Overview
overview
8Static
static
3Spoofers (1).rar
windows7-x64
3Spoofers (1).rar
windows10-2004-x64
3Spoofers/F...er.rar
windows7-x64
3Spoofers/F...er.rar
windows10-2004-x64
3331865B8C33.exe
windows7-x64
1331865B8C33.exe
windows10-2004-x64
1VMProtectSDK64.dll
windows7-x64
1VMProtectSDK64.dll
windows10-2004-x64
1Spoofers/R...er.zip
windows7-x64
1Spoofers/R...er.zip
windows10-2004-x64
1Spoofers/U...ed.rar
windows7-x64
3Spoofers/U...ed.rar
windows10-2004-x64
89670B438E96.exe
windows7-x64
19670B438E96.exe
windows10-2004-x64
1Serial Che...er.exe
windows7-x64
1Serial Che...er.exe
windows10-2004-x64
1Serial Che...64.dll
windows7-x64
1Serial Che...64.dll
windows10-2004-x64
1VMProtectSDK64.dll
windows7-x64
1VMProtectSDK64.dll
windows10-2004-x64
1Resubmissions
02-08-2024 14:36
240802-ryvdssxgqm 8Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 14:36
Static task
static1
Behavioral task
behavioral1
Sample
Spoofers (1).rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Spoofers (1).rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Spoofers/Full_Loader.rar
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Spoofers/Full_Loader.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
331865B8C33.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
331865B8C33.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
VMProtectSDK64.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
VMProtectSDK64.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
Spoofers/RedEagleSpoofer.zip
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Spoofers/RedEagleSpoofer.zip
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
Spoofers/Unbranded.rar
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Spoofers/Unbranded.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
9670B438E96.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
9670B438E96.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral15
Sample
Serial Checker/Checker.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Serial Checker/Checker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Serial Checker/VMProtectSDK64.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
Serial Checker/VMProtectSDK64.dll
Resource
win10v2004-20240730-en
Behavioral task
behavioral19
Sample
VMProtectSDK64.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
VMProtectSDK64.dll
Resource
win10v2004-20240802-en
General
-
Target
Serial Checker/Checker.exe
-
Size
409KB
-
MD5
5ae052bc0a1c37418eb07b02de4ac4ae
-
SHA1
41be7d4bd78144784b4b35694d72c0f321f0e324
-
SHA256
afccfaac810fbb349b1ad9c770ba8256f7f726fc2ca327d49f6f5ab0240ee265
-
SHA512
91db77b0a6184a066430f89ce68e8ed3e6ce80d33843d4bbb07a467d9a164f63db2e3d7bcf2b32e65e890b30099f0da7c5ac28134af026f309ae9366f4391ce2
-
SSDEEP
6144:/NTbbNcOmdeyytlrL0QRWd09EaP0LS/6SrIR+Nk04XA:V0MyyD0QRWd09L8LTSrp4
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2840 Checker.exe 2840 Checker.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2612 WMIC.exe Token: SeSecurityPrivilege 2612 WMIC.exe Token: SeTakeOwnershipPrivilege 2612 WMIC.exe Token: SeLoadDriverPrivilege 2612 WMIC.exe Token: SeSystemProfilePrivilege 2612 WMIC.exe Token: SeSystemtimePrivilege 2612 WMIC.exe Token: SeProfSingleProcessPrivilege 2612 WMIC.exe Token: SeIncBasePriorityPrivilege 2612 WMIC.exe Token: SeCreatePagefilePrivilege 2612 WMIC.exe Token: SeBackupPrivilege 2612 WMIC.exe Token: SeRestorePrivilege 2612 WMIC.exe Token: SeShutdownPrivilege 2612 WMIC.exe Token: SeDebugPrivilege 2612 WMIC.exe Token: SeSystemEnvironmentPrivilege 2612 WMIC.exe Token: SeRemoteShutdownPrivilege 2612 WMIC.exe Token: SeUndockPrivilege 2612 WMIC.exe Token: SeManageVolumePrivilege 2612 WMIC.exe Token: 33 2612 WMIC.exe Token: 34 2612 WMIC.exe Token: 35 2612 WMIC.exe Token: SeIncreaseQuotaPrivilege 2612 WMIC.exe Token: SeSecurityPrivilege 2612 WMIC.exe Token: SeTakeOwnershipPrivilege 2612 WMIC.exe Token: SeLoadDriverPrivilege 2612 WMIC.exe Token: SeSystemProfilePrivilege 2612 WMIC.exe Token: SeSystemtimePrivilege 2612 WMIC.exe Token: SeProfSingleProcessPrivilege 2612 WMIC.exe Token: SeIncBasePriorityPrivilege 2612 WMIC.exe Token: SeCreatePagefilePrivilege 2612 WMIC.exe Token: SeBackupPrivilege 2612 WMIC.exe Token: SeRestorePrivilege 2612 WMIC.exe Token: SeShutdownPrivilege 2612 WMIC.exe Token: SeDebugPrivilege 2612 WMIC.exe Token: SeSystemEnvironmentPrivilege 2612 WMIC.exe Token: SeRemoteShutdownPrivilege 2612 WMIC.exe Token: SeUndockPrivilege 2612 WMIC.exe Token: SeManageVolumePrivilege 2612 WMIC.exe Token: 33 2612 WMIC.exe Token: 34 2612 WMIC.exe Token: 35 2612 WMIC.exe Token: SeIncreaseQuotaPrivilege 2768 WMIC.exe Token: SeSecurityPrivilege 2768 WMIC.exe Token: SeTakeOwnershipPrivilege 2768 WMIC.exe Token: SeLoadDriverPrivilege 2768 WMIC.exe Token: SeSystemProfilePrivilege 2768 WMIC.exe Token: SeSystemtimePrivilege 2768 WMIC.exe Token: SeProfSingleProcessPrivilege 2768 WMIC.exe Token: SeIncBasePriorityPrivilege 2768 WMIC.exe Token: SeCreatePagefilePrivilege 2768 WMIC.exe Token: SeBackupPrivilege 2768 WMIC.exe Token: SeRestorePrivilege 2768 WMIC.exe Token: SeShutdownPrivilege 2768 WMIC.exe Token: SeDebugPrivilege 2768 WMIC.exe Token: SeSystemEnvironmentPrivilege 2768 WMIC.exe Token: SeRemoteShutdownPrivilege 2768 WMIC.exe Token: SeUndockPrivilege 2768 WMIC.exe Token: SeManageVolumePrivilege 2768 WMIC.exe Token: 33 2768 WMIC.exe Token: 34 2768 WMIC.exe Token: 35 2768 WMIC.exe Token: SeIncreaseQuotaPrivilege 2768 WMIC.exe Token: SeSecurityPrivilege 2768 WMIC.exe Token: SeTakeOwnershipPrivilege 2768 WMIC.exe Token: SeLoadDriverPrivilege 2768 WMIC.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2884 2840 Checker.exe 31 PID 2840 wrote to memory of 2884 2840 Checker.exe 31 PID 2840 wrote to memory of 2884 2840 Checker.exe 31 PID 2840 wrote to memory of 2728 2840 Checker.exe 32 PID 2840 wrote to memory of 2728 2840 Checker.exe 32 PID 2840 wrote to memory of 2728 2840 Checker.exe 32 PID 2840 wrote to memory of 2888 2840 Checker.exe 33 PID 2840 wrote to memory of 2888 2840 Checker.exe 33 PID 2840 wrote to memory of 2888 2840 Checker.exe 33 PID 2888 wrote to memory of 2612 2888 cmd.exe 34 PID 2888 wrote to memory of 2612 2888 cmd.exe 34 PID 2888 wrote to memory of 2612 2888 cmd.exe 34 PID 2840 wrote to memory of 1032 2840 Checker.exe 36 PID 2840 wrote to memory of 1032 2840 Checker.exe 36 PID 2840 wrote to memory of 1032 2840 Checker.exe 36 PID 1032 wrote to memory of 2768 1032 cmd.exe 37 PID 1032 wrote to memory of 2768 1032 cmd.exe 37 PID 1032 wrote to memory of 2768 1032 cmd.exe 37 PID 2840 wrote to memory of 2600 2840 Checker.exe 38 PID 2840 wrote to memory of 2600 2840 Checker.exe 38 PID 2840 wrote to memory of 2600 2840 Checker.exe 38 PID 2600 wrote to memory of 2620 2600 cmd.exe 39 PID 2600 wrote to memory of 2620 2600 cmd.exe 39 PID 2600 wrote to memory of 2620 2600 cmd.exe 39 PID 2840 wrote to memory of 1212 2840 Checker.exe 40 PID 2840 wrote to memory of 1212 2840 Checker.exe 40 PID 2840 wrote to memory of 1212 2840 Checker.exe 40 PID 1212 wrote to memory of 3068 1212 cmd.exe 41 PID 1212 wrote to memory of 3068 1212 cmd.exe 41 PID 1212 wrote to memory of 3068 1212 cmd.exe 41 PID 2840 wrote to memory of 2228 2840 Checker.exe 42 PID 2840 wrote to memory of 2228 2840 Checker.exe 42 PID 2840 wrote to memory of 2228 2840 Checker.exe 42 PID 2228 wrote to memory of 1984 2228 cmd.exe 43 PID 2228 wrote to memory of 1984 2228 cmd.exe 43 PID 2228 wrote to memory of 1984 2228 cmd.exe 43 PID 2840 wrote to memory of 604 2840 Checker.exe 44 PID 2840 wrote to memory of 604 2840 Checker.exe 44 PID 2840 wrote to memory of 604 2840 Checker.exe 44 PID 604 wrote to memory of 264 604 cmd.exe 45 PID 604 wrote to memory of 264 604 cmd.exe 45 PID 604 wrote to memory of 264 604 cmd.exe 45 PID 2840 wrote to memory of 1348 2840 Checker.exe 46 PID 2840 wrote to memory of 1348 2840 Checker.exe 46 PID 2840 wrote to memory of 1348 2840 Checker.exe 46 PID 1348 wrote to memory of 1272 1348 cmd.exe 47 PID 1348 wrote to memory of 1272 1348 cmd.exe 47 PID 1348 wrote to memory of 1272 1348 cmd.exe 47 PID 2840 wrote to memory of 2236 2840 Checker.exe 48 PID 2840 wrote to memory of 2236 2840 Checker.exe 48 PID 2840 wrote to memory of 2236 2840 Checker.exe 48 PID 2840 wrote to memory of 1052 2840 Checker.exe 49 PID 2840 wrote to memory of 1052 2840 Checker.exe 49 PID 2840 wrote to memory of 1052 2840 Checker.exe 49 PID 1052 wrote to memory of 2012 1052 cmd.exe 50 PID 1052 wrote to memory of 2012 1052 cmd.exe 50 PID 1052 wrote to memory of 2012 1052 cmd.exe 50 PID 2840 wrote to memory of 2464 2840 Checker.exe 51 PID 2840 wrote to memory of 2464 2840 Checker.exe 51 PID 2840 wrote to memory of 2464 2840 Checker.exe 51 PID 2464 wrote to memory of 2148 2464 cmd.exe 52 PID 2464 wrote to memory of 2148 2464 cmd.exe 52 PID 2464 wrote to memory of 2148 2464 cmd.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\Serial Checker\Checker.exe"C:\Users\Admin\AppData\Local\Temp\Serial Checker\Checker.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic diskdrive get name, serialnumber2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get name, serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic logicaldisk get name, volumeserialnumber2⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get name, volumeserialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic csproduct get uuid2⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵PID:2620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic baseboard get serialnumber2⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get serialnumber3⤵PID:3068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic systemenclosure get serialnumber2⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\System32\Wbem\WMIC.exewmic systemenclosure get serialnumber3⤵PID:1984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_NetworkAdapter where 'PNPDeviceID like '%%PCI%%' AND NetConnectionStatus=2 AND AdapterTypeID='0'' get MacAddress2⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_NetworkAdapter where 'PNPDeviceID like '%%PCI%%' AND NetConnectionStatus=2 AND AdapterTypeID='0'' get MacAddress3⤵PID:264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic cpu get partnumber,serialnumber, ProcessorId2⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get partnumber,serialnumber, ProcessorId3⤵PID:1272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c nvidia-smi -L2⤵PID:2236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic memorychip get serialnumber2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\System32\Wbem\WMIC.exewmic memorychip get serialnumber3⤵PID:2012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get SerialNumber2⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\System32\Wbem\WMIC.exewmic os get SerialNumber3⤵PID:2148
-
-