Overview
overview
8Static
static
6apk+.json
windows7-x64
3apk+.json
windows10-2004-x64
3base.apk
android-9-x86
8base.apk
android-10-x64
8base.apk
android-11-x64
8icon.png
windows7-x64
3icon.png
windows10-2004-x64
3split_conf...8a.jar
windows7-x64
1split_conf...8a.jar
windows10-2004-x64
1split_config.en.jar
windows7-x64
1split_config.en.jar
windows10-2004-x64
1split_conf...pi.jar
windows7-x64
1split_conf...pi.jar
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
apk+.json
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
apk+.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
base.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
base.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
icon.png
Resource
win7-20240704-en
Behavioral task
behavioral7
Sample
icon.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
split_config.arm64_v8a.jar
Resource
win7-20240705-en
Behavioral task
behavioral9
Sample
split_config.arm64_v8a.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
split_config.en.jar
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
split_config.en.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
split_config.xxhdpi.jar
Resource
win7-20240729-en
Behavioral task
behavioral13
Sample
split_config.xxhdpi.jar
Resource
win10v2004-20240802-en
General
-
Target
apk+.json
-
Size
131B
-
MD5
cbdf63675a38bf47f0e8de0cde6355d4
-
SHA1
0352e8037322d07e3fd425f8715f19db2f3b5671
-
SHA256
eaf6048629da1796d75d611ee7e8d06ae453f6642a1a6ce31065e6496f7d13e6
-
SHA512
7a949acab7bb89cb9870ca924d4f5b77a77f877c528c63753a92bf0d0965b73ffa66352b3e0467b651c689b6723f2c2a929fe5add2f4fc1568c53257b595d23c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\json_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2868 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 AcroRd32.exe 2868 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2148 2976 cmd.exe 31 PID 2976 wrote to memory of 2148 2976 cmd.exe 31 PID 2976 wrote to memory of 2148 2976 cmd.exe 31 PID 2148 wrote to memory of 2868 2148 rundll32.exe 33 PID 2148 wrote to memory of 2868 2148 rundll32.exe 33 PID 2148 wrote to memory of 2868 2148 rundll32.exe 33 PID 2148 wrote to memory of 2868 2148 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\apk+.json1⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\apk+.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\apk+.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c80f633aef54e8f0b8fe6bbffa6278a2
SHA1a7e4b2ecf6e4e8b8bc7eccf7aae1c081b67cffc9
SHA256ff53a90f1d0f867e7965deb26beafd5d667398aaa796a63bb19e80e74e1f06fe
SHA51208ceade7660abbee1bba06421bfca535f12cf3f5f0957e49f7048c2203cbf9b845f5ac741aabeaf266317c70a724c8f59f77b311444131ffb5b8a87646242930