Overview
overview
10Static
static
10Perm Spoof...er.exe
windows11-21h2-x64
1Perm Spoof...on.dll
windows11-21h2-x64
1Perm Spoof...ec.dll
windows11-21h2-x64
1Perm Spoofer/bz2.dll
windows11-21h2-x64
1Perm Spoof...ed.exe
windows11-21h2-x64
1Perm Spoof...F2.bat
windows11-21h2-x64
5Perm Spoof...ck.exe
windows11-21h2-x64
1Perm Spoof...hk.sys
windows11-21h2-x64
1Perm Spoof...DF.bat
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...sk.bat
windows11-21h2-x64
6Perm Spoof...ls.exe
windows11-21h2-x64
10Perm Spoof...4e.sys
windows11-21h2-x64
1Perm Spoof...ac.bat
windows11-21h2-x64
1Perm Spoof...ss.exe
windows11-21h2-x64
1Perm Spoof...64.exe
windows11-21h2-x64
1Perm Spoof...64.sys
windows11-21h2-x64
1Perm Spoof...pe.dll
windows11-21h2-x64
1Perm Spoof...16.dll
windows11-21h2-x64
1Perm Spoof...ed.exe
windows11-21h2-x64
1Perm Spoof...b1.dll
windows11-21h2-x64
1Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-10-2024 16:58
Behavioral task
behavioral1
Sample
Perm Spoofer/Perm Spoofer.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Perm Spoofer/brotlicommon.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Perm Spoofer/brotlidec.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Perm Spoofer/bz2.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Perm Spoofer/cracked.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Perm Spoofer/dumped files/ASUSPDF2.bat
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Perm Spoofer/dumped files/AsDeviceCheck.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Perm Spoofer/dumped files/AsDeviceChk.sys
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Perm Spoofer/dumped files/AsusPDF.bat
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Perm Spoofer/dumped files/afuefix64.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Perm Spoofer/dumped files/amideefix64.dll
Resource
win11-20241023-en
Behavioral task
behavioral12
Sample
Perm Spoofer/dumped files/bootx64.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Perm Spoofer/dumped files/disk.bat
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Perm Spoofer/dumped files/fixserials.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Perm Spoofer/dumped files/iqvw64e.sys
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Perm Spoofer/dumped files/mac.bat
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
Perm Spoofer/dumped files/tpmbypass.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Perm Spoofer/dumped files/winxsrcsv64.exe
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
Perm Spoofer/dumped files/winxsrcsv64.sys
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
Perm Spoofer/freetype.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Perm Spoofer/libpng16.dll
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Perm Spoofer/non cracked.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Perm Spoofer/zlib1.dll
Resource
win11-20241007-en
General
-
Target
Perm Spoofer/dumped files/ASUSPDF2.bat
-
Size
1KB
-
MD5
471cc43c13cb0d8919d28bb41eb5e23b
-
SHA1
cfcf0ad3d6b529443e50fe8d74150ddf5548597c
-
SHA256
42475a5efcf83ad7a824d3bebb7e66f21153209e7e8850d0d39164393a7bc608
-
SHA512
243cf363d9556b4ce479cf5dfabf2e11bdeb4257b2c0db27032b4bd55295228cad16bd95189f9368cd409ab8fed7bbc8e9bc4194d71615c63ac04781ee41aa51
Malware Config
Signatures
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 3452 timeout.exe 4616 timeout.exe 3424 timeout.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 4032 svchost.exe Token: SeIncreaseQuotaPrivilege 4032 svchost.exe Token: SeSecurityPrivilege 4032 svchost.exe Token: SeTakeOwnershipPrivilege 4032 svchost.exe Token: SeLoadDriverPrivilege 4032 svchost.exe Token: SeSystemtimePrivilege 4032 svchost.exe Token: SeBackupPrivilege 4032 svchost.exe Token: SeRestorePrivilege 4032 svchost.exe Token: SeShutdownPrivilege 4032 svchost.exe Token: SeSystemEnvironmentPrivilege 4032 svchost.exe Token: SeUndockPrivilege 4032 svchost.exe Token: SeManageVolumePrivilege 4032 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4032 svchost.exe Token: SeIncreaseQuotaPrivilege 4032 svchost.exe Token: SeSecurityPrivilege 4032 svchost.exe Token: SeTakeOwnershipPrivilege 4032 svchost.exe Token: SeLoadDriverPrivilege 4032 svchost.exe Token: SeSystemtimePrivilege 4032 svchost.exe Token: SeBackupPrivilege 4032 svchost.exe Token: SeRestorePrivilege 4032 svchost.exe Token: SeShutdownPrivilege 4032 svchost.exe Token: SeSystemEnvironmentPrivilege 4032 svchost.exe Token: SeUndockPrivilege 4032 svchost.exe Token: SeManageVolumePrivilege 4032 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4032 svchost.exe Token: SeIncreaseQuotaPrivilege 4032 svchost.exe Token: SeSecurityPrivilege 4032 svchost.exe Token: SeTakeOwnershipPrivilege 4032 svchost.exe Token: SeLoadDriverPrivilege 4032 svchost.exe Token: SeSystemtimePrivilege 4032 svchost.exe Token: SeBackupPrivilege 4032 svchost.exe Token: SeRestorePrivilege 4032 svchost.exe Token: SeShutdownPrivilege 4032 svchost.exe Token: SeSystemEnvironmentPrivilege 4032 svchost.exe Token: SeUndockPrivilege 4032 svchost.exe Token: SeManageVolumePrivilege 4032 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4032 svchost.exe Token: SeIncreaseQuotaPrivilege 4032 svchost.exe Token: SeSecurityPrivilege 4032 svchost.exe Token: SeTakeOwnershipPrivilege 4032 svchost.exe Token: SeLoadDriverPrivilege 4032 svchost.exe Token: SeSystemtimePrivilege 4032 svchost.exe Token: SeBackupPrivilege 4032 svchost.exe Token: SeRestorePrivilege 4032 svchost.exe Token: SeShutdownPrivilege 4032 svchost.exe Token: SeSystemEnvironmentPrivilege 4032 svchost.exe Token: SeUndockPrivilege 4032 svchost.exe Token: SeManageVolumePrivilege 4032 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4032 svchost.exe Token: SeIncreaseQuotaPrivilege 4032 svchost.exe Token: SeSecurityPrivilege 4032 svchost.exe Token: SeTakeOwnershipPrivilege 4032 svchost.exe Token: SeLoadDriverPrivilege 4032 svchost.exe Token: SeSystemtimePrivilege 4032 svchost.exe Token: SeBackupPrivilege 4032 svchost.exe Token: SeRestorePrivilege 4032 svchost.exe Token: SeShutdownPrivilege 4032 svchost.exe Token: SeSystemEnvironmentPrivilege 4032 svchost.exe Token: SeUndockPrivilege 4032 svchost.exe Token: SeManageVolumePrivilege 4032 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4032 svchost.exe Token: SeIncreaseQuotaPrivilege 4032 svchost.exe Token: SeSecurityPrivilege 4032 svchost.exe Token: SeTakeOwnershipPrivilege 4032 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2036 2216 cmd.exe 78 PID 2216 wrote to memory of 2036 2216 cmd.exe 78 PID 2216 wrote to memory of 3424 2216 cmd.exe 79 PID 2216 wrote to memory of 3424 2216 cmd.exe 79 PID 2216 wrote to memory of 3452 2216 cmd.exe 80 PID 2216 wrote to memory of 3452 2216 cmd.exe 80 PID 2216 wrote to memory of 4472 2216 cmd.exe 81 PID 2216 wrote to memory of 4472 2216 cmd.exe 81 PID 4472 wrote to memory of 1856 4472 net.exe 82 PID 4472 wrote to memory of 1856 4472 net.exe 82 PID 2216 wrote to memory of 4616 2216 cmd.exe 83 PID 2216 wrote to memory of 4616 2216 cmd.exe 83 PID 2216 wrote to memory of 4792 2216 cmd.exe 84 PID 2216 wrote to memory of 4792 2216 cmd.exe 84 PID 4792 wrote to memory of 2300 4792 net.exe 85 PID 4792 wrote to memory of 2300 4792 net.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\ASUSPDF2.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:2036
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:3424
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:3452
-
-
C:\Windows\system32\net.exenet stop winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵PID:1856
-
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak2⤵
- Delays execution with timeout.exe
PID:4616
-
-
C:\Windows\system32\net.exenet start winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start winmgmt /y3⤵PID:2300
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4032