Resubmissions

19/02/2024, 16:37

240219-t4xgfsgc6w 1

19/02/2024, 16:15

240219-tqlsssgc48 3

Analysis

  • max time kernel
    120s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2024, 16:15

General

  • Target

    1227_10_1_CherryTale.apk

  • Size

    167.7MB

  • MD5

    938731e46b2083fcab5444b9b653fd78

  • SHA1

    0bcbb227efe73eb573362fadfc9e7620a747e043

  • SHA256

    cd363589a492bf8a622b2aed570d941ad6d87c60d415ff92c07ca98e494fe91c

  • SHA512

    72526dab59531c792047a44729b529f061ad2017563fc83d8c13ff4958ef11bd84e6bd45e672b133e3b85d583f1bc1b595fc22a1cde89f46dfa1ed18fd05cc8a

  • SSDEEP

    3145728:sb3aGkJrLUb5mGZL75AFBrMx2sRTWcqk3KaHySbt1DZB7yPNybP0nyH8+BUNe:sLaGssb5FZJ+g2QTWcqk6aHyIB2Iz0vK

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\1227_10_1_CherryTale.apk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1227_10_1_CherryTale.apk
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1227_10_1_CherryTale.apk"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    6cd596faff79ac207db4872ddb10221e

    SHA1

    c51e1e7be7b5be85ade1dbde1cf7944dbce3af19

    SHA256

    3048c479b9784b66419e4d0bbc97ee3959d4907a93bd17a89b6f009110eb2d28

    SHA512

    1773262c5bb534594460fa666d3ef2f76561c40c419946c70201a939a2aacbddd8b43a8c9d56a237854a4f8affaa8c2e5597d056526a67814b18b8a6af21fa97