Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk
Resource
win10v2004-20240611-en
General
-
Target
F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk
-
Size
52.7MB
-
MD5
af70cfa317ec773e83fa2c0ed95546db
-
SHA1
cab301aaefdc841d14413723e3084920b2110c71
-
SHA256
9e9ad42a4bb31c4574b95aa57b534eeb25f068f8ed8f8691e4687e01cd13102f
-
SHA512
80b98d516f6d023e705e39db45322df1a0ae96a34b0cc9a9f6916d5e96778a85b3feec9bb826420f12ae54f7a793a19dcf0e3fa9557e7e90bd440df09c21ab0a
-
SSDEEP
786432:yxND1Cq62mWRDZA9gDECmtvWHlbaRmtQE1PIjhjppCiBrUWwz8dzsYFrH2uCShTY:Iwqz/RS9KEN1WHlIYwTJU2p92DiR6F
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\apk_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.apk rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.apk\ = "apk_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\apk_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\apk_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\apk_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\apk_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2564 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2564 AcroRd32.exe 2564 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2568 3024 cmd.exe 29 PID 3024 wrote to memory of 2568 3024 cmd.exe 29 PID 3024 wrote to memory of 2568 3024 cmd.exe 29 PID 2568 wrote to memory of 2564 2568 rundll32.exe 30 PID 2568 wrote to memory of 2564 2568 rundll32.exe 30 PID 2568 wrote to memory of 2564 2568 rundll32.exe 30 PID 2568 wrote to memory of 2564 2568 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54ce7962b69397a248d1ec1f0d1d2681b
SHA106578ff1bd8d0e842d29266acd879a49d7e7f8f6
SHA256192d6ba0deaee5192cc3156b8ce453709758128a710f637ba1e24a48405dafc8
SHA51233953b8a7cc90ced6731083e2d2d7bf05c34a9fd575c690d703d444ff9a9cef117b3f8b785b72f4e1c4ffc2c5157d508ce739fac8b29519452406b7f7bd6851c