Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 05:29
Static task
static1
Behavioral task
behavioral1
Sample
install_flutter.sh
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
install_flutter.sh
Resource
win10v2004-20240508-en
General
-
Target
install_flutter.sh
-
Size
2KB
-
MD5
5d8f421f837a40acb12ef95d15f24f3d
-
SHA1
0fff042e9e3dc23c8a415293c8a0dba9651725d1
-
SHA256
74a797b76134354d534961cba765486e1d5fd8be64c954cff7e3600c626f4abd
-
SHA512
c385253a2ac1cc963974552e3d47acbb9b12be53929e2627661250212331c24f7965cf768107cc4ff20abc3d2ad648863310fe00cd7fbfc0cb973090d2820298
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2592 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2592 AcroRd32.exe 2592 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2564 2420 cmd.exe 29 PID 2420 wrote to memory of 2564 2420 cmd.exe 29 PID 2420 wrote to memory of 2564 2420 cmd.exe 29 PID 2564 wrote to memory of 2592 2564 rundll32.exe 30 PID 2564 wrote to memory of 2592 2564 rundll32.exe 30 PID 2564 wrote to memory of 2592 2564 rundll32.exe 30 PID 2564 wrote to memory of 2592 2564 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\install_flutter.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\install_flutter.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\install_flutter.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56e424a3bfd0fc514b5cd42e72591f4b6
SHA1a69c1d37ae7cc49886c3811dc8a4f08c14e5a862
SHA2564a9e274e166594d22ca26a793fae44e75936f721f7a58a65ff0320f3a10417f1
SHA51221fac874100dfc415f3a98d54b4eeeace7ac2c3c73f06edf987e83156135bc1456adb4831ef777a4aae9140c1c5026c6e528c928e73d4b15374c349c9c05f5e7