Resubmissions

19/02/2024, 16:37

240219-t4xgfsgc6w 1

19/02/2024, 16:15

240219-tqlsssgc48 3

Analysis

  • max time kernel
    88s
  • max time network
    187s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/02/2024, 16:15

General

  • Target

    1227_10_1_CherryTale.apk

  • Size

    167.7MB

  • MD5

    938731e46b2083fcab5444b9b653fd78

  • SHA1

    0bcbb227efe73eb573362fadfc9e7620a747e043

  • SHA256

    cd363589a492bf8a622b2aed570d941ad6d87c60d415ff92c07ca98e494fe91c

  • SHA512

    72526dab59531c792047a44729b529f061ad2017563fc83d8c13ff4958ef11bd84e6bd45e672b133e3b85d583f1bc1b595fc22a1cde89f46dfa1ed18fd05cc8a

  • SSDEEP

    3145728:sb3aGkJrLUb5mGZL75AFBrMx2sRTWcqk3KaHySbt1DZB7yPNybP0nyH8+BUNe:sLaGssb5FZJ+g2QTWcqk6aHyIB2Iz0vK

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\1227_10_1_CherryTale.apk
    1⤵
    • Modifies registry class
    PID:1900
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads