Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
MhDAi2ahKkOAZkUUAA5o6EVkWPc389.apk
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
MhDAi2ahKkOAZkUUAA5o6EVkWPc389.apk
Resource
win10v2004-20240802-en
General
-
Target
MhDAi2ahKkOAZkUUAA5o6EVkWPc389.apk
-
Size
922KB
-
MD5
a6032722aec2b062917fc23cc8dc8cd9
-
SHA1
8bd66c95b02fd328a2b90589c8719d8b4e16e30b
-
SHA256
0e41fbe23fc81eac085ef4c1ee07f1daaf314f22f49835e4d8c20dee992ca97f
-
SHA512
a6d29b972f18eb44386612e17cfa2299748ee395ab0a9f40bf0ea171320633886e068252ac2eedee9d7b8ebd7727d6c20b0fc47de58486051f543499e25944e3
-
SSDEEP
24576:kMLjHYR+aBMqzKliHcsfCWLp10OZ3M9SCETtDoEW:NDYRbaqWli8cP0OZMeTVW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2824 AcroRd32.exe 2824 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2944 2700 cmd.exe 31 PID 2700 wrote to memory of 2944 2700 cmd.exe 31 PID 2700 wrote to memory of 2944 2700 cmd.exe 31 PID 2944 wrote to memory of 2824 2944 rundll32.exe 32 PID 2944 wrote to memory of 2824 2944 rundll32.exe 32 PID 2944 wrote to memory of 2824 2944 rundll32.exe 32 PID 2944 wrote to memory of 2824 2944 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\MhDAi2ahKkOAZkUUAA5o6EVkWPc389.apk1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MhDAi2ahKkOAZkUUAA5o6EVkWPc389.apk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MhDAi2ahKkOAZkUUAA5o6EVkWPc389.apk"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ab3a5e2e9c4071b88bd08a6982a59d4d
SHA19817f627012dfdc7e600786d7c228008ef1a1100
SHA256ea6082ec46c00b101e967497f41685c032c24bf5f5c74ddf0f51e31fe1b0b9c2
SHA512ce3c86896d0de35ad7d0fc17a0d6141e7af1b4b6bffe547b2d7e1a26f63ec6c2b88ccd2c2747f81769c4c14a6d37fb3417d86e8616d1ed739ea6cbcc9ee7d39e