Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 02:03

General

  • Target

    Monotone-HWID-Spoofer-0.0.1/Monotone.exe

  • Size

    160KB

  • MD5

    cd6cddac2686df01814705f21e6da343

  • SHA1

    f29ad4efdc160ffba5cb63e01349ec9b84123e30

  • SHA256

    0f7f86530b7fa2e693a2a3a5bf69957e61c2f45d39418d077285a1ea6f4bb992

  • SHA512

    a673d521f316d3e0fa87a99effa33c5dc4fde315e72b7f6cbb828a94ffe8ebeed4bf9ca6fe858b3c69327aa4ce05ae02b37e2a392abb7cc728c4bbe2ab9a6de4

  • SSDEEP

    3072:yuo1MlSEqhqJhJy0WTHW69B9VjMdxPedN9ug0/9TBfsdZK0:y5oaqJhJMHW69B9VjMdxPedN9ug0/9Tk

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Monotone.exe
    "C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Monotone.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7EC1.tmp\7EC2.tmp\7EC3.bat C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Monotone.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Windows\system32\mode.com
        mode 80,20
        3⤵
          PID:2944
        • C:\Windows\system32\PING.EXE
          ping localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2808
        • C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\colorecho-vc10-x86_64.exe
          colorecho-vc10-x86_64.exe " Monotone" 1
          3⤵
            PID:2768
          • C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exe
            batbox /c 0xf0 /g 21 17 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 21 16 /a 32 /d " " /a 32 /g 21 15 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x07
            3⤵
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:2772
          • C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exe
            Batbox /g 23 16 /c 0xf0 /d " Enter " /c 0x07
            3⤵
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:2876
          • C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exe
            GetInput /M 21 15 39 17 /H 70 70
            3⤵
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:2908

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7EC1.tmp\7EC2.tmp\7EC3.bat

        Filesize

        17KB

        MD5

        c5b9f5f77bee19857e4331300d080e3b

        SHA1

        50f5d39311cf12636d9ebe58aa4464578995f112

        SHA256

        a689ce9bdcdbc32ad39cbab6349453847a71a386cb4c4be4ffe2daff57fce52d

        SHA512

        ecb86677eb5bb0c0dc8b7c1d351cd7409772699393ebce902fcaa05442d46da112cfe8ca2215794ae2308c573d56fd51fd8920c488ff20c7b1c96cd7fced1dd1

      • memory/2772-2-0x0000000000400000-0x0000000000402000-memory.dmp

        Filesize

        8KB

      • memory/2772-3-0x0000000000400000-0x0000000000402000-memory.dmp

        Filesize

        8KB

      • memory/2876-4-0x0000000000400000-0x0000000000402000-memory.dmp

        Filesize

        8KB