Analysis
-
max time kernel
301s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01-11-2023 04:53
Behavioral task
behavioral1
Sample
df0b5dec580dacc7a825114817e91bfc77378f553caf38920d73f17c0b05de59.apk
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
df0b5dec580dacc7a825114817e91bfc77378f553caf38920d73f17c0b05de59.apk
Resource
win10-20231020-en
General
-
Target
df0b5dec580dacc7a825114817e91bfc77378f553caf38920d73f17c0b05de59.apk
-
Size
986KB
-
MD5
f781050ed3b5e54fb70798e8f45b45f1
-
SHA1
1420adb2722bee5ffd8451a255d456c2f3939d4d
-
SHA256
df0b5dec580dacc7a825114817e91bfc77378f553caf38920d73f17c0b05de59
-
SHA512
19f09a1b003043458ecbe5f247f7ef9113e11744e6fbcf6b41d10c16b25c8b14c890d1fd6719bd47151f1d02ce04b20fdb54c5968180fb06dc33f10182a02506
-
SSDEEP
24576:v1X2ldFd0cbu8sVCz6QXEZw2mgaD7wvtuLoccgSeUYI:NAFdDqVCWQXEZw2mgi8NccgSJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\apk_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\apk_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\apk_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\apk_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\apk_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\.apk\ = "apk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000_CLASSES\.apk rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2676 AcroRd32.exe 2676 AcroRd32.exe 2676 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1168 wrote to memory of 2780 1168 cmd.exe 29 PID 1168 wrote to memory of 2780 1168 cmd.exe 29 PID 1168 wrote to memory of 2780 1168 cmd.exe 29 PID 2780 wrote to memory of 2676 2780 rundll32.exe 30 PID 2780 wrote to memory of 2676 2780 rundll32.exe 30 PID 2780 wrote to memory of 2676 2780 rundll32.exe 30 PID 2780 wrote to memory of 2676 2780 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\df0b5dec580dacc7a825114817e91bfc77378f553caf38920d73f17c0b05de59.apk1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\df0b5dec580dacc7a825114817e91bfc77378f553caf38920d73f17c0b05de59.apk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\df0b5dec580dacc7a825114817e91bfc77378f553caf38920d73f17c0b05de59.apk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55924d91570660801cd334071631cd95c
SHA1e666625a566304c3ddfb41db977e721f08b72c02
SHA2564c3553850efbb4c46f18b5eeccfc9d7b60ee967f084a0fef8aa8bfa4b96ed0ca
SHA512864e3748dee51cbeaeeb9c215798bf969df66f582fdc0d66d276fe979f396afb67a4214f680f5b0dfeae46557911f3be3d179113d05d801d652a22441b24b5f9