Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 10:21
Behavioral task
behavioral1
Sample
NIVYLC.apk
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
NIVYLC.apk
-
Size
2.0MB
-
MD5
efb8b49c23f6554d9fd3def1c25c9618
-
SHA1
38fa5bb17a6e3ec8c50ab5d436836d940b1b6705
-
SHA256
659cf2b4d32c29779af3e36b1fdc335acf9290e5b427250aabbec3119f762e18
-
SHA512
dd1eabe0936b73c603787481d64842281e9cc1d82ba6e9aeb3ddff04b35e1d0d0cbf60bda525b8f2c7390bbc34a3ed3b9b8478e8b68e12bc2e8dd645552bac0e
-
SSDEEP
49152:Wb/iutLmCd1162ZXNJ/K4ln8aFbE25Tply:0/iut11fXXK4lRFbE2y
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4652 OpenWith.exe