x64
3SecHex-Spo...csproj
windows10-2004-x64
3SecHex-Spo...tes.cs
windows7-x64
1SecHex-Spo...tes.cs
windows10-2004-x64
1SecHex-Spo...nfo.cs
windows7-x64
3SecHex-Spo...nfo.cs
windows10-2004-x64
3SecHex-Spo....cache
windows7-x64
3SecHex-Spo....cache
windows10-2004-x64
3SecHex-Spo...config
windows7-x64
3SecHex-Spo...config
windows10-2004-x64
3SecHex-Spo...s.g.cs
windows7-x64
3SecHex-Spo...s.g.cs
windows10-2004-x64
3SecHex-Spo...tes.cs
windows7-x64
1SecHex-Spo...tes.cs
windows10-2004-x64
1SecHex-Spo...nfo.cs
windows7-x64
3SecHex-Spo...nfo.cs
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
SecHex-Spoofy-main.rar
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
SecHex-Spoofy-main.rar
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
SecHex-Spoofy-main/.github/FUNDING.yml
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
SecHex-Spoofy-main/.github/FUNDING.yml
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
SecHex-Spoofy-main/.github/ISSUE_TEMPLATE/bug_report.md
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
SecHex-Spoofy-main/.github/ISSUE_TEMPLATE/bug_report.md
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
SecHex-Spoofy-main/.gitignore
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
SecHex-Spoofy-main/.gitignore
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
SecHex-Spoofy-main/LICENSE
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
SecHex-Spoofy-main/LICENSE
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
SecHex-Spoofy-main/README.md
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
SecHex-Spoofy-main/README.md
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID.sln
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID.sln
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/Program.js
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/Program.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/RPZ-HWID.csproj
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/RPZ-HWID.csproj
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Debug/net6.0/.NETCoreApp,Version=v6.0.AssemblyAttributes.cs
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Debug/net6.0/.NETCoreApp,Version=v6.0.AssemblyAttributes.cs
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Debug/net6.0/RPZ-HWID.AssemblyInfo.cs
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Debug/net6.0/RPZ-HWID.AssemblyInfo.cs
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Debug/net6.0/RPZ-HWID.AssemblyInfoInputs.cache
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Debug/net6.0/RPZ-HWID.AssemblyInfoInputs.cache
Resource
win10v2004-20240419-en
Behavioral task
behavioral25
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Debug/net6.0/RPZ-HWID.GeneratedMSBuildEditorConfig.editorconfig
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Debug/net6.0/RPZ-HWID.GeneratedMSBuildEditorConfig.editorconfig
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Debug/net6.0/RPZ-HWID.GlobalUsings.g.cs
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Debug/net6.0/RPZ-HWID.GlobalUsings.g.cs
Resource
win10v2004-20240419-en
Behavioral task
behavioral29
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Release/net6.0/.NETCoreApp,Version=v6.0.AssemblyAttributes.cs
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Release/net6.0/.NETCoreApp,Version=v6.0.AssemblyAttributes.cs
Resource
win10v2004-20240419-en
Behavioral task
behavioral31
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Release/net6.0/RPZ-HWID.AssemblyInfo.cs
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID/obj/Release/net6.0/RPZ-HWID.AssemblyInfo.cs
Resource
win10v2004-20240419-en
General
-
Target
SecHex-Spoofy-main/SecHex-CMDLINE/RPZ-HWID.sln
-
Size
1KB
-
MD5
4248cbd9c877b517894ca47919e20e1c
-
SHA1
ef6b092907d756eb5e216fd5a52915e6940c107f
-
SHA256
a43c6775ae0afee9663f6eef234c0761819afe17873b52d8eafbfe1cfac0ff79
-
SHA512
861d4f982d2f4167add9eacba1817d3cbdabc79dc5aafdcbe3e9528698ee6f2cd7ad9b5325351c5040c1d71a7d791242fa00094f4419268248da20b08d4ebc2e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\sln_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.sln\ = "sln_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\sln_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\sln_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\sln_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.sln rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\sln_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\sln_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1984 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1984 AcroRd32.exe 1984 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2744 2460 cmd.exe 29 PID 2460 wrote to memory of 2744 2460 cmd.exe 29 PID 2460 wrote to memory of 2744 2460 cmd.exe 29 PID 2744 wrote to memory of 1984 2744 rundll32.exe 30 PID 2744 wrote to memory of 1984 2744 rundll32.exe 30 PID 2744 wrote to memory of 1984 2744 rundll32.exe 30 PID 2744 wrote to memory of 1984 2744 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SecHex-Spoofy-main\SecHex-CMDLINE\RPZ-HWID.sln1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SecHex-Spoofy-main\SecHex-CMDLINE\RPZ-HWID.sln2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SecHex-Spoofy-main\SecHex-CMDLINE\RPZ-HWID.sln"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5536c730be5189adeef1f9aae4ea1b836
SHA15b9aa656e5a07c5e745d5290fcbf505fd912c80a
SHA2564dfc700327dd0d77d061c08d0e4ebc4eb4d14120c3a996fd31491b74f715653a
SHA512761a7be6ab60ace7c5de04ea1afed78f22a0a2da0d84b962c6de4b5878319c3254b90e460a60b29223b7ec61c76d5d93b283311a827045d8dab5d3c43310e599