Malware Analysis Report

2025-01-23 12:38

Sample ID 230428-w9xqhshf6x
Target WH-ApkCrypter-V2-master.zip
SHA256 40facb6a92d8957e1b15a622047b24f7a638761e2bb5d58715f4b49fd12e596f
Tags
spynote
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

40facb6a92d8957e1b15a622047b24f7a638761e2bb5d58715f4b49fd12e596f

Threat Level: Known bad

The file WH-ApkCrypter-V2-master.zip was found to be: Known bad.

Malicious Activity Summary

spynote

Spynote family

Requests dangerous framework permissions

Unsigned PE

Program crash

Suspicious use of WriteProcessMemory

Checks processor information in registry

Enumerates system info in registry

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-04-28 18:38

Signatures

Spynote family

spynote

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-04-28 18:37

Reported

2023-04-28 18:41

Platform

win10v2004-20230220-en

Max time kernel

60s

Max time network

112s

Command Line

"C:\Users\Admin\AppData\Local\Temp\WH-ApkCrypter-V2-master\WH-Apkcrypter-v2.1.exe"

Signatures

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\WH-ApkCrypter-V2-master\WH-Apkcrypter-v2.1.exe

"C:\Users\Admin\AppData\Local\Temp\WH-ApkCrypter-V2-master\WH-Apkcrypter-v2.1.exe"

C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe

dw20.exe -x -s 1064

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -pss -s 496 -p 3324 -ip 3324

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 3324 -s 1112

Network

Country Destination Domain Proto
US 209.197.3.8:80 tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 20.42.65.90:443 tcp
US 40.125.122.151:443 tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 93.184.220.29:80 tcp
US 67.24.33.254:80 tcp
NL 173.223.113.164:443 tcp
US 131.253.33.203:80 tcp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 64.13.109.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 2.36.159.162.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 209.197.3.8:80 tcp

Files

memory/3324-133-0x0000000004410000-0x0000000004420000-memory.dmp

memory/3324-134-0x0000000000B10000-0x0000000003A9A000-memory.dmp

memory/3324-135-0x000000001EA40000-0x000000001EAE6000-memory.dmp

memory/3324-136-0x000000001EFC0000-0x000000001F48E000-memory.dmp

memory/3324-137-0x0000000004410000-0x0000000004420000-memory.dmp

memory/3324-138-0x000000001F590000-0x000000001F62C000-memory.dmp

memory/3324-139-0x0000000004540000-0x0000000004548000-memory.dmp

memory/3324-140-0x000000001F6F0000-0x000000001F73C000-memory.dmp

memory/3324-141-0x0000000004410000-0x0000000004420000-memory.dmp

memory/3324-142-0x0000000004410000-0x0000000004420000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-04-28 18:37

Reported

2023-04-28 18:40

Platform

win10v2004-20230220-en

Max time kernel

118s

Max time network

129s

Command Line

C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\WH-ApkCrypter-V2-master.zip

Signatures

N/A

Processes

C:\Windows\Explorer.exe

C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\WH-ApkCrypter-V2-master.zip

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 93.184.220.29:80 tcp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 20.189.173.12:443 tcp
US 40.125.122.176:443 tcp
NL 8.238.20.126:80 tcp
NL 173.223.113.164:443 tcp
NL 173.223.113.131:80 tcp
US 131.253.33.203:80 tcp
US 8.8.8.8:53 64.13.109.52.in-addr.arpa udp
US 40.125.122.176:443 tcp
US 209.197.3.8:80 tcp
US 40.125.122.176:443 tcp
US 40.125.122.176:443 tcp
US 40.125.122.176:443 tcp

Files

N/A