Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21-06-2024 10:34

General

  • Target

    GBWhatsApp_2024.apk

  • Size

    72.1MB

  • MD5

    06b80586f3db28fd0886c68d327e6d6d

  • SHA1

    5eb26f69caa5fc281eaba466ead6a968545eab4f

  • SHA256

    2de70ca737c1f4602517c555ddd54165432cf231ffc0e21fb2e23b9dd14e7fb4

  • SHA512

    026a690010bed12dcdcd0d90f9254e66dd581773df690f95fb2b946a9400eabc9958db665045360f2d947dc3ff78f1f7af42515b751cfe455ba90457f29f5a03

  • SSDEEP

    1572864:J/2LZ1VbXhETM0kZlShysJPC2DLPwpJ08w:JaZLbRuk0TjH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\GBWhatsApp_2024.apk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\GBWhatsApp_2024.apk
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\GBWhatsApp_2024.apk"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    5ecfebdd44ce207b04be469d89379c5a

    SHA1

    f8d5625f7f342583f38a79801d7a2ca1b5d23cba

    SHA256

    50798f311579cf32c8adce0078bdde6b412dd968d5dd8252bc7873bf0dffb58e

    SHA512

    d4dcc263ef5d4d28b4531461bde88d9483230040f203cbfe4e3e5e92ab82c06acfa343caa8948ea7b2238e321ed8c5ac7caef629d8c90944bf247d946e152433