Analysis
-
max time kernel
120s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
1227_10_1_CherryTale.apk
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1227_10_1_CherryTale.apk
Resource
win10-20240214-en
Behavioral task
behavioral3
Sample
1227_10_1_CherryTale.apk
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
1227_10_1_CherryTale.apk
Resource
win11-20240214-en
General
-
Target
1227_10_1_CherryTale.apk
-
Size
167.7MB
-
MD5
938731e46b2083fcab5444b9b653fd78
-
SHA1
0bcbb227efe73eb573362fadfc9e7620a747e043
-
SHA256
cd363589a492bf8a622b2aed570d941ad6d87c60d415ff92c07ca98e494fe91c
-
SHA512
72526dab59531c792047a44729b529f061ad2017563fc83d8c13ff4958ef11bd84e6bd45e672b133e3b85d583f1bc1b595fc22a1cde89f46dfa1ed18fd05cc8a
-
SSDEEP
3145728:sb3aGkJrLUb5mGZL75AFBrMx2sRTWcqk3KaHySbt1DZB7yPNybP0nyH8+BUNe:sLaGssb5FZJ+g2QTWcqk6aHyIB2Iz0vK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\.apk\ = "apk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\apk_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\apk_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\apk_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\.apk rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\apk_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_CLASSES\apk_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3000 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3000 AcroRd32.exe 3000 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3012 3068 cmd.exe 29 PID 3068 wrote to memory of 3012 3068 cmd.exe 29 PID 3068 wrote to memory of 3012 3068 cmd.exe 29 PID 3012 wrote to memory of 3000 3012 rundll32.exe 30 PID 3012 wrote to memory of 3000 3012 rundll32.exe 30 PID 3012 wrote to memory of 3000 3012 rundll32.exe 30 PID 3012 wrote to memory of 3000 3012 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1227_10_1_CherryTale.apk1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1227_10_1_CherryTale.apk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1227_10_1_CherryTale.apk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56cd596faff79ac207db4872ddb10221e
SHA1c51e1e7be7b5be85ade1dbde1cf7944dbce3af19
SHA2563048c479b9784b66419e4d0bbc97ee3959d4907a93bd17a89b6f009110eb2d28
SHA5121773262c5bb534594460fa666d3ef2f76561c40c419946c70201a939a2aacbddd8b43a8c9d56a237854a4f8affaa8c2e5597d056526a67814b18b8a6af21fa97