Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 07:42

General

  • Target

    F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk

  • Size

    52.7MB

  • MD5

    af70cfa317ec773e83fa2c0ed95546db

  • SHA1

    cab301aaefdc841d14413723e3084920b2110c71

  • SHA256

    9e9ad42a4bb31c4574b95aa57b534eeb25f068f8ed8f8691e4687e01cd13102f

  • SHA512

    80b98d516f6d023e705e39db45322df1a0ae96a34b0cc9a9f6916d5e96778a85b3feec9bb826420f12ae54f7a793a19dcf0e3fa9557e7e90bd440df09c21ab0a

  • SSDEEP

    786432:yxND1Cq62mWRDZA9gDECmtvWHlbaRmtQE1PIjhjppCiBrUWwz8dzsYFrH2uCShTY:Iwqz/RS9KEN1WHlIYwTJU2p92DiR6F

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\F7DFE1892338FF3CF8ACE957F4B8346750E933CDFDBF1E3076634D48B4868D9A.apk"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    4ce7962b69397a248d1ec1f0d1d2681b

    SHA1

    06578ff1bd8d0e842d29266acd879a49d7e7f8f6

    SHA256

    192d6ba0deaee5192cc3156b8ce453709758128a710f637ba1e24a48405dafc8

    SHA512

    33953b8a7cc90ced6731083e2d2d7bf05c34a9fd575c690d703d444ff9a9cef117b3f8b785b72f4e1c4ffc2c5157d508ce739fac8b29519452406b7f7bd6851c