Overview
overview
7Static
static
7Public/dri...09.dll
windows7-x64
1Public/dri...09.dll
windows10-2004-x64
1Public/dri...09.dll
windows7-x64
1Public/dri...09.dll
windows10-2004-x64
1Public/dri...r2.dll
windows7-x64
1Public/dri...r2.dll
windows10-2004-x64
1Public/dri...09.dll
windows7-x64
1Public/dri...09.dll
windows10-2004-x64
1Public/dri...09.dll
windows7-x64
1Public/dri...09.dll
windows10-2004-x64
1Public/dri...r2.dll
windows7-x64
4Public/dri...r2.dll
windows10-2004-x64
3Public/files/zergRush
debian-9-armhf
Public/ins...rs.bat
windows7-x64
4Public/ins...rs.bat
windows10-2004-x64
4Public/run.bat
windows7-x64
1Public/run.bat
windows10-2004-x64
1Public/tools/7za.exe
windows7-x64
1Public/tools/7za.exe
windows10-2004-x64
1Public/too...pi.dll
windows7-x64
3Public/too...pi.dll
windows10-2004-x64
3Public/too...pi.dll
windows7-x64
1Public/too...pi.dll
windows10-2004-x64
3Public/tools/adb.exe
windows7-x64
1Public/tools/adb.exe
windows10-2004-x64
1Public/too...ot.exe
windows7-x64
1Public/too...ot.exe
windows10-2004-x64
1Public/tools/wget.exe
windows7-x64
7Public/tools/wget.exe
windows10-2004-x64
7Public/too...on.exe
windows7-x64
1Public/too...on.exe
windows10-2004-x64
1Public/too...on.exe
windows7-x64
1Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 16:54
Behavioral task
behavioral1
Sample
Public/drivers/amd64/WUDFUpdate_01009.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Public/drivers/amd64/WUDFUpdate_01009.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Public/drivers/amd64/WdfCoInstaller01009.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Public/drivers/amd64/WdfCoInstaller01009.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Public/drivers/amd64/winusbcoinstaller2.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Public/drivers/amd64/winusbcoinstaller2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Public/drivers/i386/WUDFUpdate_01009.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Public/drivers/i386/WUDFUpdate_01009.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Public/drivers/i386/WdfCoInstaller01009.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Public/drivers/i386/WdfCoInstaller01009.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Public/drivers/i386/winusbcoinstaller2.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Public/drivers/i386/winusbcoinstaller2.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Public/files/zergRush
Resource
debian9-armhf-20231222-en
Behavioral task
behavioral14
Sample
Public/install_drivers.bat
Resource
win7-20231215-en
Behavioral task
behavioral15
Sample
Public/install_drivers.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
Public/run.bat
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
Public/run.bat
Resource
win10v2004-20231222-en
Behavioral task
behavioral18
Sample
Public/tools/7za.exe
Resource
win7-20231215-en
Behavioral task
behavioral19
Sample
Public/tools/7za.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
Public/tools/AdbWinApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
Public/tools/AdbWinApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
Public/tools/AdbWinUsbApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
Public/tools/AdbWinUsbApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
Public/tools/adb.exe
Resource
win7-20231215-en
Behavioral task
behavioral25
Sample
Public/tools/adb.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral26
Sample
Public/tools/fastboot.exe
Resource
win7-20231215-en
Behavioral task
behavioral27
Sample
Public/tools/fastboot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
Public/tools/wget.exe
Resource
win7-20231215-en
Behavioral task
behavioral29
Sample
Public/tools/wget.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
Public/tools/x64/devcon.exe
Resource
win7-20231215-en
Behavioral task
behavioral31
Sample
Public/tools/x64/devcon.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral32
Sample
Public/tools/x86/devcon.exe
Resource
win7-20231215-en
General
-
Target
Public/run.bat
-
Size
15KB
-
MD5
dc3e558fcc4e091a57ed9eafc47db270
-
SHA1
acf2de4e069dda1de34866cb5d953efeb6d50455
-
SHA256
17a08894935a660cae3bb1b5bcb3c55984138b7f46e5fae038c8482830618226
-
SHA512
365d2cbe3e6b60e34578ebc228d7715d893b15e9d893b18194d947fa2e1b5163c990873821ce85a964e67fb03ad84666119f62a978f5535a9b17b1487e535ed2
-
SSDEEP
192:XkZPtqxvl6V1pWhirR1mTCX1ww7CvFTm13Tvo4H45nZuejKkw7Q6fgXc9cb:UpOAVysO0QvU9Q4n1g7
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4644 wrote to memory of 1280 4644 cmd.exe 88 PID 4644 wrote to memory of 1280 4644 cmd.exe 88 PID 4644 wrote to memory of 1280 4644 cmd.exe 88 PID 4644 wrote to memory of 4640 4644 cmd.exe 92 PID 4644 wrote to memory of 4640 4644 cmd.exe 92 PID 4644 wrote to memory of 4640 4644 cmd.exe 92 PID 4640 wrote to memory of 5024 4640 adb.exe 93 PID 4640 wrote to memory of 5024 4640 adb.exe 93 PID 4640 wrote to memory of 5024 4640 adb.exe 93 PID 4644 wrote to memory of 4684 4644 cmd.exe 96 PID 4644 wrote to memory of 4684 4644 cmd.exe 96 PID 4684 wrote to memory of 3288 4684 cmd.exe 97 PID 4684 wrote to memory of 3288 4684 cmd.exe 97 PID 4684 wrote to memory of 3288 4684 cmd.exe 97 PID 4644 wrote to memory of 640 4644 cmd.exe 98 PID 4644 wrote to memory of 640 4644 cmd.exe 98 PID 640 wrote to memory of 2324 640 cmd.exe 99 PID 640 wrote to memory of 2324 640 cmd.exe 99 PID 640 wrote to memory of 2324 640 cmd.exe 99 PID 4644 wrote to memory of 4044 4644 cmd.exe 102 PID 4644 wrote to memory of 4044 4644 cmd.exe 102 PID 4044 wrote to memory of 4936 4044 cmd.exe 101 PID 4044 wrote to memory of 4936 4044 cmd.exe 101 PID 4044 wrote to memory of 4936 4044 cmd.exe 101 PID 4044 wrote to memory of 740 4044 cmd.exe 100 PID 4044 wrote to memory of 740 4044 cmd.exe 100 PID 4644 wrote to memory of 1404 4644 cmd.exe 104 PID 4644 wrote to memory of 1404 4644 cmd.exe 104 PID 1404 wrote to memory of 1336 1404 cmd.exe 103 PID 1404 wrote to memory of 1336 1404 cmd.exe 103
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Public\run.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\Public\tools\adb.exetools\adb kill-server2⤵PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\Public\tools\adb.exetools\adb start-server2⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\Public\tools\adb.exeadb fork-server server3⤵PID:5024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tools\adb devices2⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\Public\tools\adb.exetools\adb devices3⤵PID:3288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tools\fastboot devices2⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Public\tools\fastboot.exetools\fastboot devices3⤵PID:2324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tools\adb shell idme ? | find /I "bootmode"2⤵
- Suspicious use of WriteProcessMemory
PID:4044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "findstr /b /c:":menu_" "C:\Users\Admin\AppData\Local\Temp\Public\run.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1404
-
-
C:\Windows\system32\find.exefind /I "bootmode"1⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\Public\tools\adb.exetools\adb shell idme ?1⤵PID:4936
-
C:\Windows\system32\findstr.exefindstr /b /c:":menu_" "C:\Users\Admin\AppData\Local\Temp\Public\run.bat"1⤵PID:1336