Overview
overview
3Static
static
3Android.Im...32.zip
windows7-x64
1Android.Im...32.zip
windows10-2004-x64
1Android Im...ck.exe
windows7-x64
1Android Im...ck.exe
windows10-2004-x64
1Android Im...ck.exe
windows7-x64
1Android Im...ck.exe
windows10-2004-x64
1Android Im...er.jar
windows7-x64
1Android Im...er.jar
windows10-2004-x64
1Android Im...p2.exe
windows7-x64
1Android Im...p2.exe
windows10-2004-x64
1Android Im...at.exe
windows7-x64
1Android Im...at.exe
windows10-2004-x64
1Android Im...od.exe
windows7-x64
1Android Im...od.exe
windows10-2004-x64
1Android Im.../empty
windows7-x64
1Android Im.../empty
windows10-2004-x64
1Android Im...yblock
windows7-x64
3Android Im...yblock
windows10-2004-x64
3Android Im...bprivk
windows7-x64
3Android Im...bprivk
windows10-2004-x64
3Android Im...io.exe
windows7-x64
1Android Im...io.exe
windows10-2004-x64
1Android Im...ut.exe
windows7-x64
1Android Im...ut.exe
windows10-2004-x64
1Android Im...-1.dll
windows7-x64
1Android Im...-1.dll
windows10-2004-x64
1Android Im....1.dll
windows7-x64
1Android Im....1.dll
windows10-2004-x64
1Android Im...-1.dll
windows7-x64
1Android Im...-1.dll
windows10-2004-x64
1Android Im...-2.dll
windows7-x64
1Android Im...-2.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2023 00:39
Static task
static1
Behavioral task
behavioral1
Sample
Android.Image.Kitchen.v3.8-Win32.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Android.Image.Kitchen.v3.8-Win32.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Android Image Kitchen/android_win_tools/blobpack.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Android Image Kitchen/android_win_tools/blobpack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Android Image Kitchen/android_win_tools/blobunpack.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Android Image Kitchen/android_win_tools/blobunpack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Android Image Kitchen/android_win_tools/boot_signer.jar
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Android Image Kitchen/android_win_tools/boot_signer.jar
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Android Image Kitchen/android_win_tools/bzip2.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Android Image Kitchen/android_win_tools/bzip2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Android Image Kitchen/android_win_tools/cat.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Android Image Kitchen/android_win_tools/cat.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Android Image Kitchen/android_win_tools/chmod.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Android Image Kitchen/android_win_tools/chmod.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
Android Image Kitchen/android_win_tools/chromeos/empty
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Android Image Kitchen/android_win_tools/chromeos/empty
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel.keyblock
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel.keyblock
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel_data_key.vbprivk
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel_data_key.vbprivk
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
Android Image Kitchen/android_win_tools/cpio.exe
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
Android Image Kitchen/android_win_tools/cpio.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
Android Image Kitchen/android_win_tools/cut.exe
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
Android Image Kitchen/android_win_tools/cut.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
Android Image Kitchen/android_win_tools/cygbz2-1.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
Android Image Kitchen/android_win_tools/cygbz2-1.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
Android Image Kitchen/android_win_tools/cygcrypto-1.1.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
Android Image Kitchen/android_win_tools/cygcrypto-1.1.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
Android Image Kitchen/android_win_tools/cyggcc_s-1.dll
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
Android Image Kitchen/android_win_tools/cyggcc_s-1.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
Android Image Kitchen/android_win_tools/cygiconv-2.dll
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
Android Image Kitchen/android_win_tools/cygiconv-2.dll
Resource
win10v2004-20230220-en
General
-
Target
Android Image Kitchen/android_win_tools/chromeos/kernel_data_key.vbprivk
-
Size
1KB
-
MD5
584777ae88bce2c5659960151b64c7d8
-
SHA1
a0b906e30ff91cb6fb7deb3e9174e49a69c8858e
-
SHA256
bc9e707a86e55a93f423e7bcdae4a25fd470b868e53829b91bbe2ccfbc6da27b
-
SHA512
143dea30c6da00e504c99984a98a0eb2411f558fcdd9dfa7f607d6c14e9e7dffff9cb00121d9317044b07e3e210808286598c785ee854084b993ec9cb14d8232
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.vbprivk\ = "vbprivk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\vbprivk_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\vbprivk_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\vbprivk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\vbprivk_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\vbprivk_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.vbprivk rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\vbprivk_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1624 AcroRd32.exe 1624 AcroRd32.exe 1624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1360 wrote to memory of 1868 1360 cmd.exe rundll32.exe PID 1360 wrote to memory of 1868 1360 cmd.exe rundll32.exe PID 1360 wrote to memory of 1868 1360 cmd.exe rundll32.exe PID 1868 wrote to memory of 1624 1868 rundll32.exe AcroRd32.exe PID 1868 wrote to memory of 1624 1868 rundll32.exe AcroRd32.exe PID 1868 wrote to memory of 1624 1868 rundll32.exe AcroRd32.exe PID 1868 wrote to memory of 1624 1868 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Android Image Kitchen\android_win_tools\chromeos\kernel_data_key.vbprivk"1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Android Image Kitchen\android_win_tools\chromeos\kernel_data_key.vbprivk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Android Image Kitchen\android_win_tools\chromeos\kernel_data_key.vbprivk"3⤵
- Suspicious use of SetWindowsHookEx
PID:1624
-
-