Overview
overview
3Static
static
1sample.tar
windows10-1703-x64
3aircrack-n...aph-ng
windows10-1703-x64
1aircrack-n...t__.py
windows10-1703-x64
3aircrack-n...rse.py
windows10-1703-x64
3aircrack-n...rse.py
windows10-1703-x64
3aircrack-n...viz.py
windows10-1703-x64
3aircrack-n...p-join
windows10-1703-x64
1aircrack-n...tup.py
windows10-1703-x64
3aircrack-n...reebsd
windows10-1703-x64
3aircrack-n....linux
windows10-1703-x64
3aircrack-n...update
windows10-1703-x64
1aircrack-n...ack.py
windows10-1703-x64
3aircrack-n...uck-ng
windows10-1703-x64
1aircrack-n...ng.vbs
windows10-1703-x64
1aircrack-n...ng.vbs
windows10-1703-x64
1aircrack-n...ng.vbs
windows10-1703-x64
1aircrack-n...mon.sh
windows10-1703-x64
3aircrack-n...lay.py
windows10-1703-x64
3aircrack-n...001.sh
windows10-1703-x64
3aircrack-n...002.sh
windows10-1703-x64
3aircrack-n...003.sh
windows10-1703-x64
3aircrack-n...001.sh
windows10-1703-x64
3aircrack-n...002.sh
windows10-1703-x64
3aircrack-n...003.sh
windows10-1703-x64
3aircrack-n...004.sh
windows10-1703-x64
3aircrack-n...005.sh
windows10-1703-x64
3aircrack-n...006.sh
windows10-1703-x64
3aircrack-n...007.sh
windows10-1703-x64
3aircrack-n...008.sh
windows10-1703-x64
3aircrack-n...009.sh
windows10-1703-x64
3aircrack-n...010.sh
windows10-1703-x64
3aircrack-n...011.sh
windows10-1703-x64
3Analysis
-
max time kernel
134s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27/06/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
sample.tar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airgraph-ng
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airgraphviz/__init__.py
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airgraphviz/libDumpParse.py
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airgraphviz/libOuiParse.py
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airgraphviz/lib_Airgraphviz.py
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
aircrack-ng-1.7/scripts/airgraph-ng/airodump-join
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
aircrack-ng-1.7/scripts/airgraph-ng/setup.py
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
aircrack-ng-1.7/scripts/airmon-ng.freebsd
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
aircrack-ng-1.7/scripts/airmon-ng.linux
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
aircrack-ng-1.7/scripts/airodump-ng-oui-update
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
aircrack-ng-1.7/scripts/dcrack.py
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
aircrack-ng-1.7/scripts/versuck-ng/versuck-ng
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
aircrack-ng-1.7/src/airbase-ng/airbase-ng.vbs
Resource
win10-20240611-en
Behavioral task
behavioral15
Sample
aircrack-ng-1.7/src/airventriloquist-ng/airventriloquist-ng.vbs
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
aircrack-ng-1.7/src/packetforge-ng/packetforge-ng.vbs
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
aircrack-ng-1.7/test/int-test-common.sh
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
aircrack-ng-1.7/test/replay.py
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
aircrack-ng-1.7/test/test-airbase-ng-0001.sh
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
aircrack-ng-1.7/test/test-airbase-ng-0002.sh
Resource
win10-20240611-en
Behavioral task
behavioral21
Sample
aircrack-ng-1.7/test/test-airbase-ng-0003.sh
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0001.sh
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0002.sh
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0003.sh
Resource
win10-20240611-en
Behavioral task
behavioral25
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0004.sh
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0005.sh
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0006.sh
Resource
win10-20240611-en
Behavioral task
behavioral28
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0007.sh
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0008.sh
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0009.sh
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0010.sh
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
aircrack-ng-1.7/test/test-aircrack-ng-0011.sh
Resource
win10-20240404-en
General
-
Target
aircrack-ng-1.7/scripts/airmon-ng.linux
-
Size
51KB
-
MD5
f37fb37b4350c8766b9125d4ca7fb2e6
-
SHA1
5070c12454a64c0492eb023b8756d698ce7e832d
-
SHA256
6f24e33bf1f594808f56bdbcd5db6f1b025248dd730a066bc4817affa21cab01
-
SHA512
966f59a228a00f9efa846bf2d594feb63d52f294357deb09f7400f661a41a4a1083d8140d0a874fdf58d32ce6aaaa9fa7af3e0a50857332b799b1127d6e2571f
-
SSDEEP
768:4QfzTM67cY6xQAVQ1gNp812lj2UKXq/+9Ep:4E776x3V986j2U8qW6p
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4892 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\aircrack-ng-1.7\scripts\airmon-ng.linux1⤵
- Modifies registry class
PID:4448
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4892