Overview
overview
10Static
static
10Perm Spoof...er.exe
windows11-21h2-x64
1Perm Spoof...on.dll
windows11-21h2-x64
1Perm Spoof...ec.dll
windows11-21h2-x64
1Perm Spoofer/bz2.dll
windows11-21h2-x64
1Perm Spoof...ed.exe
windows11-21h2-x64
1Perm Spoof...F2.bat
windows11-21h2-x64
5Perm Spoof...ck.exe
windows11-21h2-x64
1Perm Spoof...hk.sys
windows11-21h2-x64
1Perm Spoof...DF.bat
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...sk.bat
windows11-21h2-x64
6Perm Spoof...ls.exe
windows11-21h2-x64
10Perm Spoof...4e.sys
windows11-21h2-x64
1Perm Spoof...ac.bat
windows11-21h2-x64
1Perm Spoof...ss.exe
windows11-21h2-x64
1Perm Spoof...64.exe
windows11-21h2-x64
1Perm Spoof...64.sys
windows11-21h2-x64
1Perm Spoof...pe.dll
windows11-21h2-x64
1Perm Spoof...16.dll
windows11-21h2-x64
1Perm Spoof...ed.exe
windows11-21h2-x64
1Perm Spoof...b1.dll
windows11-21h2-x64
1Resubmissions
13-11-2024 20:39
241113-zfjhksygpp 10Analysis
-
max time kernel
1s -
max time network
14s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-11-2024 20:39
Behavioral task
behavioral1
Sample
Perm Spoofer/Perm Spoofer.exe
Resource
win11-20241023-en
Behavioral task
behavioral2
Sample
Perm Spoofer/brotlicommon.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Perm Spoofer/brotlidec.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Perm Spoofer/bz2.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Perm Spoofer/cracked.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Perm Spoofer/dumped files/ASUSPDF2.bat
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Perm Spoofer/dumped files/AsDeviceCheck.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Perm Spoofer/dumped files/AsDeviceChk.sys
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Perm Spoofer/dumped files/AsusPDF.bat
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Perm Spoofer/dumped files/afuefix64.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Perm Spoofer/dumped files/amideefix64.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Perm Spoofer/dumped files/bootx64.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Perm Spoofer/dumped files/disk.bat
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Perm Spoofer/dumped files/fixserials.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Perm Spoofer/dumped files/iqvw64e.sys
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Perm Spoofer/dumped files/mac.bat
Resource
win11-20241023-en
Behavioral task
behavioral17
Sample
Perm Spoofer/dumped files/tpmbypass.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Perm Spoofer/dumped files/winxsrcsv64.exe
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
Perm Spoofer/dumped files/winxsrcsv64.sys
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
Perm Spoofer/freetype.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Perm Spoofer/libpng16.dll
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Perm Spoofer/non cracked.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Perm Spoofer/zlib1.dll
Resource
win11-20241007-en
General
-
Target
Perm Spoofer/dumped files/mac.bat
-
Size
1KB
-
MD5
707c798832f76eb383a0501b2773ec32
-
SHA1
3ebd0413af9929109ea0eb0045a2d26a256e771f
-
SHA256
940f3e68e62ad73c0668e854d821d88eacc8ea8fb8e130e42a34368ae9f5852e
-
SHA512
13e92ef958cfcc5686a2886b4a011f2287ec261028db0c6816d738eb715490d69ca37f8232e7bb3bebd5d49ce65bf4b9f55ae12d4af056bf569e5a1dba2f3da9
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 416 WMIC.exe Token: SeSecurityPrivilege 416 WMIC.exe Token: SeTakeOwnershipPrivilege 416 WMIC.exe Token: SeLoadDriverPrivilege 416 WMIC.exe Token: SeSystemProfilePrivilege 416 WMIC.exe Token: SeSystemtimePrivilege 416 WMIC.exe Token: SeProfSingleProcessPrivilege 416 WMIC.exe Token: SeIncBasePriorityPrivilege 416 WMIC.exe Token: SeCreatePagefilePrivilege 416 WMIC.exe Token: SeBackupPrivilege 416 WMIC.exe Token: SeRestorePrivilege 416 WMIC.exe Token: SeShutdownPrivilege 416 WMIC.exe Token: SeDebugPrivilege 416 WMIC.exe Token: SeSystemEnvironmentPrivilege 416 WMIC.exe Token: SeRemoteShutdownPrivilege 416 WMIC.exe Token: SeUndockPrivilege 416 WMIC.exe Token: SeManageVolumePrivilege 416 WMIC.exe Token: 33 416 WMIC.exe Token: 34 416 WMIC.exe Token: 35 416 WMIC.exe Token: 36 416 WMIC.exe Token: SeIncreaseQuotaPrivilege 416 WMIC.exe Token: SeSecurityPrivilege 416 WMIC.exe Token: SeTakeOwnershipPrivilege 416 WMIC.exe Token: SeLoadDriverPrivilege 416 WMIC.exe Token: SeSystemProfilePrivilege 416 WMIC.exe Token: SeSystemtimePrivilege 416 WMIC.exe Token: SeProfSingleProcessPrivilege 416 WMIC.exe Token: SeIncBasePriorityPrivilege 416 WMIC.exe Token: SeCreatePagefilePrivilege 416 WMIC.exe Token: SeBackupPrivilege 416 WMIC.exe Token: SeRestorePrivilege 416 WMIC.exe Token: SeShutdownPrivilege 416 WMIC.exe Token: SeDebugPrivilege 416 WMIC.exe Token: SeSystemEnvironmentPrivilege 416 WMIC.exe Token: SeRemoteShutdownPrivilege 416 WMIC.exe Token: SeUndockPrivilege 416 WMIC.exe Token: SeManageVolumePrivilege 416 WMIC.exe Token: 33 416 WMIC.exe Token: 34 416 WMIC.exe Token: 35 416 WMIC.exe Token: 36 416 WMIC.exe Token: SeIncreaseQuotaPrivilege 4756 WMIC.exe Token: SeSecurityPrivilege 4756 WMIC.exe Token: SeTakeOwnershipPrivilege 4756 WMIC.exe Token: SeLoadDriverPrivilege 4756 WMIC.exe Token: SeSystemProfilePrivilege 4756 WMIC.exe Token: SeSystemtimePrivilege 4756 WMIC.exe Token: SeProfSingleProcessPrivilege 4756 WMIC.exe Token: SeIncBasePriorityPrivilege 4756 WMIC.exe Token: SeCreatePagefilePrivilege 4756 WMIC.exe Token: SeBackupPrivilege 4756 WMIC.exe Token: SeRestorePrivilege 4756 WMIC.exe Token: SeShutdownPrivilege 4756 WMIC.exe Token: SeDebugPrivilege 4756 WMIC.exe Token: SeSystemEnvironmentPrivilege 4756 WMIC.exe Token: SeRemoteShutdownPrivilege 4756 WMIC.exe Token: SeUndockPrivilege 4756 WMIC.exe Token: SeManageVolumePrivilege 4756 WMIC.exe Token: 33 4756 WMIC.exe Token: 34 4756 WMIC.exe Token: 35 4756 WMIC.exe Token: 36 4756 WMIC.exe Token: SeIncreaseQuotaPrivilege 4756 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.execmd.execmd.execmd.exedescription pid process target process PID 3100 wrote to memory of 4828 3100 cmd.exe cmd.exe PID 3100 wrote to memory of 4828 3100 cmd.exe cmd.exe PID 4828 wrote to memory of 416 4828 cmd.exe WMIC.exe PID 4828 wrote to memory of 416 4828 cmd.exe WMIC.exe PID 4828 wrote to memory of 872 4828 cmd.exe findstr.exe PID 4828 wrote to memory of 872 4828 cmd.exe findstr.exe PID 3100 wrote to memory of 252 3100 cmd.exe reg.exe PID 3100 wrote to memory of 252 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1784 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1784 3100 cmd.exe reg.exe PID 3100 wrote to memory of 3468 3100 cmd.exe reg.exe PID 3100 wrote to memory of 3468 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1300 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1300 3100 cmd.exe reg.exe PID 3100 wrote to memory of 4444 3100 cmd.exe cmd.exe PID 3100 wrote to memory of 4444 3100 cmd.exe cmd.exe PID 4444 wrote to memory of 4756 4444 cmd.exe WMIC.exe PID 4444 wrote to memory of 4756 4444 cmd.exe WMIC.exe PID 4444 wrote to memory of 2068 4444 cmd.exe findstr.exe PID 4444 wrote to memory of 2068 4444 cmd.exe findstr.exe PID 3100 wrote to memory of 1532 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1532 3100 cmd.exe reg.exe PID 3100 wrote to memory of 3916 3100 cmd.exe reg.exe PID 3100 wrote to memory of 3916 3100 cmd.exe reg.exe PID 3100 wrote to memory of 2836 3100 cmd.exe reg.exe PID 3100 wrote to memory of 2836 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1496 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1496 3100 cmd.exe reg.exe PID 3100 wrote to memory of 4220 3100 cmd.exe cmd.exe PID 3100 wrote to memory of 4220 3100 cmd.exe cmd.exe PID 4220 wrote to memory of 4248 4220 cmd.exe WMIC.exe PID 4220 wrote to memory of 4248 4220 cmd.exe WMIC.exe PID 3100 wrote to memory of 4828 3100 cmd.exe cmd.exe PID 3100 wrote to memory of 4828 3100 cmd.exe cmd.exe PID 4828 wrote to memory of 416 4828 cmd.exe WMIC.exe PID 4828 wrote to memory of 416 4828 cmd.exe WMIC.exe PID 4828 wrote to memory of 872 4828 cmd.exe findstr.exe PID 4828 wrote to memory of 872 4828 cmd.exe findstr.exe PID 3100 wrote to memory of 252 3100 cmd.exe reg.exe PID 3100 wrote to memory of 252 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1784 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1784 3100 cmd.exe reg.exe PID 3100 wrote to memory of 3468 3100 cmd.exe reg.exe PID 3100 wrote to memory of 3468 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1300 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1300 3100 cmd.exe reg.exe PID 3100 wrote to memory of 4444 3100 cmd.exe cmd.exe PID 3100 wrote to memory of 4444 3100 cmd.exe cmd.exe PID 4444 wrote to memory of 4756 4444 cmd.exe WMIC.exe PID 4444 wrote to memory of 4756 4444 cmd.exe WMIC.exe PID 4444 wrote to memory of 2068 4444 cmd.exe findstr.exe PID 4444 wrote to memory of 2068 4444 cmd.exe findstr.exe PID 3100 wrote to memory of 1532 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1532 3100 cmd.exe reg.exe PID 3100 wrote to memory of 3916 3100 cmd.exe reg.exe PID 3100 wrote to memory of 3916 3100 cmd.exe reg.exe PID 3100 wrote to memory of 2836 3100 cmd.exe reg.exe PID 3100 wrote to memory of 2836 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1496 3100 cmd.exe reg.exe PID 3100 wrote to memory of 1496 3100 cmd.exe reg.exe PID 3100 wrote to memory of 4220 3100 cmd.exe cmd.exe PID 3100 wrote to memory of 4220 3100 cmd.exe cmd.exe PID 4220 wrote to memory of 4248 4220 cmd.exe WMIC.exe PID 4220 wrote to memory of 4248 4220 cmd.exe WMIC.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\mac.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]2⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\System32\Wbem\WMIC.exewmic nic where physicaladapter=true get deviceid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:416
-
-
C:\Windows\system32\findstr.exefindstr [0-9]3⤵PID:872
-
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\012⤵PID:252
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0012⤵PID:1784
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\00012⤵PID:3468
-
-
C:\Windows\system32\reg.exeREG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001 /v NetworkAddress /t REG_SZ /d 322E47E31236 /f2⤵PID:1300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic nic where physicaladapter=true get deviceid | findstr [0-9]2⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\System32\Wbem\WMIC.exewmic nic where physicaladapter=true get deviceid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Windows\system32\findstr.exefindstr [0-9]3⤵PID:2068
-
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\012⤵PID:1532
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0012⤵PID:3916
-
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\00012⤵PID:2836
-
-
C:\Windows\system32\reg.exeREG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0001 /v PnPCapabilities /t REG_DWORD /d 24 /f2⤵PID:1496
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv"2⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\System32\Wbem\WMIC.exewmic nic where (netconnectionid like '%') get netconnectionid,netconnectionstatus /format:csv3⤵PID:4248
-
-
-
C:\Windows\system32\netsh.exenetsh interface set interface name="Ethernet" disable2⤵PID:4552
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵PID:3472