Overview
overview
10Static
static
10www/backen...ate.sh
windows7-x64
3www/backen...ate.sh
windows10-2004-x64
3www/backen...ler.js
windows7-x64
1www/backen...ler.js
windows10-2004-x64
1www/backen...ler.js
windows7-x64
1www/backen...ler.js
windows10-2004-x64
1www/backen...ler.js
windows7-x64
1www/backen...ler.js
windows10-2004-x64
1www/backen...ler.js
windows7-x64
1www/backen...ler.js
windows10-2004-x64
1www/backen...rce.js
windows7-x64
1www/backen...rce.js
windows10-2004-x64
1www/backen...der.js
windows7-x64
1www/backen...der.js
windows10-2004-x64
1www/backen...ice.js
windows7-x64
1www/backen...ice.js
windows10-2004-x64
1www/backen...ice.js
windows7-x64
1www/backen...ice.js
windows10-2004-x64
1www/backend/artisan
ubuntu-18.04-amd64
1www/backend/artisan
debian-9-armhf
7www/backend/artisan
debian-9-mips
1www/backend/artisan
debian-9-mipsel
7www/backen...er.ps1
windows7-x64
1www/backen...er.ps1
windows10-2004-x64
1www/backen...l.html
windows7-x64
1www/backen...l.html
windows10-2004-x64
1www/backen...p.html
windows7-x64
1www/backen...p.html
windows10-2004-x64
1www/backen...e.html
windows7-x64
1www/backen...e.html
windows10-2004-x64
1www/backen...d.html
windows7-x64
1www/backen...d.html
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 20:54
Behavioral task
behavioral1
Sample
www/backend/23.02.2023-update.sh
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
www/backend/23.02.2023-update.sh
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
www/backend/app/Http/Controllers/Api/v1/AutoCommandsController.js
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
www/backend/app/Http/Controllers/Api/v1/AutoCommandsController.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
www/backend/app/Http/Controllers/Api/v1/Bot/BotInjectionController.js
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
www/backend/app/Http/Controllers/Api/v1/Bot/BotInjectionController.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
www/backend/app/Http/Controllers/Api/v1/LogController.js
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
www/backend/app/Http/Controllers/Api/v1/LogController.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
www/backend/app/Http/Controllers/Api/v1/UserController.js
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
www/backend/app/Http/Controllers/Api/v1/UserController.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
www/backend/app/Http/Resources/Bot/BotResource.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
www/backend/app/Http/Resources/Bot/BotResource.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
www/backend/app/Providers/RouteServiceProvider.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
www/backend/app/Providers/RouteServiceProvider.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
www/backend/app/Services/InjectionsService.js
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
www/backend/app/Services/InjectionsService.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
www/backend/app/Services/LogsService/LogsService.js
Resource
win7-20240319-en
Behavioral task
behavioral18
Sample
www/backend/app/Services/LogsService/LogsService.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
www/backend/artisan
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral20
Sample
www/backend/artisan
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral21
Sample
www/backend/artisan
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral22
Sample
www/backend/artisan
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral23
Sample
www/backend/database/seeders/RolesSeeder.ps1
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
www/backend/database/seeders/RolesSeeder.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
www/backend/public/injects/html/banks/ae.ahb.digital.html
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
www/backend/public/injects/html/banks/ae.ahb.digital.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
www/backend/public/injects/html/banks/ae.almasraf.mobileapp.html
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
www/backend/public/injects/html/banks/ae.almasraf.mobileapp.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
www/backend/public/injects/html/banks/ae.hsbc.hsbcuae.html
Resource
win7-20240319-en
Behavioral task
behavioral30
Sample
www/backend/public/injects/html/banks/ae.hsbc.hsbcuae.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
www/backend/public/injects/html/banks/air.app.scb.breeze.android.main.my.prod.html
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
www/backend/public/injects/html/banks/air.app.scb.breeze.android.main.my.prod.html
Resource
win10v2004-20240226-en
General
-
Target
www/backend/23.02.2023-update.sh
-
Size
340B
-
MD5
1d926c1aef4dd8d4f50d9df6bf955baa
-
SHA1
419d79f6fdf03adabc1f0284ccf8cc8ee164c1f7
-
SHA256
ed75942c4b85bfc875f2405f19e73701dfc0525fa197247a01db0d609209872a
-
SHA512
40444a5e8537a39eadb82c37e833a5ec5d1849b32ffb9ba8c836dffec707b177a7d24ee16a0b26e1f315a7a04e23fecca77cc381f33d927bc2300370a828f438
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2608 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2608 AcroRd32.exe 2608 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1536 wrote to memory of 2680 1536 cmd.exe 31 PID 1536 wrote to memory of 2680 1536 cmd.exe 31 PID 1536 wrote to memory of 2680 1536 cmd.exe 31 PID 2680 wrote to memory of 2608 2680 rundll32.exe 32 PID 2680 wrote to memory of 2608 2680 rundll32.exe 32 PID 2680 wrote to memory of 2608 2680 rundll32.exe 32 PID 2680 wrote to memory of 2608 2680 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\www\backend\23.02.2023-update.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\www\backend\23.02.2023-update.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\www\backend\23.02.2023-update.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55738790dbce67b0dfbdfcec1a12d471e
SHA1a4971c57bf528530ed422cfa01c789d05d7f9ce7
SHA2560e0048844cfe85e5bf0163efeadd5dbbd779ab166778d22e4d23d56d601a44a6
SHA512ccabbdf8812e92a68fc7cf88615762820ab592de8f79f476ed99619c485a5bba855235807d3b0dee79c253b81be6e6e8c2a575b746f2a8534f6326331ac85b3a