Analysis
-
max time kernel
90s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-06-2024 20:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
HYDROGEN 2.624.524 (3).apk
Resource
win11-20240611-en
windows11-21h2-x64
7 signatures
150 seconds
General
-
Target
HYDROGEN 2.624.524 (3).apk
-
Size
183.3MB
-
MD5
db0b0e5eb345facc657dd38e95995545
-
SHA1
6bc1d177656e76702734bd3b886156964adba161
-
SHA256
353745675adcfa601cb9a5022cb073585100985b124126321f22050aad6e2943
-
SHA512
ea5e027d073a41c0d264e84d42629b6e1aadf95a8194e4022899b7cd21a030b199426846d619bc418e32cc811ef746bc532c6b8ed51c6368cf837e7517a14198
-
SSDEEP
3145728:zjucD6r95njYYfnpc09bGKR8vReA7z8YTMI2DFOi44SSecymKgU8gvgBO6hJ1leo:zacD6xpYlIGKCvRea/4XD04jecyaUhYF
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\.apk OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\apk_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\apk_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\apk_auto_file\shell\Read\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\.apk\ = "apk_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-423582142-4191893794-1888535462-1000_Classes\apk_auto_file\shell\Read OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1784 OpenWith.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1784 OpenWith.exe 1784 OpenWith.exe 1784 OpenWith.exe 1784 OpenWith.exe 1784 OpenWith.exe 1784 OpenWith.exe 1784 OpenWith.exe 1784 OpenWith.exe 1784 OpenWith.exe 1784 OpenWith.exe 1784 OpenWith.exe 2772 AcroRd32.exe 2772 AcroRd32.exe 2772 AcroRd32.exe 2772 AcroRd32.exe 2772 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2772 1784 OpenWith.exe 83 PID 1784 wrote to memory of 2772 1784 OpenWith.exe 83 PID 1784 wrote to memory of 2772 1784 OpenWith.exe 83 PID 2772 wrote to memory of 1092 2772 AcroRd32.exe 87 PID 2772 wrote to memory of 1092 2772 AcroRd32.exe 87 PID 2772 wrote to memory of 1092 2772 AcroRd32.exe 87 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 3620 1092 RdrCEF.exe 88 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89 PID 1092 wrote to memory of 5040 1092 RdrCEF.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\HYDROGEN 2.624.524 (3).apk"1⤵
- Modifies registry class
PID:2016
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\HYDROGEN 2.624.524 (3).apk"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BA91E7A7270D3915AB4981B2979FBCC1 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3620
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=65A46357EBBB353E04D0862C5FBEE586 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=65A46357EBBB353E04D0862C5FBEE586 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:14⤵PID:5040
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A0120CCA73FBCEA7E31083C94C7EE8B7 --mojo-platform-channel-handle=2316 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1592
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2C53F443753CD83B4BECA0D2A80AE6D7 --mojo-platform-channel-handle=2340 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4996
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0D48695E272D728857D5304C65F2D905 --mojo-platform-channel-handle=2344 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4588
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=310E93DF6BC54D7AFE28CF730C1BF7D4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=310E93DF6BC54D7AFE28CF730C1BF7D4 --renderer-client-id=8 --mojo-platform-channel-handle=2424 --allow-no-sandbox-job /prefetch:14⤵PID:1456
-
-
-