Overview
overview
10Static
static
10搞机工�...pi.dll
windows7-x64
3搞机工�...pi.dll
windows10-2004-x64
3搞机工�...pi.dll
windows7-x64
3搞机工�...pi.dll
windows10-2004-x64
3搞机工�...or.cmd
windows7-x64
1搞机工�...or.cmd
windows10-2004-x64
1搞机工�...in.dll
windows7-x64
1搞机工�...in.dll
windows10-2004-x64
1搞机工�...db.exe
windows7-x64
3搞机工�...db.exe
windows10-2004-x64
3搞机工�...ot.exe
windows7-x64
3搞机工�...ot.exe
windows10-2004-x64
3搞机工�...v9.exe
windows7-x64
3搞机工�...v9.exe
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 02:28
Behavioral task
behavioral1
Sample
搞机工具箱9.93/AdbWinApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
搞机工具箱9.93/AdbWinApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
搞机工具箱9.93/AdbWinUsbApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
搞机工具箱9.93/AdbWinUsbApi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
搞机工具箱9.93/Connector.cmd
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
搞机工具箱9.93/Connector.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
搞机工具箱9.93/MaterialSkin.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
搞机工具箱9.93/MaterialSkin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
搞机工具箱9.93/adb.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
搞机工具箱9.93/adb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
搞机工具箱9.93/fastboot.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
搞机工具箱9.93/fastboot.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
搞机工具箱9.93/搞机工具箱v9.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
搞机工具箱9.93/搞机工具箱v9.exe
Resource
win10v2004-20241007-en
General
-
Target
搞机工具箱9.93/搞机工具箱v9.exe
-
Size
1.4MB
-
MD5
f03636c348040a8585cf54982c2ccd45
-
SHA1
edf92650788c50af42dd5e5794b58e772b3370c9
-
SHA256
51bb97360e870301151ea4e66ebecae38beead15243c6a44df47da638f5841ef
-
SHA512
c7d136dfdbc01cc2aee8a15befcc173206145a07ffd30c1d405b84247c6f69c9f7b784be39015a79c95f7916ce679389f6217094574beab799cf7d6ec366dbfa
-
SSDEEP
6144:ejf46Vxew/VJaHOf0SEaKGY/voKgjETT6rGT/vKYzY6iXyZkUgfJuIARg1xctSe/:Kf46KHVPM6iikRYjEctJhJL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fastboot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4596 wrote to memory of 3680 4596 搞机工具箱v9.exe 87 PID 4596 wrote to memory of 3680 4596 搞机工具箱v9.exe 87 PID 3680 wrote to memory of 3520 3680 cmd.exe 89 PID 3680 wrote to memory of 3520 3680 cmd.exe 89 PID 3680 wrote to memory of 3520 3680 cmd.exe 89 PID 3520 wrote to memory of 1224 3520 adb.exe 94 PID 3520 wrote to memory of 1224 3520 adb.exe 94 PID 3520 wrote to memory of 1224 3520 adb.exe 94 PID 4596 wrote to memory of 3788 4596 搞机工具箱v9.exe 95 PID 4596 wrote to memory of 3788 4596 搞机工具箱v9.exe 95 PID 3788 wrote to memory of 1196 3788 cmd.exe 97 PID 3788 wrote to memory of 1196 3788 cmd.exe 97 PID 3788 wrote to memory of 1196 3788 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\搞机工具箱9.93\搞机工具箱v9.exe"C:\Users\Admin\AppData\Local\Temp\搞机工具箱9.93\搞机工具箱v9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c adb devices2⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\搞机工具箱9.93\adb.exeadb devices3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\搞机工具箱9.93\adb.exeadb -L tcp:5037 fork-server server --reply-fd 5724⤵
- System Location Discovery: System Language Discovery
PID:1224
-
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c fastboot devices2⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\搞机工具箱9.93\fastboot.exefastboot devices3⤵
- System Location Discovery: System Language Discovery
PID:1196
-
-