Overview
overview
10Static
static
10ee6aec48e1...8e.apk
android-9-x86
7ee6aec48e1...8e.apk
android-10-x64
4ee6aec48e1...8e.apk
android-11-x64
7AndroidClo...in.ttf
windows7-x64
3AndroidClo...in.ttf
windows10-2004-x64
7Roboto-Bold.ttf
windows7-x64
3Roboto-Bold.ttf
windows10-2004-x64
7Roboto-Light.ttf
windows7-x64
3Roboto-Light.ttf
windows10-2004-x64
7android-ic...me.ttf
windows7-x64
3android-ic...me.ttf
windows10-2004-x64
7backward
windows7-x64
1backward
windows10-2004-x64
1crashlytic...erties
windows7-x64
3crashlytic...erties
windows10-2004-x64
3zone.tab
windows7-x64
3zone.tab
windows10-2004-x64
3Resubmissions
29-05-2023 01:11
230529-bj2assha72 1027-05-2023 19:22
230527-x3jqrach68 1027-05-2023 19:19
230527-x1ph8adc8s 1006-05-2023 03:47
230506-ecc66sab7y 10Analysis
-
max time kernel
150s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-05-2023 19:22
Behavioral task
behavioral1
Sample
ee6aec48e19191ba6efc4c65ff45a88e.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
ee6aec48e19191ba6efc4c65ff45a88e.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
ee6aec48e19191ba6efc4c65ff45a88e.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral4
Sample
AndroidClockMono-Thin.ttf
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
AndroidClockMono-Thin.ttf
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Roboto-Bold.ttf
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
Roboto-Bold.ttf
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Roboto-Light.ttf
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
Roboto-Light.ttf
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
android-iconify-fontawesome.ttf
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
android-iconify-fontawesome.ttf
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
backward
Resource
win7-20230220-en
Behavioral task
behavioral13
Sample
backward
Resource
win10v2004-20230221-en
Behavioral task
behavioral14
Sample
crashlytics-build.properties
Resource
win7-20230220-en
Behavioral task
behavioral15
Sample
crashlytics-build.properties
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
zone.tab
Resource
win7-20230220-en
Behavioral task
behavioral17
Sample
zone.tab
Resource
win10v2004-20230220-en
General
-
Target
crashlytics-build.properties
-
Size
362B
-
MD5
49dd67dab9f45fcb010ab03e74e72cd1
-
SHA1
b04ffe6c85d11fabd10ff92726aac207c9b07fc8
-
SHA256
88a8ccf7f2cf691a7095feae4cb6404c5b8a54fcee6ba8d10dc57107851686c7
-
SHA512
dd02c4577264d08107c491ae7109e9b54ca0886d3592bf034c490dc9fae60ddfe6514bc8b5995f8f6647cca107753435287c46c7dce4bca38179bc1fc5536ffc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.properties\ = "properties_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\properties_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.properties rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\properties_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\properties_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\properties_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\properties_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\properties_auto_file rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1744 AcroRd32.exe 1744 AcroRd32.exe 1744 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1456 1388 cmd.exe 29 PID 1388 wrote to memory of 1456 1388 cmd.exe 29 PID 1388 wrote to memory of 1456 1388 cmd.exe 29 PID 1456 wrote to memory of 1744 1456 rundll32.exe 30 PID 1456 wrote to memory of 1744 1456 rundll32.exe 30 PID 1456 wrote to memory of 1744 1456 rundll32.exe 30 PID 1456 wrote to memory of 1744 1456 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\crashlytics-build.properties1⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\crashlytics-build.properties2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\crashlytics-build.properties"3⤵
- Suspicious use of SetWindowsHookEx
PID:1744
-
-