Overview
overview
10Static
static
10144778790d...8e.apk
android-9-x86
1LenovoSafeBox455.apk
android-9-x86
1LenovoSafeBox455.apk
android-10-x64
1LenovoSafeBox455.apk
android-11-x64
1LenovoSafe...15.apk
android-9-x86
1LenovoSafe...15.apk
android-10-x64
1LenovoSafe...15.apk
android-11-x64
1nb.apk
android-9-x86
nb.apk
android-10-x64
nb.apk
android-11-x64
530b4f4d13...5f.apk
windows7-x64
3530b4f4d13...5f.apk
windows10-2004-x64
3bd8cda80aa...2a.apk
android-9-x86
1bd8cda80aa...2a.apk
android-10-x64
1bd8cda80aa...2a.apk
android-11-x64
1cc9517aafb...c1.apk
android-9-x86
1cc9517aafb...c1.apk
android-10-x64
1cc9517aafb...c1.apk
android-11-x64
1d257cfde75...20.apk
android-9-x86
8Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 01:44
Behavioral task
behavioral1
Sample
144778790d4a43a1d93dff6b660a6acb3a6d37a19e6a6f0a6bf1ef47e919648e.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
LenovoSafeBox455.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral3
Sample
LenovoSafeBox455.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral4
Sample
LenovoSafeBox455.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral5
Sample
LenovoSafeWidget115.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral6
Sample
LenovoSafeWidget115.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral7
Sample
LenovoSafeWidget115.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral8
Sample
nb.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral9
Sample
nb.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral10
Sample
nb.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral11
Sample
530b4f4d139f3ef987d661b2a9f74f5f.apk
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
530b4f4d139f3ef987d661b2a9f74f5f.apk
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
bd8cda80aaee3e4a17e9967a1c062ac5c8e4aefd7eaa3362f54044c2c94db52a.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral14
Sample
bd8cda80aaee3e4a17e9967a1c062ac5c8e4aefd7eaa3362f54044c2c94db52a.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral15
Sample
bd8cda80aaee3e4a17e9967a1c062ac5c8e4aefd7eaa3362f54044c2c94db52a.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral16
Sample
cc9517aafb58279091ac17533293edc1.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral17
Sample
cc9517aafb58279091ac17533293edc1.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral18
Sample
cc9517aafb58279091ac17533293edc1.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral19
Sample
d257cfde7599f4e20ee08a62053e6b3b936c87d373e6805f0e0c65f1d39ec320.apk
Resource
android-x86-arm-20240221-en
General
-
Target
530b4f4d139f3ef987d661b2a9f74f5f.apk
-
Size
27KB
-
MD5
530b4f4d139f3ef987d661b2a9f74f5f
-
SHA1
cf1267119890c3b663fbffe5fbf4d8116316d88c
-
SHA256
fa538fc20af8aa198db5e932b2afaf9710633a49cf3e19b7465175520e3e8b47
-
SHA512
bc86a69e2a525bcd951d336b97e5ed99a75223f969b5ef4c77293b9a04f746263eaeb4f164e0c31389801c294776d30bee8df6584ac102196902d09d5f100eb4
-
SSDEEP
768:20gSC730q3+QRzjuBR8zlZtkDd1BKgTeawda6I6X6l64vfiobQTbv3yHtAN8a1LY:2Be/c/ShUWaRW7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\apk_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\apk_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.apk rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\apk_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.apk\ = "apk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\apk_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\apk_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2656 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2656 AcroRd32.exe 2656 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2560 2684 cmd.exe 29 PID 2684 wrote to memory of 2560 2684 cmd.exe 29 PID 2684 wrote to memory of 2560 2684 cmd.exe 29 PID 2560 wrote to memory of 2656 2560 rundll32.exe 30 PID 2560 wrote to memory of 2656 2560 rundll32.exe 30 PID 2560 wrote to memory of 2656 2560 rundll32.exe 30 PID 2560 wrote to memory of 2656 2560 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\530b4f4d139f3ef987d661b2a9f74f5f.apk1⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\530b4f4d139f3ef987d661b2a9f74f5f.apk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\530b4f4d139f3ef987d661b2a9f74f5f.apk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bb51ccd2c80a806c898fc5bd4072690b
SHA10e8475a824225e807c5727577b31b16564314696
SHA256ec0c76a0e889516a5b348fcf4091f7dc38950dc61f4b522f6b0f824993e64ac5
SHA51250c0b8524d63a3695adae640cec5159d983faa9cb5f459b031a68a5a20e4e39cec8f8ab2444c4252fab79da3c9d7f225bd83ba9605742c4ffe6afeef32b072e9