Overview
overview
10Static
static
10184356d900...2b.apk
android-9-x86
7bookmarks.png
windows7-x64
3bookmarks.png
windows10-2004-x64
3feedback.html
windows7-x64
1feedback.html
windows10-2004-x64
1history.png
windows7-x64
3history.png
windows10-2004-x64
3linef.png
windows7-x64
3linef.png
windows10-2004-x64
3search.png
windows7-x64
3search.png
windows10-2004-x64
3Analysis
-
max time kernel
1622s -
max time network
1624s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2023, 01:09
Behavioral task
behavioral1
Sample
184356d900a545a2d545ab96fa6dd7b46f881a1a80ed134db1c65225e8fa902b.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
bookmarks.png
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
bookmarks.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
feedback.html
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
feedback.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral6
Sample
history.png
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
history.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
linef.png
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
linef.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
search.png
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
search.png
Resource
win10v2004-20230220-en
General
-
Target
linef.png
-
Size
17KB
-
MD5
4781b744cb1f855eab0e54addfacbe20
-
SHA1
a74af1c24d23b2c2541aedaf7cca21da1e53eb2c
-
SHA256
52bb14cc8d136d715de6cbdfd54e0ce40224997312e9614dc907c9f70426671d
-
SHA512
f88b14266b1a579ef2afc070f4a20921817e214ae92a141d4c8d625c0a893b036368c26b4ebeb737e3cb9ab0c1d0939bca0b9db110d532f0c67ef54d45cc2b65
-
SSDEEP
384:3NupzoBLw61Bwgg39qPPFwEMwytZZk0ykGpRApuGijmfnQ5GB:36ziLr1BM3gXFTMwO3GpWpESfn3B
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 848 rundll32.exe