Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21-06-2024 10:34

General

  • Target

    GBWhatsApp_2024.apk

  • Size

    72.1MB

  • MD5

    06b80586f3db28fd0886c68d327e6d6d

  • SHA1

    5eb26f69caa5fc281eaba466ead6a968545eab4f

  • SHA256

    2de70ca737c1f4602517c555ddd54165432cf231ffc0e21fb2e23b9dd14e7fb4

  • SHA512

    026a690010bed12dcdcd0d90f9254e66dd581773df690f95fb2b946a9400eabc9958db665045360f2d947dc3ff78f1f7af42515b751cfe455ba90457f29f5a03

  • SSDEEP

    1572864:J/2LZ1VbXhETM0kZlShysJPC2DLPwpJ08w:JaZLbRuk0TjH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\GBWhatsApp_2024.apk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\GBWhatsApp_2024.apk
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\GBWhatsApp_2024.apk"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    b321810d7e0f6a445b10cceb207f8fe0

    SHA1

    cf04c6fee878eefa7d330a0cfa5ef6c8bd013e40

    SHA256

    31f7f244fc40fcb7eadbe183731dfed7200ef5caa56ac42c2d2218d3800465c6

    SHA512

    40a092a78bd9945c9ab4b4a62cc96bf4c9361efa35469e94a1eb5fef4810286afc3f0d2d025bc491deebb3eba81ae7072913eced2cefa269a2030fa7266ad65d