Analysis
-
max time kernel
2s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
Sora-AI-Video-Generator-Soraaiapk.Pro.apk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Sora-AI-Video-Generator-Soraaiapk.Pro.apk
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Sora-AI-Video-Generator-Soraaiapk.Pro.apk
Resource
win11-20241007-en
General
-
Target
Sora-AI-Video-Generator-Soraaiapk.Pro.apk
-
Size
143.6MB
-
MD5
0ca4a498b4358a90dc698cb0b129397c
-
SHA1
497742739985ec156e34ebf18cdf9a91bbe4e89c
-
SHA256
6d90409106769a47fcaefcad707634d20cf4caa54eedeb0941c6251a240f7191
-
SHA512
fa6acf53124a678b3b38d7e690811f7626f0aadde68659776ae1a560cdb4fc481910202771cd114b2a7080ec2894ad4ac184cdc8aedce74cb1fd26c5932ffc16
-
SSDEEP
3145728:G7QsZ+k/drcunyToBZEBpYu8EqFT7czFGTwcnnMz38KK:GcsZ+k/drcunyToBZEBpYu8EqFT4Gc8z
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1352 wrote to memory of 1108 1352 cmd.exe rundll32.exe PID 1352 wrote to memory of 1108 1352 cmd.exe rundll32.exe PID 1352 wrote to memory of 1108 1352 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Sora-AI-Video-Generator-Soraaiapk.Pro.apk1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Sora-AI-Video-Generator-Soraaiapk.Pro.apk2⤵
- Modifies registry class
PID:1108
-