Overview
overview
7Static
static
3HWID Spoof....3.dll
windows7-x64
1HWID Spoof....3.dll
windows10-2004-x64
1HWID Spoof...er.bat
windows7-x64
3HWID Spoof...er.bat
windows10-2004-x64
3HWID Spoofer/DK1.exe
windows7-x64
1HWID Spoofer/DK1.exe
windows10-2004-x64
1HWID Spoofer/DK2.exe
windows7-x64
1HWID Spoofer/DK2.exe
windows10-2004-x64
1HWID Spoofer/EAC.exe
windows7-x64
3HWID Spoofer/EAC.exe
windows10-2004-x64
7HWID Spoofer/IP.bat
windows7-x64
3HWID Spoofer/IP.bat
windows10-2004-x64
3HWID Spoof...er.exe
windows7-x64
3HWID Spoof...er.exe
windows10-2004-x64
3HWID Spoofer/OOF.exe
windows7-x64
3HWID Spoofer/OOF.exe
windows10-2004-x64
3HWID Spoof...f2.exe
windows7-x64
1HWID Spoof...f2.exe
windows10-2004-x64
1HWID Spoof...64.exe
windows7-x64
1HWID Spoof...64.exe
windows10-2004-x64
1HWID Spoof...ap.exe
windows7-x64
1HWID Spoof...ap.exe
windows10-2004-x64
1HWID Spoofer/loop.bat
windows7-x64
1HWID Spoofer/loop.bat
windows10-2004-x64
1HWID Spoof...er.exe
windows7-x64
1HWID Spoof...er.exe
windows10-2004-x64
1HWID Spoof...er.sys
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
HWID Spoofer/Bunifu_UI_v1.5.3.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
HWID Spoofer/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
HWID Spoofer/Cleaner.bat
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
HWID Spoofer/Cleaner.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
HWID Spoofer/DK1.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
HWID Spoofer/DK1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
HWID Spoofer/DK2.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
HWID Spoofer/DK2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
HWID Spoofer/EAC.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
HWID Spoofer/EAC.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
HWID Spoofer/IP.bat
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
HWID Spoofer/IP.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
HWID Spoofer/MAC Changer.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
HWID Spoofer/MAC Changer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
HWID Spoofer/OOF.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
HWID Spoofer/OOF.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
HWID Spoofer/Spoof2.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
HWID Spoofer/Spoof2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
HWID Spoofer/Volumeid64.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
HWID Spoofer/Volumeid64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
HWID Spoofer/drvmap.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
HWID Spoofer/drvmap.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
HWID Spoofer/loop.bat
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
HWID Spoofer/loop.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
HWID Spoofer/mapper.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
HWID Spoofer/mapper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
HWID Spoofer/spoofer.sys
Resource
win10v2004-20240802-en
General
-
Target
HWID Spoofer/Cleaner.bat
-
Size
1KB
-
MD5
139c0fed46d0a8e9ea03bd45686f8e84
-
SHA1
4969ac8f2e002f7a2a15e1da60076bff5416d41f
-
SHA256
3ae29ef823ecfa08b99447b35bab89c1f2c7279cfbf557f9381720bb999d18e1
-
SHA512
cef0bba827b9e4b00dccd3b9eed8fa5ecca2b325c2a02add80337d564090ea54277f27ed6cd485f4c8c01e001c3bb945eafacac0f2e53116096805ee422b04d7
Malware Config
Signatures
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1792 PING.EXE 2692 PING.EXE 2940 PING.EXE -
Delays execution with timeout.exe 1 IoCs
pid Process 2808 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2660 taskkill.exe 2752 taskkill.exe 2688 taskkill.exe 2236 taskkill.exe 3044 taskkill.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1792 PING.EXE 2692 PING.EXE 2940 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2236 taskkill.exe Token: SeDebugPrivilege 3044 taskkill.exe Token: SeDebugPrivilege 2660 taskkill.exe Token: SeDebugPrivilege 2752 taskkill.exe Token: SeDebugPrivilege 2688 taskkill.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1792 1584 cmd.exe 31 PID 1584 wrote to memory of 1792 1584 cmd.exe 31 PID 1584 wrote to memory of 1792 1584 cmd.exe 31 PID 1584 wrote to memory of 2236 1584 cmd.exe 33 PID 1584 wrote to memory of 2236 1584 cmd.exe 33 PID 1584 wrote to memory of 2236 1584 cmd.exe 33 PID 1584 wrote to memory of 3044 1584 cmd.exe 35 PID 1584 wrote to memory of 3044 1584 cmd.exe 35 PID 1584 wrote to memory of 3044 1584 cmd.exe 35 PID 1584 wrote to memory of 2660 1584 cmd.exe 36 PID 1584 wrote to memory of 2660 1584 cmd.exe 36 PID 1584 wrote to memory of 2660 1584 cmd.exe 36 PID 1584 wrote to memory of 2752 1584 cmd.exe 37 PID 1584 wrote to memory of 2752 1584 cmd.exe 37 PID 1584 wrote to memory of 2752 1584 cmd.exe 37 PID 1584 wrote to memory of 2688 1584 cmd.exe 38 PID 1584 wrote to memory of 2688 1584 cmd.exe 38 PID 1584 wrote to memory of 2688 1584 cmd.exe 38 PID 1584 wrote to memory of 2808 1584 cmd.exe 39 PID 1584 wrote to memory of 2808 1584 cmd.exe 39 PID 1584 wrote to memory of 2808 1584 cmd.exe 39 PID 1584 wrote to memory of 2692 1584 cmd.exe 40 PID 1584 wrote to memory of 2692 1584 cmd.exe 40 PID 1584 wrote to memory of 2692 1584 cmd.exe 40 PID 1584 wrote to memory of 2784 1584 cmd.exe 41 PID 1584 wrote to memory of 2784 1584 cmd.exe 41 PID 1584 wrote to memory of 2784 1584 cmd.exe 41 PID 1584 wrote to memory of 2940 1584 cmd.exe 42 PID 1584 wrote to memory of 2940 1584 cmd.exe 42 PID 1584 wrote to memory of 2940 1584 cmd.exe 42
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\HWID Spoofer\Cleaner.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\PING.EXEping localhost -n 32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1792
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im "EpicGamesLauncher.exe" /t /fi "status eq running"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im "FortniteLauncher.exe" /t /fi "status eq running"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im "FortniteClient-Win64-Shipping_BE.exe" /t /fi "status eq running"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im "FortniteClient-Win64-Shipping.exe" /t /fi "status eq running"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im "EasyAntiCheat.exe" /t /fi "status eq running"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak2⤵
- Delays execution with timeout.exe
PID:2808
-
-
C:\Windows\system32\PING.EXEping localhost -n 32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2692
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f2⤵PID:2784
-
-
C:\Windows\system32\PING.EXEping localhost -n 32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2940
-