Overview
overview
3Static
static
1flathub-x8...00.sub
windows7-x64
3flathub-x8...00.sub
windows10-1703-x64
3flathub-x8...00.sub
windows10-2004-x64
3flathub-x8...00.sub
android-10-x64
flathub-x8...00.sub
android-11-x64
flathub-x8...00.sub
android-9-x86
flathub-x8...00.sub
macos-10.15-amd64
1flathub-x8...00.sub
debian-9-armhf
flathub-x8...00.sub
debian-9-mips
flathub-x8...00.sub
debian-9-mipsel
flathub-x8...00.sub
ubuntu-18.04-amd64
Analysis
-
max time kernel
901s -
max time network
903s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15/06/2023, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral7
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
macos-20220504-en
Behavioral task
behavioral8
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral9
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral10
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
debian9-mipsel-20221125-en
Behavioral task
behavioral11
Sample
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
Resource
ubuntu1804-amd64-20221111-en
General
-
Target
flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub
-
Size
4.4MB
-
MD5
cbcf4d08458c3ff9be0d82a6e042fa27
-
SHA1
ad569a70e69812ec3788ca1bf58ef9b2851b4f44
-
SHA256
36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00
-
SHA512
fb3d2acd4fa65d1aef4a8e3608c68d5c213b5099c2701da96d6aac150a48ff1d001ed53eac7cd01eb29bd7948647d842a7c9c6e45c50e3312986ba3c667cd16f
-
SSDEEP
49152:XmknesSI5UpKmgY7DWi98XHymOOpSkLFgt/Y:WDvRgYFY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.sub rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\sub_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\sub_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\sub_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\sub_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\.sub\ = "sub_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\sub_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000_CLASSES\sub_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1184 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1184 AcroRd32.exe 1184 AcroRd32.exe 1184 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1928 2012 cmd.exe 29 PID 2012 wrote to memory of 1928 2012 cmd.exe 29 PID 2012 wrote to memory of 1928 2012 cmd.exe 29 PID 1928 wrote to memory of 1184 1928 rundll32.exe 30 PID 1928 wrote to memory of 1184 1928 rundll32.exe 30 PID 1928 wrote to memory of 1184 1928 rundll32.exe 30 PID 1928 wrote to memory of 1184 1928 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\flathub-x86_64-36405252e76b3559815240eb6257d7a1567a734f11cc082977a9d5b276cf9f00.sub"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1184
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD569c26295b825351baade21dca04bb806
SHA12d9fc4d9418d613b89c9bf85f2bed9a3704ea909
SHA25600008f7b443ea3e030317e0d1049e4e5415b96f0edf02d488c688879e87e2ceb
SHA5126091a944b91e22a0602091f2b225fb8d2ff2d4d7871e3b3c2b5dd1203581b483dca7634e5436c043f756dac716ea544f714d1a5441b35f639e29850fdf1c3988