Overview
overview
7Static
static
76aa7c687cb...92.apk
android-9-x86
7frag.sh
windows7-x64
3frag.sh
windows10-2004-x64
3index.umd.js
windows7-x64
1index.umd.js
windows10-2004-x64
1libwbsafeedit
debian-9-armhf
1libwbsafeedit_64
ubuntu-18.04-amd64
libwbsafeedit_64
debian-9-armhf
libwbsafeedit_64
debian-9-mips
libwbsafeedit_64
debian-9-mipsel
libwbsafeedit_x86
ubuntu-18.04-amd64
1libwbsafeedit_x86_64
ubuntu-18.04-amd64
1platformProtocol.html
windows7-x64
1platformProtocol.html
windows10-2004-x64
1userProtocol.html
windows7-x64
1userProtocol.html
windows10-2004-x64
1vertex.sh
windows7-x64
3vertex.sh
windows10-2004-x64
3windmill.worker.js
windows7-x64
1windmill.worker.js
windows10-2004-x64
1Analysis
-
max time kernel
284s -
max time network
318s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08/10/2023, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
6aa7c687cb908aa09047c3b180507c9a23070716525dd29174dd8ce4dad0d092.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
frag.sh
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
frag.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
index.umd.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
index.umd.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
libwbsafeedit
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral7
Sample
libwbsafeedit_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral8
Sample
libwbsafeedit_64
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral9
Sample
libwbsafeedit_64
Resource
debian9-mipsbe-20230831-en
Behavioral task
behavioral10
Sample
libwbsafeedit_64
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral11
Sample
libwbsafeedit_x86
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral12
Sample
libwbsafeedit_x86_64
Resource
ubuntu1804-amd64-20230831-en
Behavioral task
behavioral13
Sample
platformProtocol.html
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
platformProtocol.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
userProtocol.html
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
userProtocol.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
vertex.sh
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
vertex.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
windmill.worker.js
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
windmill.worker.js
Resource
win10v2004-20230915-en
General
-
Target
frag.sh
-
Size
311B
-
MD5
39a2a58656f8ac24d12f82476df61562
-
SHA1
06d6ace208906e2fece26fd7c36d21fde0f206e4
-
SHA256
639e466fcfabf86510a16c91d8cc2671d1555d8b18b46d0f77d28ad9cb7287a9
-
SHA512
5873a8650d5a7e9500a7574120d2aa07b5a23cfb41e894f2a4aa82c3c3a8da1e6f06067220b97dab3b09c29741f2910940595083d3a8061f0e01e40aa431d76b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2564 AcroRd32.exe 2564 AcroRd32.exe 2564 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2560 2656 cmd.exe 28 PID 2656 wrote to memory of 2560 2656 cmd.exe 28 PID 2656 wrote to memory of 2560 2656 cmd.exe 28 PID 2560 wrote to memory of 2564 2560 rundll32.exe 29 PID 2560 wrote to memory of 2564 2560 rundll32.exe 29 PID 2560 wrote to memory of 2564 2560 rundll32.exe 29 PID 2560 wrote to memory of 2564 2560 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\frag.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\frag.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\frag.sh"3⤵
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bc2b64335ce2939eef92d3886d2e2088
SHA173fa12d49f1f58cfcce83db9404cd31e8a1ce4c3
SHA2566f547b0423742a1d1304c4e5d311898e6ff187bc0c13daf4e9a473fa8401945c
SHA51251041bd99e6e487b4272b5bbc00ee85f5b35bb254c835bc23e09a4bfdc73ea5723edf9b7c994f55f9fe966cf41b39ff8f0c3b0c25b0599c40c15d0d5e3baae8a