Overview
overview
3Static
static
11b13fd63d4...1e.apk
android-9-x86
11b13fd63d4...1e.apk
android-10-x64
11b13fd63d4...1e.apk
android-11-x64
1WebViewJav...dge.js
windows7-x64
1WebViewJav...dge.js
windows10-2004-x64
1base_fragment.sh
windows7-x64
3base_fragment.sh
windows10-2004-x64
3base_vertex.sh
windows7-x64
3base_vertex.sh
windows10-2004-x64
3blend_fragment.sh
windows7-x64
3blend_fragment.sh
windows10-2004-x64
3oes_base_fragment.sh
windows7-x64
3oes_base_fragment.sh
windows10-2004-x64
3oes_base_vertex.sh
windows7-x64
3oes_base_vertex.sh
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
1b13fd63d40d4874e05c490cb94b4201777c093480ae1bd8ea4e41ae8402911e.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
1b13fd63d40d4874e05c490cb94b4201777c093480ae1bd8ea4e41ae8402911e.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
1b13fd63d40d4874e05c490cb94b4201777c093480ae1bd8ea4e41ae8402911e.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
WebViewJavascriptBridge.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
WebViewJavascriptBridge.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
base_fragment.sh
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
base_fragment.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
base_vertex.sh
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
base_vertex.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
blend_fragment.sh
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
blend_fragment.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
oes_base_fragment.sh
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
oes_base_fragment.sh
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
oes_base_vertex.sh
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
oes_base_vertex.sh
Resource
win10v2004-20230915-en
General
-
Target
base_vertex.sh
-
Size
197B
-
MD5
ce6fe2a4fc91c75666b4ee6172aad173
-
SHA1
54beda53da78568034a4190f89b6a5970ad7c6c6
-
SHA256
5572572479adcb76e09ac4a692a9fdfa114d0dd97f0d4f7f6781b41b46f5eb24
-
SHA512
e666a90b14589a94b16c60b6da8b263343719c82297f46954406d337e82459d2f7b5b560d8d398b90763d4ea18753c859ba65a2295c705f45f75efa9cf2388ef
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2788 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2788 AcroRd32.exe 2788 AcroRd32.exe 2788 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2800 2432 cmd.exe 29 PID 2432 wrote to memory of 2800 2432 cmd.exe 29 PID 2432 wrote to memory of 2800 2432 cmd.exe 29 PID 2800 wrote to memory of 2788 2800 rundll32.exe 30 PID 2800 wrote to memory of 2788 2800 rundll32.exe 30 PID 2800 wrote to memory of 2788 2800 rundll32.exe 30 PID 2800 wrote to memory of 2788 2800 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\base_vertex.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\base_vertex.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\base_vertex.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD578483f0f7952298441974f675c0e2fda
SHA10ef127562d99b7e4f8ed1a8090d4cb3bd81700bf
SHA25698e84c246a2cbcf7a9686b8916bbd380ba7a146bca99eac78933125a53750714
SHA512469b6630fb66bc22e184896141001c5ab8fadaf7618397b9efc90c8b2e0586bbcc951f749dc36d9c81c8f1b08f67cfe045353f7f62b193dda5db759fe9c472b1