Security
The systeminfo.exe displays detailed info related to your system. When trying to pass a virtual machine as a legitimate "silicone" system can be a challenge as systeminfo.exe will display telling details such as BIOS, network card, or manufacturer information that may relate to the hypervisor or host system such as Vmware, or Virtualbox.
Systeminfo is often used by threat actors in a honeypot, or tech support scammers to verify the legitimacy of the system. This project builds a fake "systeminfo.exe" which replaces all of the telling fields with fields that would appear on a legitimate silicone system. To legitimize some of the non-telling fields, the binary will function similiar to the original systeminfo.exe and will pull and display accurate information such as OS details, username, Hotfixes, etc.
There are many other ways to determine the system type such as registery values or using WMI queries, however this addresses one common method of determining the system type.
As Microsoft doesn't want you replacing the systeminfo binary in C:\windows\system32, you'll likely run into permission errors. These can be overcome issueing the following commands:
TAKEOWN /F "C:\Windows\System32\systeminfo.exe"
ICACLS "C:\Windows\System32\systeminfo.exe" /grant everyone:F
MOVE "C:\Windows\System32\systeminfo.exe" "C:\Windows\System32\__systeminfo.exe.bak"
Next drop your compiled systeminfo.exe binary into System32.
Alternatively use the included powershell script "replace_systeminfo.ps1" which wil
DISCLAIMER: Probably not advisable modify system executables on hosts you care about. Use at your own risk!