Overview
overview
3Static
static
3Android.Im...32.zip
windows7-x64
1Android.Im...32.zip
windows10-2004-x64
1Android Im...ck.exe
windows7-x64
1Android Im...ck.exe
windows10-2004-x64
1Android Im...ck.exe
windows7-x64
1Android Im...ck.exe
windows10-2004-x64
1Android Im...er.jar
windows7-x64
1Android Im...er.jar
windows10-2004-x64
1Android Im...p2.exe
windows7-x64
1Android Im...p2.exe
windows10-2004-x64
1Android Im...at.exe
windows7-x64
1Android Im...at.exe
windows10-2004-x64
1Android Im...od.exe
windows7-x64
1Android Im...od.exe
windows10-2004-x64
1Android Im.../empty
windows7-x64
1Android Im.../empty
windows10-2004-x64
1Android Im...yblock
windows7-x64
3Android Im...yblock
windows10-2004-x64
3Android Im...bprivk
windows7-x64
3Android Im...bprivk
windows10-2004-x64
3Android Im...io.exe
windows7-x64
1Android Im...io.exe
windows10-2004-x64
1Android Im...ut.exe
windows7-x64
1Android Im...ut.exe
windows10-2004-x64
1Android Im...-1.dll
windows7-x64
1Android Im...-1.dll
windows10-2004-x64
1Android Im....1.dll
windows7-x64
1Android Im....1.dll
windows10-2004-x64
1Android Im...-1.dll
windows7-x64
1Android Im...-1.dll
windows10-2004-x64
1Android Im...-2.dll
windows7-x64
1Android Im...-2.dll
windows10-2004-x64
1Analysis
-
max time kernel
28s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2023 00:39
Static task
static1
Behavioral task
behavioral1
Sample
Android.Image.Kitchen.v3.8-Win32.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Android.Image.Kitchen.v3.8-Win32.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Android Image Kitchen/android_win_tools/blobpack.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Android Image Kitchen/android_win_tools/blobpack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Android Image Kitchen/android_win_tools/blobunpack.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Android Image Kitchen/android_win_tools/blobunpack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Android Image Kitchen/android_win_tools/boot_signer.jar
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Android Image Kitchen/android_win_tools/boot_signer.jar
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Android Image Kitchen/android_win_tools/bzip2.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Android Image Kitchen/android_win_tools/bzip2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Android Image Kitchen/android_win_tools/cat.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Android Image Kitchen/android_win_tools/cat.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Android Image Kitchen/android_win_tools/chmod.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Android Image Kitchen/android_win_tools/chmod.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
Android Image Kitchen/android_win_tools/chromeos/empty
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Android Image Kitchen/android_win_tools/chromeos/empty
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel.keyblock
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel.keyblock
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel_data_key.vbprivk
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel_data_key.vbprivk
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
Android Image Kitchen/android_win_tools/cpio.exe
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
Android Image Kitchen/android_win_tools/cpio.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
Android Image Kitchen/android_win_tools/cut.exe
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
Android Image Kitchen/android_win_tools/cut.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
Android Image Kitchen/android_win_tools/cygbz2-1.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
Android Image Kitchen/android_win_tools/cygbz2-1.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
Android Image Kitchen/android_win_tools/cygcrypto-1.1.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
Android Image Kitchen/android_win_tools/cygcrypto-1.1.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
Android Image Kitchen/android_win_tools/cyggcc_s-1.dll
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
Android Image Kitchen/android_win_tools/cyggcc_s-1.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
Android Image Kitchen/android_win_tools/cygiconv-2.dll
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
Android Image Kitchen/android_win_tools/cygiconv-2.dll
Resource
win10v2004-20230220-en
General
-
Target
Android Image Kitchen/android_win_tools/cygbz2-1.dll
-
Size
65KB
-
MD5
c87972fc61f9ccef9b5b1d6cf28baf9a
-
SHA1
7666432d0614ee4ed79ff14d9dc85c352c6259a7
-
SHA256
7ca300ab53e10707c98a79e040266136f15e62e1c4160aa80bd7a972d3d33537
-
SHA512
261e0c730933e0e94a2c8af3261e9ee7886f830de07e8e0db7315168f69d3000603b2e024eccf8561a924cacc0f1afcf4478ca06b4405680583e28a25527e5c9
-
SSDEEP
1536:nZ5nYh12yUkC2D8OQn2IqM6gikWDc2EnmoKsaACE2D8OQn2IqM20EQwLMncqHL4D:njYh5UkC2D8OQn2IqM6gikWDc2EnmoKJ
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
rundll32.exedescription pid process Token: SeRestorePrivilege 2016 rundll32.exe Token: SeBackupPrivilege 2016 rundll32.exe Token: SeDebugPrivilege 2016 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1696 wrote to memory of 2016 1696 rundll32.exe rundll32.exe PID 1696 wrote to memory of 2016 1696 rundll32.exe rundll32.exe PID 1696 wrote to memory of 2016 1696 rundll32.exe rundll32.exe PID 1696 wrote to memory of 2016 1696 rundll32.exe rundll32.exe PID 1696 wrote to memory of 2016 1696 rundll32.exe rundll32.exe PID 1696 wrote to memory of 2016 1696 rundll32.exe rundll32.exe PID 1696 wrote to memory of 2016 1696 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Android Image Kitchen\android_win_tools\cygbz2-1.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Android Image Kitchen\android_win_tools\cygbz2-1.dll",#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:2016
-