Overview
overview
10Static
static
10184356d900...2b.apk
android-9-x86
7bookmarks.png
windows7-x64
3bookmarks.png
windows10-2004-x64
3feedback.html
windows7-x64
1feedback.html
windows10-2004-x64
1history.png
windows7-x64
3history.png
windows10-2004-x64
3linef.png
windows7-x64
3linef.png
windows10-2004-x64
3search.png
windows7-x64
3search.png
windows10-2004-x64
3Analysis
-
max time kernel
1589s -
max time network
1592s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2023, 01:09
Behavioral task
behavioral1
Sample
184356d900a545a2d545ab96fa6dd7b46f881a1a80ed134db1c65225e8fa902b.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
bookmarks.png
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
bookmarks.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
feedback.html
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
feedback.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral6
Sample
history.png
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
history.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
linef.png
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
linef.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
search.png
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
search.png
Resource
win10v2004-20230220-en
General
-
Target
search.png
-
Size
936B
-
MD5
25586a2c4e534e1e73d074478775d1dd
-
SHA1
7f6d4552f489430945463274016e4024f68c4919
-
SHA256
be65b82e781a2118affd32689002d1d676108a778a75fbc1141eac1b3c428439
-
SHA512
879708f1d7064a875331a983a7eec65c3fd530f8865979e9498ee4e79c48ee44552ddbf536b6effe729eb6c421b7fbc7b7d5da46a61e9bf9a064e8f812d34a77
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 rundll32.exe