Overview
overview
3Static
static
3Android.Im...32.zip
windows7-x64
1Android.Im...32.zip
windows10-2004-x64
1Android Im...ck.exe
windows7-x64
1Android Im...ck.exe
windows10-2004-x64
1Android Im...ck.exe
windows7-x64
1Android Im...ck.exe
windows10-2004-x64
1Android Im...er.jar
windows7-x64
1Android Im...er.jar
windows10-2004-x64
1Android Im...p2.exe
windows7-x64
1Android Im...p2.exe
windows10-2004-x64
1Android Im...at.exe
windows7-x64
1Android Im...at.exe
windows10-2004-x64
1Android Im...od.exe
windows7-x64
1Android Im...od.exe
windows10-2004-x64
1Android Im.../empty
windows7-x64
1Android Im.../empty
windows10-2004-x64
1Android Im...yblock
windows7-x64
3Android Im...yblock
windows10-2004-x64
3Android Im...bprivk
windows7-x64
3Android Im...bprivk
windows10-2004-x64
3Android Im...io.exe
windows7-x64
1Android Im...io.exe
windows10-2004-x64
1Android Im...ut.exe
windows7-x64
1Android Im...ut.exe
windows10-2004-x64
1Android Im...-1.dll
windows7-x64
1Android Im...-1.dll
windows10-2004-x64
1Android Im....1.dll
windows7-x64
1Android Im....1.dll
windows10-2004-x64
1Android Im...-1.dll
windows7-x64
1Android Im...-1.dll
windows10-2004-x64
1Android Im...-2.dll
windows7-x64
1Android Im...-2.dll
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2023 00:39
Static task
static1
Behavioral task
behavioral1
Sample
Android.Image.Kitchen.v3.8-Win32.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Android.Image.Kitchen.v3.8-Win32.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Android Image Kitchen/android_win_tools/blobpack.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Android Image Kitchen/android_win_tools/blobpack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Android Image Kitchen/android_win_tools/blobunpack.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Android Image Kitchen/android_win_tools/blobunpack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Android Image Kitchen/android_win_tools/boot_signer.jar
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Android Image Kitchen/android_win_tools/boot_signer.jar
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Android Image Kitchen/android_win_tools/bzip2.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Android Image Kitchen/android_win_tools/bzip2.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Android Image Kitchen/android_win_tools/cat.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Android Image Kitchen/android_win_tools/cat.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Android Image Kitchen/android_win_tools/chmod.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Android Image Kitchen/android_win_tools/chmod.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
Android Image Kitchen/android_win_tools/chromeos/empty
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Android Image Kitchen/android_win_tools/chromeos/empty
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel.keyblock
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel.keyblock
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel_data_key.vbprivk
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
Android Image Kitchen/android_win_tools/chromeos/kernel_data_key.vbprivk
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
Android Image Kitchen/android_win_tools/cpio.exe
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
Android Image Kitchen/android_win_tools/cpio.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
Android Image Kitchen/android_win_tools/cut.exe
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
Android Image Kitchen/android_win_tools/cut.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
Android Image Kitchen/android_win_tools/cygbz2-1.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
Android Image Kitchen/android_win_tools/cygbz2-1.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
Android Image Kitchen/android_win_tools/cygcrypto-1.1.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
Android Image Kitchen/android_win_tools/cygcrypto-1.1.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
Android Image Kitchen/android_win_tools/cyggcc_s-1.dll
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
Android Image Kitchen/android_win_tools/cyggcc_s-1.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
Android Image Kitchen/android_win_tools/cygiconv-2.dll
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
Android Image Kitchen/android_win_tools/cygiconv-2.dll
Resource
win10v2004-20230220-en
General
-
Target
Android Image Kitchen/android_win_tools/cygiconv-2.dll
-
Size
1008KB
-
MD5
78c269ed2da2f2bb800a61fa31530065
-
SHA1
fb531ffdcd01d687260882dc0cbd6dce0ca81b58
-
SHA256
4115c42fa0e03263438ee80017e3f1151131191cfcd3f9419fa80a1d0a0e2964
-
SHA512
777b5ec7de792261a2a3bb82f2d015f283d8a7138c724d471835d742effd303ecec8b235772dfa7c4d157afb05aaf40ee58a1c4f922e7193b4b50618ef9c0b9e
-
SSDEEP
24576:GboBRoBAUZLYnwPKO6lbbTCpGavkg3NyeuQ6l9fHOfK:gBAUZLYwiO6UpGaXBuQQ9uK
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
rundll32.exedescription pid process Token: SeRestorePrivilege 4164 rundll32.exe Token: SeBackupPrivilege 4164 rundll32.exe Token: SeDebugPrivilege 4164 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1836 wrote to memory of 4164 1836 rundll32.exe rundll32.exe PID 1836 wrote to memory of 4164 1836 rundll32.exe rundll32.exe PID 1836 wrote to memory of 4164 1836 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Android Image Kitchen\android_win_tools\cygiconv-2.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Android Image Kitchen\android_win_tools\cygiconv-2.dll",#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:4164
-