Overview
overview
7Static
static
7d223178c81...a6.apk
android-9-x86
7frag.sh
windows7-x64
3frag.sh
windows10-2004-x64
3index.umd.js
windows7-x64
1index.umd.js
windows10-2004-x64
1libwbsafeedit
debian-9-armhf
1libwbsafeedit_64
ubuntu-18.04-amd64
libwbsafeedit_64
debian-9-armhf
libwbsafeedit_64
debian-9-mips
libwbsafeedit_64
debian-9-mipsel
libwbsafeedit_x86
ubuntu-18.04-amd64
1libwbsafeedit_x86_64
ubuntu-18.04-amd64
1platformProtocol.html
windows7-x64
1platformProtocol.html
windows10-2004-x64
1popup.html
windows7-x64
1popup.html
windows10-2004-x64
1userProtocol.html
windows7-x64
1userProtocol.html
windows10-2004-x64
1vertex.sh
windows7-x64
3vertex.sh
windows10-2004-x64
3windmill.worker.js
windows7-x64
1windmill.worker.js
windows10-2004-x64
1Analysis
-
max time kernel
192s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
d223178c81c5a5eb469f520edd8da27b93ea7953102de7be4a330367aa884da6.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
frag.sh
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
frag.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
index.umd.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
index.umd.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
libwbsafeedit
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral7
Sample
libwbsafeedit_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral8
Sample
libwbsafeedit_64
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral9
Sample
libwbsafeedit_64
Resource
debian9-mipsbe-20230831-en
Behavioral task
behavioral10
Sample
libwbsafeedit_64
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral11
Sample
libwbsafeedit_x86
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral12
Sample
libwbsafeedit_x86_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral13
Sample
platformProtocol.html
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
platformProtocol.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
popup.html
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
popup.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
userProtocol.html
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
userProtocol.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
vertex.sh
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
vertex.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
windmill.worker.js
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
windmill.worker.js
Resource
win10v2004-20230915-en
General
-
Target
frag.sh
-
Size
311B
-
MD5
39a2a58656f8ac24d12f82476df61562
-
SHA1
06d6ace208906e2fece26fd7c36d21fde0f206e4
-
SHA256
639e466fcfabf86510a16c91d8cc2671d1555d8b18b46d0f77d28ad9cb7287a9
-
SHA512
5873a8650d5a7e9500a7574120d2aa07b5a23cfb41e894f2a4aa82c3c3a8da1e6f06067220b97dab3b09c29741f2910940595083d3a8061f0e01e40aa431d76b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2580 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2580 AcroRd32.exe 2580 AcroRd32.exe 2580 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2680 2748 cmd.exe 30 PID 2748 wrote to memory of 2680 2748 cmd.exe 30 PID 2748 wrote to memory of 2680 2748 cmd.exe 30 PID 2680 wrote to memory of 2580 2680 rundll32.exe 31 PID 2680 wrote to memory of 2580 2680 rundll32.exe 31 PID 2680 wrote to memory of 2580 2680 rundll32.exe 31 PID 2680 wrote to memory of 2580 2680 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\frag.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\frag.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\frag.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d7b5a54b49e2d8a71e7162299cfe8c71
SHA1171a0b2df00c146aede78ee23294c708763de31f
SHA25671dd59d8bec0c7d91dc77779f6d1d6180d85105e84cdf74f47e9e3c06501738a
SHA5124ccdf41ff2d374676c4b589f0c52f0870c987ede5328142677928e48af395f86837613f101cecab2bdeb4d47336e199db04926950f8e7f898e79073310ceb993