Overview
overview
3Static
static
11b13fd63d4...1e.apk
android-9-x86
11b13fd63d4...1e.apk
android-10-x64
11b13fd63d4...1e.apk
android-11-x64
1WebViewJav...dge.js
windows7-x64
1WebViewJav...dge.js
windows10-2004-x64
1base_fragment.sh
windows7-x64
3base_fragment.sh
windows10-2004-x64
3base_vertex.sh
windows7-x64
3base_vertex.sh
windows10-2004-x64
3blend_fragment.sh
windows7-x64
3blend_fragment.sh
windows10-2004-x64
3oes_base_fragment.sh
windows7-x64
3oes_base_fragment.sh
windows10-2004-x64
3oes_base_vertex.sh
windows7-x64
3oes_base_vertex.sh
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
1b13fd63d40d4874e05c490cb94b4201777c093480ae1bd8ea4e41ae8402911e.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
1b13fd63d40d4874e05c490cb94b4201777c093480ae1bd8ea4e41ae8402911e.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
1b13fd63d40d4874e05c490cb94b4201777c093480ae1bd8ea4e41ae8402911e.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
WebViewJavascriptBridge.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
WebViewJavascriptBridge.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
base_fragment.sh
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
base_fragment.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
base_vertex.sh
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
base_vertex.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
blend_fragment.sh
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
blend_fragment.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
oes_base_fragment.sh
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
oes_base_fragment.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
oes_base_vertex.sh
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
oes_base_vertex.sh
Resource
win10v2004-20230915-en
General
-
Target
oes_base_vertex.sh
-
Size
195B
-
MD5
a4fe1659ea7caeed44d32f82e379a67b
-
SHA1
da6deb02303d5aff1e1a4981466475c531abe5d4
-
SHA256
30ba15db78fc00416019424e985030c0f20dd6ec96effae08c0ca9ad25f1162a
-
SHA512
b9d19373f199c05d3c278d1c78cba105cd3a990dc8d9c754df86681077329489e85a47e94630530250bc3224b39c93034550f20e39996a5746d71392f5589f6c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2724 AcroRd32.exe 2724 AcroRd32.exe 2724 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2812 2068 cmd.exe 29 PID 2068 wrote to memory of 2812 2068 cmd.exe 29 PID 2068 wrote to memory of 2812 2068 cmd.exe 29 PID 2812 wrote to memory of 2724 2812 rundll32.exe 30 PID 2812 wrote to memory of 2724 2812 rundll32.exe 30 PID 2812 wrote to memory of 2724 2812 rundll32.exe 30 PID 2812 wrote to memory of 2724 2812 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\oes_base_vertex.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\oes_base_vertex.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\oes_base_vertex.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD566a97feab68996015a706f57c98c3229
SHA19bb415528dcde22c976d7901105ddfe7f0ec4af8
SHA256e33abde06b931c5fd5e42b9894f44b42c9b42a0b4140854132685f8a7159763b
SHA512853993e007c8442ea7fcd92ac66e31d486957c961078072a2803d6747d8062ea44039057393f659b64010d93648c9085ef52c2d75af3fff480867dd9f73eec95