Overview
overview
7Static
static
7MagisTV v4...om.apk
android-9-x86
1IJMDal.data
windows7-x64
3IJMDal.data
windows10-2004-x64
3af.bin
windows7-x64
3af.bin
windows10-2004-x64
3amazingkids.otf
windows7-x64
3amazingkids.otf
windows10-2004-x64
7cacert.pem
windows7-x64
3cacert.pem
windows10-2004-x64
3domain_test.json
windows7-x64
3domain_test.json
windows10-2004-x64
3gomediad.so
debian-9-armhf
3httping
debian-9-armhf
icon_max_d...yy.png
windows7-x64
3icon_max_d...yy.png
windows10-2004-x64
3icon_titl_...ed.png
windows7-x64
3icon_titl_...ed.png
windows10-2004-x64
3ijiami.ajm
windows7-x64
3ijiami.ajm
windows10-2004-x64
3ijiami.dat
windows7-x64
3ijiami.dat
windows10-2004-x64
3image_icon...ed.png
windows7-x64
3image_icon...ed.png
windows10-2004-x64
3routeMap.json
windows7-x64
3routeMap.json
windows10-2004-x64
3sign_verify.png
windows7-x64
3sign_verify.png
windows10-2004-x64
3signed.bin
windows7-x64
3signed.bin
windows10-2004-x64
3test1.html
windows7-x64
1test1.html
windows10-2004-x64
1Resubmissions
05/07/2023, 09:09
230705-k4h5dsch8w 7Analysis
-
max time kernel
151s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
MagisTV v4.21.4-tvbox.luchitoapk.com.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
IJMDal.data
Resource
win7-20230703-en
Behavioral task
behavioral3
Sample
IJMDal.data
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
af.bin
Resource
win7-20230703-en
Behavioral task
behavioral5
Sample
af.bin
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
amazingkids.otf
Resource
win7-20230703-en
Behavioral task
behavioral7
Sample
amazingkids.otf
Resource
win10v2004-20230621-en
Behavioral task
behavioral8
Sample
cacert.pem
Resource
win7-20230703-en
Behavioral task
behavioral9
Sample
cacert.pem
Resource
win10v2004-20230703-en
Behavioral task
behavioral10
Sample
domain_test.json
Resource
win7-20230703-en
Behavioral task
behavioral11
Sample
domain_test.json
Resource
win10v2004-20230703-en
Behavioral task
behavioral12
Sample
gomediad.so
Resource
debian9-armhf-20221125-en
Behavioral task
behavioral13
Sample
httping
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral14
Sample
icon_max_data_encrypted_xxxyyy.png
Resource
win7-20230621-en
Behavioral task
behavioral15
Sample
icon_max_data_encrypted_xxxyyy.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral16
Sample
icon_titl_last_encrypted.png
Resource
win7-20230703-en
Behavioral task
behavioral17
Sample
icon_titl_last_encrypted.png
Resource
win10v2004-20230621-en
Behavioral task
behavioral18
Sample
ijiami.ajm
Resource
win7-20230703-en
Behavioral task
behavioral19
Sample
ijiami.ajm
Resource
win10v2004-20230703-en
Behavioral task
behavioral20
Sample
ijiami.dat
Resource
win7-20230621-en
Behavioral task
behavioral21
Sample
ijiami.dat
Resource
win10v2004-20230703-en
Behavioral task
behavioral22
Sample
image_icon_constructor_encrypted.png
Resource
win7-20230703-en
Behavioral task
behavioral23
Sample
image_icon_constructor_encrypted.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral24
Sample
routeMap.json
Resource
win7-20230703-en
Behavioral task
behavioral25
Sample
routeMap.json
Resource
win10v2004-20230703-en
Behavioral task
behavioral26
Sample
sign_verify.png
Resource
win7-20230703-en
Behavioral task
behavioral27
Sample
sign_verify.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral28
Sample
signed.bin
Resource
win7-20230621-en
Behavioral task
behavioral29
Sample
signed.bin
Resource
win10v2004-20230703-en
Behavioral task
behavioral30
Sample
test1.html
Resource
win7-20230703-en
Behavioral task
behavioral31
Sample
test1.html
Resource
win10v2004-20230621-en
General
-
Target
routeMap.json
-
Size
1KB
-
MD5
3dc57b17d150d387036e9ab53da4bb98
-
SHA1
ebca2b54a70b420dcf84d8f137ef58df80bbbd53
-
SHA256
18dad60c7a68f729c01df1536204063911998f8b0752fce37ffa771f2e8f25d5
-
SHA512
145bdc7bdcd59f45918871486f38df60c37aae7552cb414dd6eadcf3bb42be0f7beadfe0ceb2d8873f45cb099deb839e4deb7b04eda78b427de9665c88bfcbc0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\json_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000_CLASSES\json_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2224 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2224 AcroRd32.exe 2224 AcroRd32.exe 2224 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1340 2380 cmd.exe 29 PID 2380 wrote to memory of 1340 2380 cmd.exe 29 PID 2380 wrote to memory of 1340 2380 cmd.exe 29 PID 1340 wrote to memory of 2224 1340 rundll32.exe 30 PID 1340 wrote to memory of 2224 1340 rundll32.exe 30 PID 1340 wrote to memory of 2224 1340 rundll32.exe 30 PID 1340 wrote to memory of 2224 1340 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\routeMap.json1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\routeMap.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\routeMap.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2224
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD562f5c699358b49846785f665e3061e3c
SHA1d7fc663a45bd40a99635e96644960f2e75fecbfd
SHA256a33e690762ae1c39075b45fdeddaf2e6f8880b8134209d607a6d411d302e9f24
SHA512b91bbe194c11541bbdfaa67fec768371900bbf15e33ba5a4d7c1962840682c0ab118385fc786c5e2cfffbc4270dcaa3eb6ebcf9700f1373ee7ff507d278ea1a5