Overview
overview
10Static
static
10搞机工�...pi.dll
windows7-x64
3搞机工�...pi.dll
windows10-2004-x64
3搞机工�...pi.dll
windows7-x64
3搞机工�...pi.dll
windows10-2004-x64
3搞机工�...in.dll
windows7-x64
1搞机工�...in.dll
windows10-2004-x64
1搞机工�...st.bat
windows7-x64
1搞机工�...st.bat
windows10-2004-x64
1搞机工�...db.exe
windows7-x64
3搞机工�...db.exe
windows10-2004-x64
3搞机工�...ot.exe
windows7-x64
3搞机工�...ot.exe
windows10-2004-x64
3搞机工�...01.exe
windows7-x64
3搞机工�...01.exe
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 13:37
Behavioral task
behavioral1
Sample
搞机工具箱V9.01/AdbWinApi.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
搞机工具箱V9.01/AdbWinApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
搞机工具箱V9.01/AdbWinUsbApi.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
搞机工具箱V9.01/AdbWinUsbApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
搞机工具箱V9.01/MaterialSkin.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
搞机工具箱V9.01/MaterialSkin.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
搞机工具箱V9.01/Script/test.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
搞机工具箱V9.01/Script/test.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
搞机工具箱V9.01/adb.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
搞机工具箱V9.01/adb.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
搞机工具箱V9.01/fastboot.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
搞机工具箱V9.01/fastboot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
搞机工具箱V9.01/搞机工具箱v9.01.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
搞机工具箱V9.01/搞机工具箱v9.01.exe
Resource
win10v2004-20240802-en
General
-
Target
搞机工具箱V9.01/adb.exe
-
Size
6.0MB
-
MD5
f7eedae369737b81351c2aa936ed6ac5
-
SHA1
69fbf830327f0c36b3c620f4bab5e72f90a79bd8
-
SHA256
e79dc8fc3c6385192bdccd7ff7eabe3d5c1ec292475a06b04d82759f07655982
-
SHA512
9b49dce1b50b045028c8541db1c4176b5395bfa98cee9cf2c8999660d03ace2d251355192d0a84bf2b4784beee9ea805f94aba00f0db7ddcb8a4ae6e8c0b3a09
-
SSDEEP
98304:uOKVDv9CQ7wccHgHx7KXg3mwqQGGM0M4s+m:uttlybQG90M9
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2692 2000 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2692 2000 adb.exe 31 PID 2000 wrote to memory of 2692 2000 adb.exe 31 PID 2000 wrote to memory of 2692 2000 adb.exe 31 PID 2000 wrote to memory of 2692 2000 adb.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\搞机工具箱V9.01\adb.exe"C:\Users\Admin\AppData\Local\Temp\搞机工具箱V9.01\adb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 2202⤵
- Program crash
PID:2692
-