Overview
overview
3Static
static
1HWID-spoof...in.zip
windows7-x64
1HWID-spoof...in.zip
windows10-2004-x64
1HWID-spoof...ignore
windows7-x64
3HWID-spoof...ignore
windows10-2004-x64
3HWID-spoof...ICENSE
windows7-x64
1HWID-spoof...ICENSE
windows10-2004-x64
1HWID-spoof...DME.md
windows7-x64
3HWID-spoof...DME.md
windows10-2004-x64
3HWID-spoof...er.cpp
windows7-x64
3HWID-spoof...er.cpp
windows10-2004-x64
3HWID-spoof...ain.py
windows7-x64
3HWID-spoof...ain.py
windows10-2004-x64
3HWID-spoof...ge.cpp
windows7-x64
3HWID-spoof...ge.cpp
windows10-2004-x64
3HWID-spoof...s.json
windows7-x64
3HWID-spoof...s.json
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
HWID-spoofer-for-games-main.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
HWID-spoofer-for-games-main.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
HWID-spoofer-for-games-main/.gitignore
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
HWID-spoofer-for-games-main/.gitignore
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
HWID-spoofer-for-games-main/LICENSE
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
HWID-spoofer-for-games-main/LICENSE
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
HWID-spoofer-for-games-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
HWID-spoofer-for-games-main/README.md
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
HWID-spoofer-for-games-main/hwidspoofer.cpp
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
HWID-spoofer-for-games-main/hwidspoofer.cpp
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
HWID-spoofer-for-games-main/main.py
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
HWID-spoofer-for-games-main/main.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
HWID-spoofer-for-games-main/package.cpp
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
HWID-spoofer-for-games-main/package.cpp
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
HWID-spoofer-for-games-main/tools.json
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
HWID-spoofer-for-games-main/tools.json
Resource
win10v2004-20240709-en
General
-
Target
HWID-spoofer-for-games-main/README.md
-
Size
3KB
-
MD5
081625b8a394925d3583d41d0c656faf
-
SHA1
0db59adf756f3fe41fbeafd4ffa6db9b3d78ea28
-
SHA256
cb5696d672ec72e93adbd984a39d4ca56667652f54b46c9fb17fa832d3019f36
-
SHA512
ccf10fd3d8aca4ae5e0a9adbb645aef50692183c9bd1cf1dc6ae6db0c9ebfc2a559d122cda5427c3bb68dbd222dcf7d96b2b0973371a35c79d654c9cc5f780c0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\md_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.md rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\md_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\md_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 AcroRd32.exe 2680 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2772 2932 cmd.exe 31 PID 2932 wrote to memory of 2772 2932 cmd.exe 31 PID 2932 wrote to memory of 2772 2932 cmd.exe 31 PID 2772 wrote to memory of 2680 2772 rundll32.exe 32 PID 2772 wrote to memory of 2680 2772 rundll32.exe 32 PID 2772 wrote to memory of 2680 2772 rundll32.exe 32 PID 2772 wrote to memory of 2680 2772 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\HWID-spoofer-for-games-main\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\HWID-spoofer-for-games-main\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\HWID-spoofer-for-games-main\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55b59e8a626e16e11e72f5be4690d604e
SHA1fcf0dd5b5e79ecd1b5e2ff69d2a8f1ec6fb4fbf2
SHA256f2e6ed112247e4e340c2b2e0fb626db9272b2e93c04c042db0cc67849ea8bf1c
SHA512b67478e130aa02ee02594b0deeaaec847caa532e0316f0293068bc6180c069a5ad74acb01a2e07c628938e3eb08f0e04338c1cf05fe33015b180f7c5e015086b