Overview
overview
9Static
static
7com.fubo.f...om.apk
android-9-x86
9com.fubo.f...om.apk
android-10-x64
9com.fubo.f...om.apk
android-11-x64
9ADBMobileConfig.json
windows7-x64
3ADBMobileConfig.json
windows10-2004-x64
3HomePageDe...e.json
windows7-x64
3HomePageDe...e.json
windows10-2004-x64
3MoviesPage...e.json
windows7-x64
3MoviesPage...e.json
windows10-2004-x64
3SeriesPage...e.json
windows7-x64
3SeriesPage...e.json
windows10-2004-x64
3SportsPage...e.json
windows7-x64
3SportsPage...e.json
windows10-2004-x64
3TZDB.dat
windows7-x64
3TZDB.dat
windows10-2004-x64
3supplierconfig.json
windows7-x64
3supplierconfig.json
windows10-2004-x64
3swrve__css...ts.css
windows7-x64
3swrve__css...ts.css
windows10-2004-x64
7youtubeapi.html
windows7-x64
1youtubeapi.html
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2023, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
com.fubo.firetv.screen_4.74.1-201096_minAPI21(nodpi)_apkmirror.com.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
com.fubo.firetv.screen_4.74.1-201096_minAPI21(nodpi)_apkmirror.com.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
com.fubo.firetv.screen_4.74.1-201096_minAPI21(nodpi)_apkmirror.com.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral4
Sample
ADBMobileConfig.json
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
ADBMobileConfig.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
HomePageDefaultConfigResponse.json
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
HomePageDefaultConfigResponse.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
MoviesPageDefaultConfigResponse.json
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
MoviesPageDefaultConfigResponse.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
SeriesPageDefaultConfigResponse.json
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
SeriesPageDefaultConfigResponse.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
SportsPageDefaultConfigResponse.json
Resource
win7-20230220-en
Behavioral task
behavioral13
Sample
SportsPageDefaultConfigResponse.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
TZDB.dat
Resource
win7-20230220-en
Behavioral task
behavioral15
Sample
TZDB.dat
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
supplierconfig.json
Resource
win7-20230220-en
Behavioral task
behavioral17
Sample
supplierconfig.json
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
swrve__css_defaults.css
Resource
win7-20230220-en
Behavioral task
behavioral19
Sample
swrve__css_defaults.css
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
youtubeapi.html
Resource
win7-20230220-en
Behavioral task
behavioral21
Sample
youtubeapi.html
Resource
win10v2004-20230220-en
General
-
Target
SportsPageDefaultConfigResponse.json
-
Size
1KB
-
MD5
2b682858a9492017765240d3b7ff7831
-
SHA1
54269a95cfa97fff13a348b979bbd26940b93713
-
SHA256
ef327c5721641547fc532f1653c1ad822c8703592fc67b331a400f783603271f
-
SHA512
e1c04f629500b2901de85d679ef40a9b55834c19d5bebeff3b3a9df5075f2cc2b37f10e7209c42d89996296681c43278233592179bf50a0de11d355d38f778ad
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1724 AcroRd32.exe 1724 AcroRd32.exe 1724 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1504 1304 cmd.exe 29 PID 1304 wrote to memory of 1504 1304 cmd.exe 29 PID 1304 wrote to memory of 1504 1304 cmd.exe 29 PID 1504 wrote to memory of 1724 1504 rundll32.exe 30 PID 1504 wrote to memory of 1724 1504 rundll32.exe 30 PID 1504 wrote to memory of 1724 1504 rundll32.exe 30 PID 1504 wrote to memory of 1724 1504 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SportsPageDefaultConfigResponse.json1⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SportsPageDefaultConfigResponse.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\SportsPageDefaultConfigResponse.json"3⤵
- Suspicious use of SetWindowsHookEx
PID:1724
-
-