Analysis
-
max time kernel
22s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
Hyper HWID Spoofer/Hyper Spoofer.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Hyper HWID Spoofer/Hyper Spoofer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Hyper HWID Spoofer/Hypermenu.xyz.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Hyper HWID Spoofer/Hypermenu.xyz.exe
Resource
win10v2004-20240426-en
General
-
Target
Hyper HWID Spoofer/Hyper Spoofer.exe
-
Size
146KB
-
MD5
9e8c495e21c51439fcfcad1b4d96656e
-
SHA1
388d65846ac6dc78414f9d44c08b7b53b8be64f5
-
SHA256
d2a6b2dd3d2b0f3b4d05af533a70d65231a7364ce7472fb57b5a93df4765de29
-
SHA512
57eed4ee7b2daac912c19763096ae3953952bac84798761cebfa55b61e69a256503e9c795f897f3e504fc85856a633425e9eed0d3a50abd7ddad52db81ff1d80
-
SSDEEP
3072:Yczkitvo4BpYN/6mBPry8TXROLdW5m4mURQ9OOGy0kJ:YA4NCmBPry/N2cOOv
Malware Config
Signatures
-
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
Hyper Spoofer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer = "QRL0QPO79C4E33C" Hyper Spoofer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName = "JR8BW9" Hyper Spoofer.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
Hyper Spoofer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral Hyper Spoofer.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral Hyper Spoofer.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral Hyper Spoofer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 Hyper Spoofer.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier = "KEI6P1X9-148EOJOV-A" Hyper Spoofer.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Hyper Spoofer.exedescription pid process target process PID 432 wrote to memory of 716 432 Hyper Spoofer.exe netsh.exe PID 432 wrote to memory of 716 432 Hyper Spoofer.exe netsh.exe PID 432 wrote to memory of 716 432 Hyper Spoofer.exe netsh.exe PID 432 wrote to memory of 716 432 Hyper Spoofer.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hyper HWID Spoofer\Hyper Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Hyper HWID Spoofer\Hyper Spoofer.exe"1⤵
- Checks system information in the registry
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SYSTEM32\netsh.exe"netsh" interface set interface "Ethernet" disable2⤵PID:716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
PID:1192