Overview
overview
10Static
static
6BaniizKedra (2).apk
windows7-x64
3BaniizKedra (2).apk
windows10-2004-x64
3BaniizKedra (2).apk
windows10-ltsc 2021-x64
3BaniizKedra (2).apk
windows11-21h2-x64
3BaniizKedra (2).apk
android-10-x64
10BaniizKedra (2).apk
android-11-x64
10BaniizKedra (2).apk
android-13-x64
10BaniizKedra (2).apk
android-9-x86
10BaniizKedra (2).apk
macos-10.15-amd64
4BaniizKedra (2).apk
debian-12-armhf
BaniizKedra (2).apk
debian-12-mipsel
BaniizKedra (2).apk
debian-9-armhf
BaniizKedra (2).apk
debian-9-mips
BaniizKedra (2).apk
debian-9-mipsel
BaniizKedra (2).apk
ubuntu-18.04-amd64
BaniizKedra (2).apk
ubuntu-20.04-amd64
BaniizKedra (2).apk
ubuntu-22.04-amd64
BaniizKedra (2).apk
ubuntu-24.04-amd64
Analysis
-
max time kernel
1561s -
max time network
1565s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
BaniizKedra (2).apk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BaniizKedra (2).apk
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
BaniizKedra (2).apk
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
BaniizKedra (2).apk
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
BaniizKedra (2).apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
BaniizKedra (2).apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral7
Sample
BaniizKedra (2).apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral8
Sample
BaniizKedra (2).apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral9
Sample
BaniizKedra (2).apk
Resource
macos-20241106-en
Behavioral task
behavioral10
Sample
BaniizKedra (2).apk
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
BaniizKedra (2).apk
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral12
Sample
BaniizKedra (2).apk
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral13
Sample
BaniizKedra (2).apk
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral14
Sample
BaniizKedra (2).apk
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral15
Sample
BaniizKedra (2).apk
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral16
Sample
BaniizKedra (2).apk
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral17
Sample
BaniizKedra (2).apk
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral18
Sample
BaniizKedra (2).apk
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
BaniizKedra (2).apk
-
Size
5.4MB
-
MD5
6a127ad272931ce3e1030ed1269087ac
-
SHA1
69c36bb20d07217fc90ad0881296be236ce85d2a
-
SHA256
34f9d74a7696be56b453e0af51eaca2188ec938d9e9b7eac94b5457bf4a3ea9a
-
SHA512
d6b2f5e60040522abc4805431fa5634c13dddd86efd76ec342055c2dc819c422b74424624820c285bf462b814ca557c1a0f1a8398d8711f6005edb69aec331a9
-
SSDEEP
98304:fKIKBRU4rZpxd2pOrO2jVuk1M24M4dlMr4ZNHDHUoWRfB:4xl3SOrOlk1L4lM0ZNHDH8B
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2836 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2836 AcroRd32.exe 2836 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2244 2384 cmd.exe 31 PID 2384 wrote to memory of 2244 2384 cmd.exe 31 PID 2384 wrote to memory of 2244 2384 cmd.exe 31 PID 2244 wrote to memory of 2836 2244 rundll32.exe 32 PID 2244 wrote to memory of 2836 2244 rundll32.exe 32 PID 2244 wrote to memory of 2836 2244 rundll32.exe 32 PID 2244 wrote to memory of 2836 2244 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\BaniizKedra (2).apk"1⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\BaniizKedra (2).apk2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BaniizKedra (2).apk"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f34265084cd313dcf2c3977395cf664a
SHA1869e31d4acdf8fb3d516b1fa7e840722b60c1a7b
SHA256bca327d9e29cc2d741d6260470002673312d60762ed7b3d89f8f9c913179455d
SHA512a9a7468f51416cc863f055ad0dc2697f8586d1f8d5d798a441bd8a1a889de7eaff42205ab72bc110bb65495cdca9b4a3c6e20dee7b7a94ae2d64e584d415a064