Overview
overview
10Static
static
10Perm Spoof...er.exe
windows7-x64
1Perm Spoof...er.exe
windows10-2004-x64
1Perm Spoof...on.dll
windows7-x64
1Perm Spoof...on.dll
windows10-2004-x64
1Perm Spoof...ec.dll
windows7-x64
1Perm Spoof...ec.dll
windows10-2004-x64
1Perm Spoofer/bz2.dll
windows7-x64
1Perm Spoofer/bz2.dll
windows10-2004-x64
1Perm Spoof...ed.exe
windows7-x64
1Perm Spoof...ed.exe
windows10-2004-x64
1Perm Spoof...F2.bat
windows7-x64
1Perm Spoof...F2.bat
windows10-2004-x64
5Perm Spoof...ck.exe
windows7-x64
1Perm Spoof...ck.exe
windows10-2004-x64
1Perm Spoof...hk.sys
windows10-2004-x64
1Perm Spoof...DF.bat
windows7-x64
1Perm Spoof...DF.bat
windows10-2004-x64
1Perm Spoof...64.dll
windows7-x64
1Perm Spoof...64.dll
windows10-2004-x64
1Perm Spoof...64.dll
windows7-x64
1Perm Spoof...64.dll
windows10-2004-x64
1Perm Spoof...64.dll
windows7-x64
1Perm Spoof...64.dll
windows10-2004-x64
1Perm Spoof...sk.bat
windows7-x64
1Perm Spoof...sk.bat
windows10-2004-x64
6Perm Spoof...ls.exe
windows7-x64
10Perm Spoof...ls.exe
windows10-2004-x64
10Perm Spoof...4e.sys
windows10-2004-x64
1Perm Spoof...ac.bat
windows7-x64
3Perm Spoof...ac.bat
windows10-2004-x64
1Perm Spoof...ss.exe
windows7-x64
1Perm Spoof...ss.exe
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 20:45
Behavioral task
behavioral1
Sample
Perm Spoofer/Perm Spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Perm Spoofer/Perm Spoofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Perm Spoofer/brotlicommon.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Perm Spoofer/brotlicommon.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Perm Spoofer/brotlidec.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Perm Spoofer/brotlidec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Perm Spoofer/bz2.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Perm Spoofer/bz2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Perm Spoofer/cracked.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Perm Spoofer/cracked.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Perm Spoofer/dumped files/ASUSPDF2.bat
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Perm Spoofer/dumped files/ASUSPDF2.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Perm Spoofer/dumped files/AsDeviceCheck.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Perm Spoofer/dumped files/AsDeviceCheck.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Perm Spoofer/dumped files/AsDeviceChk.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Perm Spoofer/dumped files/AsusPDF.bat
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
Perm Spoofer/dumped files/AsusPDF.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
Perm Spoofer/dumped files/afuefix64.dll
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
Perm Spoofer/dumped files/afuefix64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
Perm Spoofer/dumped files/amideefix64.dll
Resource
win7-20241023-en
Behavioral task
behavioral21
Sample
Perm Spoofer/dumped files/amideefix64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
Perm Spoofer/dumped files/bootx64.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
Perm Spoofer/dumped files/bootx64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
Perm Spoofer/dumped files/disk.bat
Resource
win7-20241010-en
Behavioral task
behavioral25
Sample
Perm Spoofer/dumped files/disk.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
Perm Spoofer/dumped files/fixserials.exe
Resource
win7-20241010-en
Behavioral task
behavioral27
Sample
Perm Spoofer/dumped files/fixserials.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
Perm Spoofer/dumped files/iqvw64e.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Perm Spoofer/dumped files/mac.bat
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Perm Spoofer/dumped files/mac.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Perm Spoofer/dumped files/tpmbypass.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
Perm Spoofer/dumped files/tpmbypass.exe
Resource
win10v2004-20241007-en
General
-
Target
Perm Spoofer/dumped files/fixserials.exe
-
Size
229KB
-
MD5
9252505656ab18c34d4ecff6a7f86263
-
SHA1
dfa01cbe5c99fbf67a5063f99c67669382e43356
-
SHA256
78da8433390c0aaf2e5f748ff266bacad23fe9d05b1834eabceeb6ad69859589
-
SHA512
5e270de9982c3137c16e32fa4c88f9a414893c623fbcdd5cb2f3ff9bbf82eac82bb8d01100d60ea8633da875b36df39d657a9090e393d4fdf717575821bce8a5
-
SSDEEP
6144:lloZMcrIkd8g+EtXHkv/iD4l6qZEKtFu9r20VJgU8b8e1mbDi:noZrL+EP8l6qZEKtFu9r20VJgZd
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral26/memory/2884-1-0x0000000000390000-0x00000000003D0000-memory.dmp family_umbral -
Umbral family
-
pid Process 1864 powershell.exe 2052 powershell.exe 1428 powershell.exe 2692 powershell.exe -
Deletes itself 1 IoCs
pid Process 2632 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 discord.com 10 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2632 cmd.exe 2284 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2648 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2284 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2884 fixserials.exe 2692 powershell.exe 1864 powershell.exe 2052 powershell.exe 2656 powershell.exe 1428 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2884 fixserials.exe Token: SeIncreaseQuotaPrivilege 2940 wmic.exe Token: SeSecurityPrivilege 2940 wmic.exe Token: SeTakeOwnershipPrivilege 2940 wmic.exe Token: SeLoadDriverPrivilege 2940 wmic.exe Token: SeSystemProfilePrivilege 2940 wmic.exe Token: SeSystemtimePrivilege 2940 wmic.exe Token: SeProfSingleProcessPrivilege 2940 wmic.exe Token: SeIncBasePriorityPrivilege 2940 wmic.exe Token: SeCreatePagefilePrivilege 2940 wmic.exe Token: SeBackupPrivilege 2940 wmic.exe Token: SeRestorePrivilege 2940 wmic.exe Token: SeShutdownPrivilege 2940 wmic.exe Token: SeDebugPrivilege 2940 wmic.exe Token: SeSystemEnvironmentPrivilege 2940 wmic.exe Token: SeRemoteShutdownPrivilege 2940 wmic.exe Token: SeUndockPrivilege 2940 wmic.exe Token: SeManageVolumePrivilege 2940 wmic.exe Token: 33 2940 wmic.exe Token: 34 2940 wmic.exe Token: 35 2940 wmic.exe Token: SeIncreaseQuotaPrivilege 2940 wmic.exe Token: SeSecurityPrivilege 2940 wmic.exe Token: SeTakeOwnershipPrivilege 2940 wmic.exe Token: SeLoadDriverPrivilege 2940 wmic.exe Token: SeSystemProfilePrivilege 2940 wmic.exe Token: SeSystemtimePrivilege 2940 wmic.exe Token: SeProfSingleProcessPrivilege 2940 wmic.exe Token: SeIncBasePriorityPrivilege 2940 wmic.exe Token: SeCreatePagefilePrivilege 2940 wmic.exe Token: SeBackupPrivilege 2940 wmic.exe Token: SeRestorePrivilege 2940 wmic.exe Token: SeShutdownPrivilege 2940 wmic.exe Token: SeDebugPrivilege 2940 wmic.exe Token: SeSystemEnvironmentPrivilege 2940 wmic.exe Token: SeRemoteShutdownPrivilege 2940 wmic.exe Token: SeUndockPrivilege 2940 wmic.exe Token: SeManageVolumePrivilege 2940 wmic.exe Token: 33 2940 wmic.exe Token: 34 2940 wmic.exe Token: 35 2940 wmic.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 1864 powershell.exe Token: SeDebugPrivilege 2052 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeIncreaseQuotaPrivilege 3068 wmic.exe Token: SeSecurityPrivilege 3068 wmic.exe Token: SeTakeOwnershipPrivilege 3068 wmic.exe Token: SeLoadDriverPrivilege 3068 wmic.exe Token: SeSystemProfilePrivilege 3068 wmic.exe Token: SeSystemtimePrivilege 3068 wmic.exe Token: SeProfSingleProcessPrivilege 3068 wmic.exe Token: SeIncBasePriorityPrivilege 3068 wmic.exe Token: SeCreatePagefilePrivilege 3068 wmic.exe Token: SeBackupPrivilege 3068 wmic.exe Token: SeRestorePrivilege 3068 wmic.exe Token: SeShutdownPrivilege 3068 wmic.exe Token: SeDebugPrivilege 3068 wmic.exe Token: SeSystemEnvironmentPrivilege 3068 wmic.exe Token: SeRemoteShutdownPrivilege 3068 wmic.exe Token: SeUndockPrivilege 3068 wmic.exe Token: SeManageVolumePrivilege 3068 wmic.exe Token: 33 3068 wmic.exe Token: 34 3068 wmic.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2940 2884 fixserials.exe 30 PID 2884 wrote to memory of 2940 2884 fixserials.exe 30 PID 2884 wrote to memory of 2940 2884 fixserials.exe 30 PID 2884 wrote to memory of 2976 2884 fixserials.exe 33 PID 2884 wrote to memory of 2976 2884 fixserials.exe 33 PID 2884 wrote to memory of 2976 2884 fixserials.exe 33 PID 2884 wrote to memory of 2692 2884 fixserials.exe 35 PID 2884 wrote to memory of 2692 2884 fixserials.exe 35 PID 2884 wrote to memory of 2692 2884 fixserials.exe 35 PID 2884 wrote to memory of 1864 2884 fixserials.exe 37 PID 2884 wrote to memory of 1864 2884 fixserials.exe 37 PID 2884 wrote to memory of 1864 2884 fixserials.exe 37 PID 2884 wrote to memory of 2052 2884 fixserials.exe 39 PID 2884 wrote to memory of 2052 2884 fixserials.exe 39 PID 2884 wrote to memory of 2052 2884 fixserials.exe 39 PID 2884 wrote to memory of 2656 2884 fixserials.exe 41 PID 2884 wrote to memory of 2656 2884 fixserials.exe 41 PID 2884 wrote to memory of 2656 2884 fixserials.exe 41 PID 2884 wrote to memory of 3068 2884 fixserials.exe 43 PID 2884 wrote to memory of 3068 2884 fixserials.exe 43 PID 2884 wrote to memory of 3068 2884 fixserials.exe 43 PID 2884 wrote to memory of 2424 2884 fixserials.exe 45 PID 2884 wrote to memory of 2424 2884 fixserials.exe 45 PID 2884 wrote to memory of 2424 2884 fixserials.exe 45 PID 2884 wrote to memory of 2304 2884 fixserials.exe 47 PID 2884 wrote to memory of 2304 2884 fixserials.exe 47 PID 2884 wrote to memory of 2304 2884 fixserials.exe 47 PID 2884 wrote to memory of 1428 2884 fixserials.exe 49 PID 2884 wrote to memory of 1428 2884 fixserials.exe 49 PID 2884 wrote to memory of 1428 2884 fixserials.exe 49 PID 2884 wrote to memory of 2648 2884 fixserials.exe 51 PID 2884 wrote to memory of 2648 2884 fixserials.exe 51 PID 2884 wrote to memory of 2648 2884 fixserials.exe 51 PID 2884 wrote to memory of 2632 2884 fixserials.exe 53 PID 2884 wrote to memory of 2632 2884 fixserials.exe 53 PID 2884 wrote to memory of 2632 2884 fixserials.exe 53 PID 2632 wrote to memory of 2284 2632 cmd.exe 55 PID 2632 wrote to memory of 2284 2632 cmd.exe 55 PID 2632 wrote to memory of 2284 2632 cmd.exe 55 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2976 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\fixserials.exe"C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\fixserials.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\fixserials.exe"2⤵
- Views/modifies file attributes
PID:2976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\fixserials.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵PID:2424
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:2304
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:2648
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Perm Spoofer\dumped files\fixserials.exe" && pause2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2284
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56101bb5e0396bf307d0d9aeadf7b1281
SHA10f6a4015b8f2f0e0bede7bd86726cb1d9706ae8e
SHA2560b928217906dbd0c36f81954d1ab6a65a7d9e9d69199053b7e8463e6531c7466
SHA512dba3f95bbf17cedc51ba8e8729a4a127658926c87655f36d5bde6f41fadac4d0af9a4a5a40c9031617c14490d411b13e78360a6a2487109d60b474ed16878c97