Analysis
-
max time kernel
15s -
max time network
18s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17-07-2024 11:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
HappyMod-3-1-1.apk
Resource
win10-20240404-en
windows10-1703-x64
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
HappyMod-3-1-1.apk
Resource
android-x64-arm64-20240624-en
android-11-x64
14 signatures
1800 seconds
General
-
Target
HappyMod-3-1-1.apk
-
Size
17.3MB
-
MD5
2374b9b56e0eaac81fafa5a2eb219bdf
-
SHA1
1af4b5f9b22268019b3f09214926b472fa188b25
-
SHA256
bf4fb5b1a0f6dd65499e4b5e2fff102d4958d235f0ef79d21d4a0d271ebf2e47
-
SHA512
3e037c437a38742dcf6f54478ed200ff149ad5dd57dafd11f87b98bcfd2cc93744adb3566e1eb498d7b1e77da56fd6b159b839ca3bd8432faf1d3010cd894af2
-
SSDEEP
393216:np0TcbMT8VhcEb7NN+tiqxwPDBxvghsreQBzhpGPG41VSzp:nacQTicED+QrHghsrH5hkPGAVI
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 1348 OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 1348 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\HappyMod-3-1-1.apk1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx