Overview
overview
10Static
static
10Perm Spoof...er.exe
windows7-x64
1Perm Spoof...er.exe
windows10-2004-x64
1Perm Spoof...on.dll
windows7-x64
1Perm Spoof...on.dll
windows10-2004-x64
1Perm Spoof...ec.dll
windows7-x64
1Perm Spoof...ec.dll
windows10-2004-x64
1Perm Spoofer/bz2.dll
windows7-x64
1Perm Spoofer/bz2.dll
windows10-2004-x64
1Perm Spoof...ed.exe
windows7-x64
1Perm Spoof...ed.exe
windows10-2004-x64
1Perm Spoof...F2.bat
windows7-x64
1Perm Spoof...F2.bat
windows10-2004-x64
5Perm Spoof...ck.exe
windows7-x64
1Perm Spoof...ck.exe
windows10-2004-x64
1Perm Spoof...hk.sys
windows10-2004-x64
1Perm Spoof...DF.bat
windows7-x64
1Perm Spoof...DF.bat
windows10-2004-x64
1Perm Spoof...64.dll
windows7-x64
1Perm Spoof...64.dll
windows10-2004-x64
1Perm Spoof...64.dll
windows7-x64
1Perm Spoof...64.dll
windows10-2004-x64
1Perm Spoof...64.dll
windows7-x64
1Perm Spoof...64.dll
windows10-2004-x64
1Perm Spoof...sk.bat
windows7-x64
1Perm Spoof...sk.bat
windows10-2004-x64
6Perm Spoof...ls.exe
windows7-x64
10Perm Spoof...ls.exe
windows10-2004-x64
10Perm Spoof...4e.sys
windows10-2004-x64
1Perm Spoof...ac.bat
windows7-x64
3Perm Spoof...ac.bat
windows10-2004-x64
3Perm Spoof...ss.exe
windows7-x64
1Perm Spoof...ss.exe
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 08:38
Behavioral task
behavioral1
Sample
Perm Spoofer/Perm Spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Perm Spoofer/Perm Spoofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Perm Spoofer/brotlicommon.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Perm Spoofer/brotlicommon.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Perm Spoofer/brotlidec.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Perm Spoofer/brotlidec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Perm Spoofer/bz2.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Perm Spoofer/bz2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Perm Spoofer/cracked.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Perm Spoofer/cracked.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Perm Spoofer/dumped files/ASUSPDF2.bat
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Perm Spoofer/dumped files/ASUSPDF2.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Perm Spoofer/dumped files/AsDeviceCheck.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Perm Spoofer/dumped files/AsDeviceCheck.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Perm Spoofer/dumped files/AsDeviceChk.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Perm Spoofer/dumped files/AsusPDF.bat
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
Perm Spoofer/dumped files/AsusPDF.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
Perm Spoofer/dumped files/afuefix64.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
Perm Spoofer/dumped files/afuefix64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
Perm Spoofer/dumped files/amideefix64.dll
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
Perm Spoofer/dumped files/amideefix64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
Perm Spoofer/dumped files/bootx64.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
Perm Spoofer/dumped files/bootx64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
Perm Spoofer/dumped files/disk.bat
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
Perm Spoofer/dumped files/disk.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
Perm Spoofer/dumped files/fixserials.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
Perm Spoofer/dumped files/fixserials.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
Perm Spoofer/dumped files/iqvw64e.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Perm Spoofer/dumped files/mac.bat
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
Perm Spoofer/dumped files/mac.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Perm Spoofer/dumped files/tpmbypass.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
Perm Spoofer/dumped files/tpmbypass.exe
Resource
win10v2004-20241007-en
General
-
Target
Perm Spoofer/dumped files/ASUSPDF2.bat
-
Size
1KB
-
MD5
471cc43c13cb0d8919d28bb41eb5e23b
-
SHA1
cfcf0ad3d6b529443e50fe8d74150ddf5548597c
-
SHA256
42475a5efcf83ad7a824d3bebb7e66f21153209e7e8850d0d39164393a7bc608
-
SHA512
243cf363d9556b4ce479cf5dfabf2e11bdeb4257b2c0db27032b4bd55295228cad16bd95189f9368cd409ab8fed7bbc8e9bc4194d71615c63ac04781ee41aa51
Malware Config
Signatures
-
Drops file in System32 directory 7 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe -
Delays execution with timeout.exe 3 IoCs
Processes:
timeout.exetimeout.exetimeout.exepid process 4104 timeout.exe 1740 timeout.exe 3084 timeout.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exedescription pid process Token: SeAssignPrimaryTokenPrivilege 3600 svchost.exe Token: SeIncreaseQuotaPrivilege 3600 svchost.exe Token: SeSecurityPrivilege 3600 svchost.exe Token: SeTakeOwnershipPrivilege 3600 svchost.exe Token: SeLoadDriverPrivilege 3600 svchost.exe Token: SeSystemtimePrivilege 3600 svchost.exe Token: SeBackupPrivilege 3600 svchost.exe Token: SeRestorePrivilege 3600 svchost.exe Token: SeShutdownPrivilege 3600 svchost.exe Token: SeSystemEnvironmentPrivilege 3600 svchost.exe Token: SeUndockPrivilege 3600 svchost.exe Token: SeManageVolumePrivilege 3600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3600 svchost.exe Token: SeIncreaseQuotaPrivilege 3600 svchost.exe Token: SeSecurityPrivilege 3600 svchost.exe Token: SeTakeOwnershipPrivilege 3600 svchost.exe Token: SeLoadDriverPrivilege 3600 svchost.exe Token: SeSystemtimePrivilege 3600 svchost.exe Token: SeBackupPrivilege 3600 svchost.exe Token: SeRestorePrivilege 3600 svchost.exe Token: SeShutdownPrivilege 3600 svchost.exe Token: SeSystemEnvironmentPrivilege 3600 svchost.exe Token: SeUndockPrivilege 3600 svchost.exe Token: SeManageVolumePrivilege 3600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3600 svchost.exe Token: SeIncreaseQuotaPrivilege 3600 svchost.exe Token: SeSecurityPrivilege 3600 svchost.exe Token: SeTakeOwnershipPrivilege 3600 svchost.exe Token: SeLoadDriverPrivilege 3600 svchost.exe Token: SeSystemtimePrivilege 3600 svchost.exe Token: SeBackupPrivilege 3600 svchost.exe Token: SeRestorePrivilege 3600 svchost.exe Token: SeShutdownPrivilege 3600 svchost.exe Token: SeSystemEnvironmentPrivilege 3600 svchost.exe Token: SeUndockPrivilege 3600 svchost.exe Token: SeManageVolumePrivilege 3600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3600 svchost.exe Token: SeIncreaseQuotaPrivilege 3600 svchost.exe Token: SeSecurityPrivilege 3600 svchost.exe Token: SeTakeOwnershipPrivilege 3600 svchost.exe Token: SeLoadDriverPrivilege 3600 svchost.exe Token: SeBackupPrivilege 3600 svchost.exe Token: SeRestorePrivilege 3600 svchost.exe Token: SeShutdownPrivilege 3600 svchost.exe Token: SeSystemEnvironmentPrivilege 3600 svchost.exe Token: SeManageVolumePrivilege 3600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3600 svchost.exe Token: SeIncreaseQuotaPrivilege 3600 svchost.exe Token: SeSecurityPrivilege 3600 svchost.exe Token: SeTakeOwnershipPrivilege 3600 svchost.exe Token: SeLoadDriverPrivilege 3600 svchost.exe Token: SeSystemtimePrivilege 3600 svchost.exe Token: SeBackupPrivilege 3600 svchost.exe Token: SeRestorePrivilege 3600 svchost.exe Token: SeShutdownPrivilege 3600 svchost.exe Token: SeSystemEnvironmentPrivilege 3600 svchost.exe Token: SeUndockPrivilege 3600 svchost.exe Token: SeManageVolumePrivilege 3600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3600 svchost.exe Token: SeIncreaseQuotaPrivilege 3600 svchost.exe Token: SeSecurityPrivilege 3600 svchost.exe Token: SeTakeOwnershipPrivilege 3600 svchost.exe Token: SeLoadDriverPrivilege 3600 svchost.exe Token: SeSystemtimePrivilege 3600 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
cmd.exenet.exenet.exedescription pid process target process PID 1944 wrote to memory of 1168 1944 cmd.exe cacls.exe PID 1944 wrote to memory of 1168 1944 cmd.exe cacls.exe PID 1944 wrote to memory of 4104 1944 cmd.exe timeout.exe PID 1944 wrote to memory of 4104 1944 cmd.exe timeout.exe PID 1944 wrote to memory of 1740 1944 cmd.exe timeout.exe PID 1944 wrote to memory of 1740 1944 cmd.exe timeout.exe PID 1944 wrote to memory of 372 1944 cmd.exe net.exe PID 1944 wrote to memory of 372 1944 cmd.exe net.exe PID 372 wrote to memory of 2116 372 net.exe net1.exe PID 372 wrote to memory of 2116 372 net.exe net1.exe PID 1944 wrote to memory of 3084 1944 cmd.exe timeout.exe PID 1944 wrote to memory of 3084 1944 cmd.exe timeout.exe PID 1944 wrote to memory of 3164 1944 cmd.exe net.exe PID 1944 wrote to memory of 3164 1944 cmd.exe net.exe PID 3164 wrote to memory of 4320 3164 net.exe net1.exe PID 3164 wrote to memory of 4320 3164 net.exe net1.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\ASUSPDF2.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:1168
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4104
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:1740
-
-
C:\Windows\system32\net.exenet stop winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵PID:2116
-
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak2⤵
- Delays execution with timeout.exe
PID:3084
-
-
C:\Windows\system32\net.exenet start winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start winmgmt /y3⤵PID:4320
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3600