Analysis

  • max time kernel
    140s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 14:01

General

  • Target

    scrcpy-win64-v2.6.1/scrcpy-console.bat

  • Size

    51B

  • MD5

    7b8d3b0d87dd886730d4993af807fae1

  • SHA1

    2b1a383c41fc2a571165cd2b640a6b8a936d5559

  • SHA256

    b49a3eb642898269e7e690e80f3de17898f966f69e75f11abeb31eb7023b0ee5

  • SHA512

    805ad1f121432b0edb22fefecffe76e3071ef1eaba073fab0d57e0bee4c379a34f154dbf9fc980c3412a917969275cf7af4528b36746834693687ed7d0011fdd

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\scrcpy-win64-v2.6.1\scrcpy-console.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\scrcpy-win64-v2.6.1\scrcpy.exe
      scrcpy.exe --pause-on-exit=if-error
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Users\Admin\AppData\Local\Temp\scrcpy-win64-v2.6.1\adb.exe
        adb start-server
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1220
        • C:\Users\Admin\AppData\Local\Temp\scrcpy-win64-v2.6.1\adb.exe
          adb -L tcp:5037 fork-server server --reply-fd 232
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 488
            5⤵
            • Program crash
            PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1472-1-0x000007FEF7810000-0x000007FEF79CA000-memory.dmp

    Filesize

    1.7MB

  • memory/1472-0-0x000000013F260000-0x000000013F379000-memory.dmp

    Filesize

    1.1MB

  • memory/1472-2-0x000007FEF6200000-0x000007FEF659B000-memory.dmp

    Filesize

    3.6MB

  • memory/1472-6-0x000007FEFAFC0000-0x000007FEFAFFE000-memory.dmp

    Filesize

    248KB

  • memory/1472-5-0x000007FEF7760000-0x000007FEF7801000-memory.dmp

    Filesize

    644KB

  • memory/1472-4-0x000007FEFB000000-0x000007FEFB027000-memory.dmp

    Filesize

    156KB

  • memory/1472-3-0x000007FEF50E0000-0x000007FEF61F6000-memory.dmp

    Filesize

    17.1MB