Analysis

  • max time kernel
    22s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 18:51

General

  • Target

    Hyper HWID Spoofer/Hyper Spoofer.exe

  • Size

    146KB

  • MD5

    9e8c495e21c51439fcfcad1b4d96656e

  • SHA1

    388d65846ac6dc78414f9d44c08b7b53b8be64f5

  • SHA256

    d2a6b2dd3d2b0f3b4d05af533a70d65231a7364ce7472fb57b5a93df4765de29

  • SHA512

    57eed4ee7b2daac912c19763096ae3953952bac84798761cebfa55b61e69a256503e9c795f897f3e504fc85856a633425e9eed0d3a50abd7ddad52db81ff1d80

  • SSDEEP

    3072:Yczkitvo4BpYN/6mBPry8TXROLdW5m4mURQ9OOGy0kJ:YA4NCmBPry/N2cOOv

Score
5/10

Malware Config

Signatures

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hyper HWID Spoofer\Hyper Spoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\Hyper HWID Spoofer\Hyper Spoofer.exe"
    1⤵
    • Checks system information in the registry
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Windows\SYSTEM32\netsh.exe
      "netsh" interface set interface "Ethernet" disable
      2⤵
        PID:716
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
      1⤵
      • Modifies data under HKEY_USERS
      PID:1192

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/432-0-0x00007FFA3A77B000-0x00007FFA3A77C000-memory.dmp

      Filesize

      4KB

    • memory/432-0-0x00007FFA3A77B000-0x00007FFA3A77C000-memory.dmp

      Filesize

      4KB