Overview
overview
10Static
static
10144778790d...8e.apk
android-9-x86
1LenovoSafeBox455.apk
android-9-x86
1LenovoSafeBox455.apk
android-10-x64
1LenovoSafeBox455.apk
android-11-x64
1LenovoSafe...15.apk
android-9-x86
1LenovoSafe...15.apk
android-10-x64
1LenovoSafe...15.apk
android-11-x64
1nb.apk
android-9-x86
nb.apk
android-10-x64
nb.apk
android-11-x64
530b4f4d13...5f.apk
windows7-x64
3530b4f4d13...5f.apk
windows10-2004-x64
3bd8cda80aa...2a.apk
android-9-x86
1bd8cda80aa...2a.apk
android-10-x64
1bd8cda80aa...2a.apk
android-11-x64
1cc9517aafb...c1.apk
android-9-x86
1cc9517aafb...c1.apk
android-10-x64
1cc9517aafb...c1.apk
android-11-x64
1d257cfde75...20.apk
android-9-x86
8Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 01:44
Behavioral task
behavioral1
Sample
144778790d4a43a1d93dff6b660a6acb3a6d37a19e6a6f0a6bf1ef47e919648e.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
LenovoSafeBox455.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral3
Sample
LenovoSafeBox455.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral4
Sample
LenovoSafeBox455.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral5
Sample
LenovoSafeWidget115.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral6
Sample
LenovoSafeWidget115.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral7
Sample
LenovoSafeWidget115.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral8
Sample
nb.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral9
Sample
nb.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral10
Sample
nb.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral11
Sample
530b4f4d139f3ef987d661b2a9f74f5f.apk
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
530b4f4d139f3ef987d661b2a9f74f5f.apk
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
bd8cda80aaee3e4a17e9967a1c062ac5c8e4aefd7eaa3362f54044c2c94db52a.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral14
Sample
bd8cda80aaee3e4a17e9967a1c062ac5c8e4aefd7eaa3362f54044c2c94db52a.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral15
Sample
bd8cda80aaee3e4a17e9967a1c062ac5c8e4aefd7eaa3362f54044c2c94db52a.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral16
Sample
cc9517aafb58279091ac17533293edc1.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral17
Sample
cc9517aafb58279091ac17533293edc1.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral18
Sample
cc9517aafb58279091ac17533293edc1.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral19
Sample
d257cfde7599f4e20ee08a62053e6b3b936c87d373e6805f0e0c65f1d39ec320.apk
Resource
android-x86-arm-20240221-en
General
-
Target
530b4f4d139f3ef987d661b2a9f74f5f.apk
-
Size
27KB
-
MD5
530b4f4d139f3ef987d661b2a9f74f5f
-
SHA1
cf1267119890c3b663fbffe5fbf4d8116316d88c
-
SHA256
fa538fc20af8aa198db5e932b2afaf9710633a49cf3e19b7465175520e3e8b47
-
SHA512
bc86a69e2a525bcd951d336b97e5ed99a75223f969b5ef4c77293b9a04f746263eaeb4f164e0c31389801c294776d30bee8df6584ac102196902d09d5f100eb4
-
SSDEEP
768:20gSC730q3+QRzjuBR8zlZtkDd1BKgTeawda6I6X6l64vfiobQTbv3yHtAN8a1LY:2Be/c/ShUWaRW7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2596 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\530b4f4d139f3ef987d661b2a9f74f5f.apk1⤵
- Modifies registry class
PID:4208
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2596