Overview
overview
6Static
static
1SDIOTransl...ol.exe
windows7-x64
1SDIOTransl...ol.exe
windows10-2004-x64
1SDIO_R753.exe
windows7-x64
3SDIO_R753.exe
windows10-2004-x64
4SDIO_auto.bat
windows7-x64
1SDIO_auto.bat
windows10-2004-x64
4SDIO_x64_R753.exe
windows7-x64
1SDIO_x64_R753.exe
windows10-2004-x64
4del_old_dr...ks.bat
windows7-x64
5del_old_dr...ks.bat
windows10-2004-x64
5docs/SDIO ...al.pdf
windows7-x64
1docs/SDIO ...al.pdf
windows10-2004-x64
1scripts/au...te.bat
windows7-x64
1scripts/au...te.bat
windows10-2004-x64
1scripts/pr...ed.bat
windows7-x64
1scripts/pr...ed.bat
windows10-2004-x64
1scripts/remote.bat
windows7-x64
6scripts/remote.bat
windows10-2004-x64
6scripts/sc...ks.bat
windows7-x64
1scripts/sc...ks.bat
windows10-2004-x64
1Analysis
-
max time kernel
1616s -
max time network
1619s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2023, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
SDIOTranslationTool.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SDIOTranslationTool.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
SDIO_R753.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
SDIO_R753.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
SDIO_auto.bat
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
SDIO_auto.bat
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
SDIO_x64_R753.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
SDIO_x64_R753.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
del_old_driverpacks.bat
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
del_old_driverpacks.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
docs/SDIO Reference Manual.pdf
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
docs/SDIO Reference Manual.pdf
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
scripts/autoupdate.bat
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
scripts/autoupdate.bat
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
scripts/prep_unpacked.bat
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
scripts/prep_unpacked.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
scripts/remote.bat
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
scripts/remote.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
scripts/scan_driver_packs.bat
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
scripts/scan_driver_packs.bat
Resource
win10v2004-20230220-en
General
-
Target
del_old_driverpacks.bat
-
Size
1KB
-
MD5
059a48f88d38595b3d4fe63d78b509f0
-
SHA1
5acf13baa930f384227f5d59371491787ebf97c7
-
SHA256
6d74ad1de33394216a6fd1ffb58e87d90a399bdafa8d2ac223e2377ec5947859
-
SHA512
397eca1cf2f830316cd39296b5b9015938f777b8e26f00c8ee0ff95639dcbf097e55586c35dbeb5b559d7e17ff90203d396f13a1524bc24b153186005f9f4b5b
Malware Config
Signatures
-
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\autorun.inf attrib.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 996 wrote to memory of 852 996 cmd.exe 29 PID 996 wrote to memory of 852 996 cmd.exe 29 PID 996 wrote to memory of 852 996 cmd.exe 29 PID 996 wrote to memory of 836 996 cmd.exe 30 PID 996 wrote to memory of 836 996 cmd.exe 30 PID 996 wrote to memory of 836 996 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 852 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\del_old_driverpacks.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\system32\attrib.exeattrib *.* -R2⤵
- Drops autorun.inf file
- Views/modifies file attributes
PID:852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b *.7z2⤵PID:836
-