Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
apktool_2.9.3.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
apktool_2.9.3.jar
Resource
win10v2004-20240412-en
General
-
Target
apktool_2.9.3.jar
-
Size
22.2MB
-
MD5
e28e4b4a413a252617d92b657a33c947
-
SHA1
0cbafb8be18382745fbbfd9c1faf28351e339005
-
SHA256
7956eb04194300ce0d0a84ad18771eebc94b89fb8d1ddcce8ea4c056818646f4
-
SHA512
c4867b62c4dbe2b03ffa4f28458138541dc765aafeef84becc9a10d001e67bf6c49a6dab54b0ac6c292bac65c50764efe17d8c7ff6bdf26dc4e960042a8f4162
-
SSDEEP
393216:rmpwG7YAENU4UTzO3uGhgmdfPQegpla49w9kdtByBfZkIq/EYDlsBbjYS:apwoQjUK3H9hPBgza49ykdWBfZkIUE0y
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation cmd.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4872 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4872 4816 java.exe 84 PID 4816 wrote to memory of 4872 4816 java.exe 84 PID 4620 wrote to memory of 2248 4620 cmd.exe 122 PID 4620 wrote to memory of 2248 4620 cmd.exe 122 PID 4620 wrote to memory of 4588 4620 cmd.exe 123 PID 4620 wrote to memory of 4588 4620 cmd.exe 123
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\apktool_2.9.3.jar1⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4872
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3408
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\apktool_2.9.3.jar"1⤵PID:5008
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\apktool_2.9.3.jar"2⤵PID:2248
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\apktool_2.9.3.jar" -h2⤵PID:4588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c7f925fe3afc77a1fb1d1c35d52f4cde
SHA1ae932abe7658d59f018bc2640d273adf20fc1162
SHA256ff0f94a9201ff01d0787bb0c29212a0b60bd5c14e130e06bc3f624dcb3c9520d
SHA51273d84ce087080cc103a527cbc874538f944f3e31db6b8152003f0bd7d9cc7193e7dd56884b1d6ea15b4fb71cc933d9af9dc05d330382ce5077a682a049a9ce44
-
Filesize
46B
MD56cf15153032c7e6f5ce167b393bc5f18
SHA1edea2f5b5094e6183c32be74d2dfb19a1c8fe42b
SHA256868505e11ed231a7c9a12b67ea3aa1c12613e5ec866070ec58feb4a95934f315
SHA5122210b9e2fccdd5e5f677b5fcaf7638ea30042c9d201a225dd9dd66bcaa294ed8fc473eb43de31bccc90648b2cb18a582ec227cc1a4a3ee68394fc3676592aa00
-
Filesize
46B
MD5568a26b513a7586be343fb083cbc60e6
SHA1402761da186a71b05754d31349612515c1aa622f
SHA256e4f9557d04d11040460c14cfd12f8bc3f5a35db4edcec4474ace6b4d9d21fae7
SHA5124822b5474d12e6e5f7fecdb9fa09507e84981af5a6b6fb1b1cef19afdc408b4352d849c253a3e7f67c342f1da6ddfdda4e023a150e85866f27e6368b471aa4d3