Overview
overview
7Static
static
7GB_b19741fxj.apk
android-9-x86
1YOWA.html
windows7-x64
1YOWA.html
windows10-2004-x64
1changelog-ar.html
windows7-x64
1changelog-ar.html
windows10-2004-x64
1changelog.html
windows7-x64
1changelog.html
windows10-2004-x64
1clockDarkTheme.xml
windows7-x64
1clockDarkTheme.xml
windows10-2004-x64
1clockLightTheme.xml
windows7-x64
1clockLightTheme.xml
windows10-2004-x64
1credits.html
windows7-x64
1credits.html
windows10-2004-x64
1e0012.png
windows7-x64
3e0012.png
windows10-2004-x64
3e0231.png
windows7-x64
3e0231.png
windows10-2004-x64
3e0537.png
windows7-x64
3e0537.png
windows10-2004-x64
3e1296.obi
windows7-x64
3e1296.obi
windows10-2004-x64
5e1299.png
windows7-x64
3e1299.png
windows10-2004-x64
3e1300.png
windows7-x64
3e1300.png
windows10-2004-x64
3e1302.png
windows7-x64
3e1302.png
windows10-2004-x64
3e1439.png
windows7-x64
3e1439.png
windows10-2004-x64
3e1440.png
windows7-x64
3e1440.png
windows10-2004-x64
3e1441.obi
windows7-x64
3Resubmissions
06-07-2023 18:35
230706-w8fqlsdg43 706-07-2023 18:32
230706-w6mfdadg35 706-07-2023 18:27
230706-w34kgsdg32 705-07-2023 09:21
230705-lbqjfabd66 705-07-2023 08:59
230705-kxxdfach7v 705-07-2023 08:41
230705-klwmrscg9y 705-07-2023 07:15
230705-h3aqhscf6z 705-07-2023 07:13
230705-h2e9lsba95 705-07-2023 06:50
230705-hl6fvscf2t 7Analysis
-
max time kernel
157s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
05-07-2023 06:50
Static task
static1
Behavioral task
behavioral1
Sample
GB_b19741fxj.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
YOWA.html
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
YOWA.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
changelog-ar.html
Resource
win7-20230621-en
Behavioral task
behavioral5
Sample
changelog-ar.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
changelog.html
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
changelog.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral8
Sample
clockDarkTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
clockDarkTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
clockLightTheme.xml
Resource
win7-20230703-en
Behavioral task
behavioral11
Sample
clockLightTheme.xml
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
credits.html
Resource
win7-20230621-en
Behavioral task
behavioral13
Sample
credits.html
Resource
win10v2004-20230703-en
Behavioral task
behavioral14
Sample
e0012.png
Resource
win7-20230703-en
Behavioral task
behavioral15
Sample
e0012.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
e0231.png
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
e0231.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral18
Sample
e0537.png
Resource
win7-20230703-en
Behavioral task
behavioral19
Sample
e0537.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
e1296.obi
Resource
win7-20230621-en
Behavioral task
behavioral21
Sample
e1296.obi
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
e1299.png
Resource
win7-20230703-en
Behavioral task
behavioral23
Sample
e1299.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
e1300.png
Resource
win7-20230703-en
Behavioral task
behavioral25
Sample
e1300.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
e1302.png
Resource
win7-20230703-en
Behavioral task
behavioral27
Sample
e1302.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
e1439.png
Resource
win7-20230703-en
Behavioral task
behavioral29
Sample
e1439.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
e1440.png
Resource
win7-20230703-en
Behavioral task
behavioral31
Sample
e1440.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral32
Sample
e1441.obi
Resource
win7-20230703-en
General
-
Target
e1296.obi
-
Size
1KB
-
MD5
ed9a157142b0d1f361a23c4792c1cef0
-
SHA1
ec514648196cf365a89ef2504b80de207ecc5862
-
SHA256
c8d567fae9cb8862d101d9043503da34bd8c115477cba18a7af3eb1236c8ecea
-
SHA512
605dc24efcf60516fd0a74cda3ba36b0b871ead6286d225b117619a5937f2d8885abdec2a949bbf9e544cafbc0ffe5f6ee3071800b11916199bb610e56b0b71f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\obi_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\.obi rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\obi_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\obi_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\obi_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\.obi\ = "obi_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\obi_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3950455397-3229124517-1686476975-1000_CLASSES\obi_auto_file rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 528 AcroRd32.exe 528 AcroRd32.exe 528 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1116 wrote to memory of 656 1116 cmd.exe 28 PID 1116 wrote to memory of 656 1116 cmd.exe 28 PID 1116 wrote to memory of 656 1116 cmd.exe 28 PID 656 wrote to memory of 528 656 rundll32.exe 29 PID 656 wrote to memory of 528 656 rundll32.exe 29 PID 656 wrote to memory of 528 656 rundll32.exe 29 PID 656 wrote to memory of 528 656 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\e1296.obi1⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\e1296.obi2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e1296.obi"3⤵
- Suspicious use of SetWindowsHookEx
PID:528
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bbd78bcdcda378b5e05da11b260e9a42
SHA19023b9835f6282025464abbfef7de7671aea55ed
SHA256a7a84e08f683b85e0765f40aa5d4f4e21fd51d3563cc475d57f76109bce14afe
SHA512cdb1c151078daa64f675ef8740f1fb0bab720e406ac7d81ffc2666fa506efcca026d749210cc6065278762bb913d7bf97f210c3eeac0e15b191cdf3113dead14