Overview
overview
3Static
static
3twrpxz3.zip
windows7-x64
3twrpxz3.zip
windows10-2004-x64
1twrpxz3/AdbWinApi.dll
windows7-x64
3twrpxz3/AdbWinApi.dll
windows10-2004-x64
3twrpxz3/Ad...pi.dll
windows7-x64
3twrpxz3/Ad...pi.dll
windows10-2004-x64
3twrpxz3/BootTWRP.cmd
windows7-x64
3twrpxz3/BootTWRP.cmd
windows10-2004-x64
3twrpxz3/fastboot.exe
windows7-x64
3twrpxz3/fastboot.exe
windows10-2004-x64
3twrpxz3/tw...ki.img
windows7-x64
3twrpxz3/tw...ki.img
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
twrpxz3.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
twrpxz3.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
twrpxz3/AdbWinApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
twrpxz3/AdbWinApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
twrpxz3/AdbWinUsbApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
twrpxz3/AdbWinUsbApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
twrpxz3/BootTWRP.cmd
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
twrpxz3/BootTWRP.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
twrpxz3/fastboot.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
twrpxz3/fastboot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
twrpxz3/twrp-akatsuki.img
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
twrpxz3/twrp-akatsuki.img
Resource
win10v2004-20240802-en
General
-
Target
twrpxz3/BootTWRP.cmd
-
Size
277B
-
MD5
31b842991b601e4f8de4008227fde391
-
SHA1
12a6110c55ded80a9cc32e50b872a0c031c96d40
-
SHA256
2aa61b07c5a5ab8c807ec6309f7a9841953bc9d7329629b2cc2c798d96b59290
-
SHA512
b30e2a9fe13270c0f612739b60a88b7583e3ed14a0b97b0220a5d1b1dba4f2228289188fdc34f346f964aed87eab26e6936a70b52a2bad67d4156815f4e34de9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fastboot.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3332 wrote to memory of 4444 3332 cmd.exe 83 PID 3332 wrote to memory of 4444 3332 cmd.exe 83 PID 3332 wrote to memory of 4444 3332 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\twrpxz3\BootTWRP.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\twrpxz3\fastboot.exefastboot reboot bootloader2⤵
- System Location Discovery: System Language Discovery
PID:4444
-