Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
12-07-2023 18:32
Static task
static1
Behavioral task
behavioral1
Sample
Metalslugdefense1.15.0.apk
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Metalslugdefense1.15.0.apk
Resource
win10v2004-20230703-en
General
-
Target
Metalslugdefense1.15.0.apk
-
Size
27.7MB
-
MD5
c26f7509d98bd4551608b61ba1a65744
-
SHA1
77e3a111411f08fb7efb91f4258f0bd16c4b6563
-
SHA256
99d93b7349356e0b5686696b91e559dd323bc56eb1b2f72de3fa6b174c9ed093
-
SHA512
5eb2e6e01e35590967e97b2e30a546a0950f178b9d30611b7a02ee731338b94da97452dd32a2b33eca1bad435149cdbaef99e82290e168f7c5bc409e91735836
-
SSDEEP
786432:Dcf5nfCsNkKb5g9J0CsB5kNTdmlEEf78FIniy9IpDrfZ:DchnfhN55gvmB+h4lP82iWIlZ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\apk_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.apk rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\.apk\ = "apk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\apk_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\apk_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\apk_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\apk_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000_CLASSES\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3040 AcroRd32.exe 3040 AcroRd32.exe 3040 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2064 2324 cmd.exe 29 PID 2324 wrote to memory of 2064 2324 cmd.exe 29 PID 2324 wrote to memory of 2064 2324 cmd.exe 29 PID 2064 wrote to memory of 3040 2064 rundll32.exe 30 PID 2064 wrote to memory of 3040 2064 rundll32.exe 30 PID 2064 wrote to memory of 3040 2064 rundll32.exe 30 PID 2064 wrote to memory of 3040 2064 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Metalslugdefense1.15.0.apk1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Metalslugdefense1.15.0.apk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Metalslugdefense1.15.0.apk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3040
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dae64250a99f206cee553790824710b9
SHA1e989c73baf3d016c8346b1442e64e0d95a431385
SHA256508cc6c21ec1c8db30847c4373c103e36c2f6e93f5e26dfd835076f2156406d0
SHA51201cd3da0e56f23060f396156a217053efa48c1bfd296e6980f223c845acab0e6db29d9f88e5dcf754beffc76884afce8e1591d20866435df57c9f9317bd02552