Overview
overview
7Static
static
7com.disney...om.apk
android-9-x86
7com.disney...om.apk
android-10-x64
7com.disney...om.apk
android-11-x64
7ADBMobileConfig.json
windows7-x64
3ADBMobileConfig.json
windows10-2004-x64
3AppstoreAu...ey.pem
windows7-x64
3AppstoreAu...ey.pem
windows10-2004-x64
3DSSHLSSubt...r.html
windows7-x64
1DSSHLSSubt...r.html
windows10-2004-x64
1baseline.prof
windows7-x64
3baseline.prof
windows10-2004-x64
3baseline.profm
windows7-x64
3baseline.profm
windows10-2004-x64
3braze-html...dge.js
windows7-x64
1braze-html...dge.js
windows10-2004-x64
1checkmark_...or.xml
windows7-x64
1checkmark_...or.xml
windows10-2004-x64
1default_ba...nd.xml
windows7-x64
1default_ba...nd.xml
windows10-2004-x64
1dictionary...s.json
windows7-x64
3dictionary...s.json
windows10-2004-x64
3dimens.xml
windows7-x64
1dimens.xml
windows10-2004-x64
1disney_logo.json
windows7-x64
3disney_logo.json
windows10-2004-x64
3focusable_...nu.xml
windows7-x64
1focusable_...nu.xml
windows10-2004-x64
1fontawesom...nt.ttf
windows7-x64
3fontawesom...nt.ttf
windows10-2004-x64
7fragment_a...gs.xml
windows7-x64
1fragment_a...gs.xml
windows10-2004-x64
1fragment_g...tv.xml
windows7-x64
1Analysis
-
max time kernel
152s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
com.disney.starplus_2.23.0-rc3-23081500_minAPI21(nodpi)_apkmirror.com.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
com.disney.starplus_2.23.0-rc3-23081500_minAPI21(nodpi)_apkmirror.com.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
com.disney.starplus_2.23.0-rc3-23081500_minAPI21(nodpi)_apkmirror.com.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
ADBMobileConfig.json
Resource
win7-20231020-en
Behavioral task
behavioral5
Sample
ADBMobileConfig.json
Resource
win10v2004-20231020-en
Behavioral task
behavioral6
Sample
AppstoreAuthenticationKey.pem
Resource
win7-20231020-en
Behavioral task
behavioral7
Sample
AppstoreAuthenticationKey.pem
Resource
win10v2004-20231023-en
Behavioral task
behavioral8
Sample
DSSHLSSubtitleRenderer.html
Resource
win7-20231023-en
Behavioral task
behavioral9
Sample
DSSHLSSubtitleRenderer.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
baseline.prof
Resource
win7-20231020-en
Behavioral task
behavioral11
Sample
baseline.prof
Resource
win10v2004-20231023-en
Behavioral task
behavioral12
Sample
baseline.profm
Resource
win7-20231020-en
Behavioral task
behavioral13
Sample
baseline.profm
Resource
win10v2004-20231023-en
Behavioral task
behavioral14
Sample
braze-html-in-app-message-bridge.js
Resource
win7-20231020-en
Behavioral task
behavioral15
Sample
braze-html-in-app-message-bridge.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
checkmark_selector.xml
Resource
win7-20231020-en
Behavioral task
behavioral17
Sample
checkmark_selector.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral18
Sample
default_background.xml
Resource
win7-20231025-en
Behavioral task
behavioral19
Sample
default_background.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral20
Sample
dictionary_versions.json
Resource
win7-20231023-en
Behavioral task
behavioral21
Sample
dictionary_versions.json
Resource
win10v2004-20231023-en
Behavioral task
behavioral22
Sample
dimens.xml
Resource
win7-20231020-en
Behavioral task
behavioral23
Sample
dimens.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral24
Sample
disney_logo.json
Resource
win7-20231023-en
Behavioral task
behavioral25
Sample
disney_logo.json
Resource
win10v2004-20231025-en
Behavioral task
behavioral26
Sample
focusable_tint_menu.xml
Resource
win7-20231020-en
Behavioral task
behavioral27
Sample
focusable_tint_menu.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral28
Sample
fontawesome-webfont.ttf
Resource
win7-20231023-en
Behavioral task
behavioral29
Sample
fontawesome-webfont.ttf
Resource
win10v2004-20231023-en
Behavioral task
behavioral30
Sample
fragment_app_settings.xml
Resource
win7-20231020-en
Behavioral task
behavioral31
Sample
fragment_app_settings.xml
Resource
win10v2004-20231025-en
Behavioral task
behavioral32
Sample
fragment_global_nav_tv.xml
Resource
win7-20231020-en
General
-
Target
ADBMobileConfig.json
-
Size
1KB
-
MD5
4d1ed12b448abbefa52e956c16362da8
-
SHA1
df15e9a896bf1c6fff6ff7286721b76cadeaaccb
-
SHA256
739a0ceb4413709e30ba76a01bf681c74b239bac242a3e2a36b014588f9f0b79
-
SHA512
890e6199d97a36d0e409b8d713f5d535f8d99d8006448fb4145e272624bbc237c08cb88b76f25c7a9c0dd13ba76f099a34849cb75e3b4ddaa96b6b4ef0d19fb1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2808 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2808 AcroRd32.exe 2808 AcroRd32.exe 2808 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2460 2244 cmd.exe 29 PID 2244 wrote to memory of 2460 2244 cmd.exe 29 PID 2244 wrote to memory of 2460 2244 cmd.exe 29 PID 2460 wrote to memory of 2808 2460 rundll32.exe 30 PID 2460 wrote to memory of 2808 2460 rundll32.exe 30 PID 2460 wrote to memory of 2808 2460 rundll32.exe 30 PID 2460 wrote to memory of 2808 2460 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ADBMobileConfig.json1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ADBMobileConfig.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ADBMobileConfig.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57befc4c500a879db9885d5f3816a12fe
SHA10cd16c9a4c1b407aa05b42bf79632575dfa4b3fa
SHA256c1135ad9feba2ac83effe2d36c0c8c190bfa924a09c7d434e171a43a95cc2dfd
SHA512805ccfa0c7191b4507b7f616022bbbb79887c3d558a6f0ebe5b058d659cf3cbf3417e81cda78b88eefcb9aace712f9733523665267e7adeb82ce62bcc53dde7a