Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Perm Spoof...er.exe
windows11-21h2-x64
1Perm Spoof...on.dll
windows11-21h2-x64
1Perm Spoof...ec.dll
windows11-21h2-x64
1Perm Spoofer/bz2.dll
windows11-21h2-x64
1Perm Spoof...ed.exe
windows11-21h2-x64
1Perm Spoof...F2.bat
windows11-21h2-x64
5Perm Spoof...ck.exe
windows11-21h2-x64
1Perm Spoof...hk.sys
windows11-21h2-x64
1Perm Spoof...DF.bat
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...64.dll
windows11-21h2-x64
1Perm Spoof...sk.bat
windows11-21h2-x64
6Perm Spoof...ls.exe
windows11-21h2-x64
10Perm Spoof...4e.sys
windows11-21h2-x64
1Perm Spoof...ac.bat
windows11-21h2-x64
1Perm Spoof...ss.exe
windows11-21h2-x64
1Perm Spoof...64.exe
windows11-21h2-x64
1Perm Spoof...64.sys
windows11-21h2-x64
1Perm Spoof...pe.dll
windows11-21h2-x64
1Perm Spoof...16.dll
windows11-21h2-x64
1Perm Spoof...ed.exe
windows11-21h2-x64
1Perm Spoof...b1.dll
windows11-21h2-x64
1Resubmissions
13/11/2024, 20:39
241113-zfjhksygpp 10Analysis
-
max time kernel
89s -
max time network
98s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/11/2024, 20:39
Behavioral task
behavioral1
Sample
Perm Spoofer/Perm Spoofer.exe
Resource
win11-20241023-en
Behavioral task
behavioral2
Sample
Perm Spoofer/brotlicommon.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Perm Spoofer/brotlidec.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Perm Spoofer/bz2.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Perm Spoofer/cracked.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Perm Spoofer/dumped files/ASUSPDF2.bat
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Perm Spoofer/dumped files/AsDeviceCheck.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Perm Spoofer/dumped files/AsDeviceChk.sys
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Perm Spoofer/dumped files/AsusPDF.bat
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Perm Spoofer/dumped files/afuefix64.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Perm Spoofer/dumped files/amideefix64.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Perm Spoofer/dumped files/bootx64.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Perm Spoofer/dumped files/disk.bat
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Perm Spoofer/dumped files/fixserials.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Perm Spoofer/dumped files/iqvw64e.sys
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Perm Spoofer/dumped files/mac.bat
Resource
win11-20241023-en
Behavioral task
behavioral17
Sample
Perm Spoofer/dumped files/tpmbypass.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Perm Spoofer/dumped files/winxsrcsv64.exe
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
Perm Spoofer/dumped files/winxsrcsv64.sys
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
Perm Spoofer/freetype.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Perm Spoofer/libpng16.dll
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Perm Spoofer/non cracked.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Perm Spoofer/zlib1.dll
Resource
win11-20241007-en
General
-
Target
Perm Spoofer/dumped files/ASUSPDF2.bat
-
Size
1KB
-
MD5
471cc43c13cb0d8919d28bb41eb5e23b
-
SHA1
cfcf0ad3d6b529443e50fe8d74150ddf5548597c
-
SHA256
42475a5efcf83ad7a824d3bebb7e66f21153209e7e8850d0d39164393a7bc608
-
SHA512
243cf363d9556b4ce479cf5dfabf2e11bdeb4257b2c0db27032b4bd55295228cad16bd95189f9368cd409ab8fed7bbc8e9bc4194d71615c63ac04781ee41aa51
Malware Config
Signatures
-
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\wbem\repository svchost.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA svchost.exe File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR svchost.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 3036 timeout.exe 4076 timeout.exe 4248 timeout.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 1724 svchost.exe Token: SeIncreaseQuotaPrivilege 1724 svchost.exe Token: SeSecurityPrivilege 1724 svchost.exe Token: SeTakeOwnershipPrivilege 1724 svchost.exe Token: SeLoadDriverPrivilege 1724 svchost.exe Token: SeSystemtimePrivilege 1724 svchost.exe Token: SeBackupPrivilege 1724 svchost.exe Token: SeRestorePrivilege 1724 svchost.exe Token: SeShutdownPrivilege 1724 svchost.exe Token: SeSystemEnvironmentPrivilege 1724 svchost.exe Token: SeUndockPrivilege 1724 svchost.exe Token: SeManageVolumePrivilege 1724 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1724 svchost.exe Token: SeIncreaseQuotaPrivilege 1724 svchost.exe Token: SeSecurityPrivilege 1724 svchost.exe Token: SeTakeOwnershipPrivilege 1724 svchost.exe Token: SeLoadDriverPrivilege 1724 svchost.exe Token: SeSystemtimePrivilege 1724 svchost.exe Token: SeBackupPrivilege 1724 svchost.exe Token: SeRestorePrivilege 1724 svchost.exe Token: SeShutdownPrivilege 1724 svchost.exe Token: SeSystemEnvironmentPrivilege 1724 svchost.exe Token: SeUndockPrivilege 1724 svchost.exe Token: SeManageVolumePrivilege 1724 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1724 svchost.exe Token: SeIncreaseQuotaPrivilege 1724 svchost.exe Token: SeSecurityPrivilege 1724 svchost.exe Token: SeTakeOwnershipPrivilege 1724 svchost.exe Token: SeLoadDriverPrivilege 1724 svchost.exe Token: SeSystemtimePrivilege 1724 svchost.exe Token: SeBackupPrivilege 1724 svchost.exe Token: SeRestorePrivilege 1724 svchost.exe Token: SeShutdownPrivilege 1724 svchost.exe Token: SeSystemEnvironmentPrivilege 1724 svchost.exe Token: SeUndockPrivilege 1724 svchost.exe Token: SeManageVolumePrivilege 1724 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1724 svchost.exe Token: SeIncreaseQuotaPrivilege 1724 svchost.exe Token: SeSecurityPrivilege 1724 svchost.exe Token: SeTakeOwnershipPrivilege 1724 svchost.exe Token: SeLoadDriverPrivilege 1724 svchost.exe Token: SeSystemtimePrivilege 1724 svchost.exe Token: SeBackupPrivilege 1724 svchost.exe Token: SeRestorePrivilege 1724 svchost.exe Token: SeShutdownPrivilege 1724 svchost.exe Token: SeSystemEnvironmentPrivilege 1724 svchost.exe Token: SeUndockPrivilege 1724 svchost.exe Token: SeManageVolumePrivilege 1724 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1724 svchost.exe Token: SeIncreaseQuotaPrivilege 1724 svchost.exe Token: SeSecurityPrivilege 1724 svchost.exe Token: SeTakeOwnershipPrivilege 1724 svchost.exe Token: SeLoadDriverPrivilege 1724 svchost.exe Token: SeSystemtimePrivilege 1724 svchost.exe Token: SeBackupPrivilege 1724 svchost.exe Token: SeRestorePrivilege 1724 svchost.exe Token: SeShutdownPrivilege 1724 svchost.exe Token: SeSystemEnvironmentPrivilege 1724 svchost.exe Token: SeUndockPrivilege 1724 svchost.exe Token: SeManageVolumePrivilege 1724 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1724 svchost.exe Token: SeIncreaseQuotaPrivilege 1724 svchost.exe Token: SeSecurityPrivilege 1724 svchost.exe Token: SeTakeOwnershipPrivilege 1724 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3380 wrote to memory of 3928 3380 cmd.exe 81 PID 3380 wrote to memory of 3928 3380 cmd.exe 81 PID 3380 wrote to memory of 3036 3380 cmd.exe 82 PID 3380 wrote to memory of 3036 3380 cmd.exe 82 PID 3380 wrote to memory of 4076 3380 cmd.exe 83 PID 3380 wrote to memory of 4076 3380 cmd.exe 83 PID 3380 wrote to memory of 2516 3380 cmd.exe 85 PID 3380 wrote to memory of 2516 3380 cmd.exe 85 PID 2516 wrote to memory of 2924 2516 net.exe 86 PID 2516 wrote to memory of 2924 2516 net.exe 86 PID 3380 wrote to memory of 4248 3380 cmd.exe 87 PID 3380 wrote to memory of 4248 3380 cmd.exe 87 PID 3380 wrote to memory of 1128 3380 cmd.exe 88 PID 3380 wrote to memory of 1128 3380 cmd.exe 88 PID 1128 wrote to memory of 2352 1128 net.exe 89 PID 1128 wrote to memory of 2352 1128 net.exe 89
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\ASUSPDF2.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:3928
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:3036
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4076
-
-
C:\Windows\system32\net.exenet stop winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵PID:2924
-
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak2⤵
- Delays execution with timeout.exe
PID:4248
-
-
C:\Windows\system32\net.exenet start winmgmt /y2⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start winmgmt /y3⤵PID:2352
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1724