Overview
overview
10Static
static
10搞机工�...pi.dll
windows7-x64
3搞机工�...pi.dll
windows10-2004-x64
3搞机工�...pi.dll
windows7-x64
3搞机工�...pi.dll
windows10-2004-x64
3搞机工�...or.cmd
windows7-x64
1搞机工�...or.cmd
windows10-2004-x64
1搞机工�...in.dll
windows7-x64
1搞机工�...in.dll
windows10-2004-x64
1搞机工�...db.exe
windows7-x64
3搞机工�...db.exe
windows10-2004-x64
3搞机工�...ot.exe
windows7-x64
3搞机工�...ot.exe
windows10-2004-x64
3搞机工�...v9.exe
windows7-x64
3搞机工�...v9.exe
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 02:28
Behavioral task
behavioral1
Sample
搞机工具箱9.93/AdbWinApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
搞机工具箱9.93/AdbWinApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
搞机工具箱9.93/AdbWinUsbApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
搞机工具箱9.93/AdbWinUsbApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
搞机工具箱9.93/Connector.cmd
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
搞机工具箱9.93/Connector.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
搞机工具箱9.93/MaterialSkin.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
搞机工具箱9.93/MaterialSkin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
搞机工具箱9.93/adb.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
搞机工具箱9.93/adb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
搞机工具箱9.93/fastboot.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
搞机工具箱9.93/fastboot.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
搞机工具箱9.93/搞机工具箱v9.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
搞机工具箱9.93/搞机工具箱v9.exe
Resource
win10v2004-20241007-en
General
-
Target
搞机工具箱9.93/搞机工具箱v9.exe
-
Size
1.4MB
-
MD5
f03636c348040a8585cf54982c2ccd45
-
SHA1
edf92650788c50af42dd5e5794b58e772b3370c9
-
SHA256
51bb97360e870301151ea4e66ebecae38beead15243c6a44df47da638f5841ef
-
SHA512
c7d136dfdbc01cc2aee8a15befcc173206145a07ffd30c1d405b84247c6f69c9f7b784be39015a79c95f7916ce679389f6217094574beab799cf7d6ec366dbfa
-
SSDEEP
6144:ejf46Vxew/VJaHOf0SEaKGY/voKgjETT6rGT/vKYzY6iXyZkUgfJuIARg1xctSe/:Kf46KHVPM6iikRYjEctJhJL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2772 2580 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fastboot.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
pid Process 2800 adb.exe 2628 fastboot.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2840 2668 搞机工具箱v9.exe 30 PID 2668 wrote to memory of 2840 2668 搞机工具箱v9.exe 30 PID 2668 wrote to memory of 2840 2668 搞机工具箱v9.exe 30 PID 2840 wrote to memory of 2800 2840 cmd.exe 32 PID 2840 wrote to memory of 2800 2840 cmd.exe 32 PID 2840 wrote to memory of 2800 2840 cmd.exe 32 PID 2840 wrote to memory of 2800 2840 cmd.exe 32 PID 2800 wrote to memory of 2580 2800 adb.exe 33 PID 2800 wrote to memory of 2580 2800 adb.exe 33 PID 2800 wrote to memory of 2580 2800 adb.exe 33 PID 2800 wrote to memory of 2580 2800 adb.exe 33 PID 2580 wrote to memory of 2772 2580 adb.exe 34 PID 2580 wrote to memory of 2772 2580 adb.exe 34 PID 2580 wrote to memory of 2772 2580 adb.exe 34 PID 2580 wrote to memory of 2772 2580 adb.exe 34 PID 2668 wrote to memory of 2740 2668 搞机工具箱v9.exe 35 PID 2668 wrote to memory of 2740 2668 搞机工具箱v9.exe 35 PID 2668 wrote to memory of 2740 2668 搞机工具箱v9.exe 35 PID 2740 wrote to memory of 2628 2740 cmd.exe 37 PID 2740 wrote to memory of 2628 2740 cmd.exe 37 PID 2740 wrote to memory of 2628 2740 cmd.exe 37 PID 2740 wrote to memory of 2628 2740 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\搞机工具箱9.93\搞机工具箱v9.exe"C:\Users\Admin\AppData\Local\Temp\搞机工具箱9.93\搞机工具箱v9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\cmd.exe"cmd.exe" /c adb devices2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\搞机工具箱9.93\adb.exeadb devices3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\搞机工具箱9.93\adb.exeadb -L tcp:5037 fork-server server --reply-fd 2204⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 3965⤵
- Program crash
PID:2772
-
-
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c fastboot devices2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\搞机工具箱9.93\fastboot.exefastboot devices3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2628
-
-