Analysis
-
max time kernel
25s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 22:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Perm Spoofer.exe
Resource
win7-20240704-en
8 signatures
150 seconds
General
-
Target
Perm Spoofer.exe
-
Size
28.1MB
-
MD5
6d580b009bd7e0c1d5d2e1da54191743
-
SHA1
4e3568f77dfb112c6a30c9f04fece99b0a219153
-
SHA256
33db059ad0344af99a91e5dc4645b4ed21f6476301dbcdd9b7938fa9f5b240fa
-
SHA512
2e7b119a035295da2a1c666f6b4d1c2de1cc2aaf2392dc4c4f76bb4edef74022902b50b539aa26a0c035c7f4d87442dc498236a37ea50e5a7408af355bad0325
-
SSDEEP
786432:DEpTc844UEVZOh3yWhcs8sCir3G9uyRpwn3uY4dws:4S8WlinvU3yu+E3p7s
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Perm Spoofer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Perm Spoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Perm Spoofer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Perm Spoofer.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2444} Perm Spoofer.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Perm Spoofer.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Perm Spoofer.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2869} Perm Spoofer.exe File opened for modification C:\Windows\System32\IME\IMETC\{69CD1F2D-DF68-4E23-9108-1B70783F2879} Perm Spoofer.exe File opened for modification C:\Windows\System32\config\RegBack\{69CD1F2D-DF68-4E23-9108-1B70783F2899} Perm Spoofer.exe File opened for modification C:\Windows\System32\config\RegBack\{ASUS} Perm Spoofer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2276 Perm Spoofer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2892} Perm Spoofer.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2859} Perm Spoofer.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-UPDATE} Perm Spoofer.exe File opened for modification C:\Windows\schemas\Provisioning\{69CD1F2D-DF68-4E23-9108-1B70783F2893} Perm Spoofer.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe 2276 Perm Spoofer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2932 2276 Perm Spoofer.exe 31 PID 2276 wrote to memory of 2932 2276 Perm Spoofer.exe 31 PID 2276 wrote to memory of 2932 2276 Perm Spoofer.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Perm Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Perm Spoofer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:2932
-