Resubmissions

16-12-2024 22:34

241216-2hjmgaskdz 10

12-12-2024 22:00

241212-1wqr9synb1 10

Analysis

  • max time kernel
    92s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-12-2024 22:34

General

  • Target

    629f9e70b58afec57d995fc86da4dfb3b3f57fd5202a08b0a26d4be625f40a05.apk

  • Size

    591KB

  • MD5

    85d4cd1aa3b96c12cfca866a60a18369

  • SHA1

    e342a09ac9498758bf5f2780672ab389057a1554

  • SHA256

    629f9e70b58afec57d995fc86da4dfb3b3f57fd5202a08b0a26d4be625f40a05

  • SHA512

    71ebe6533a6e472333dcd69a7236cdecc69cb8d1bc14979adec1534c9480cdc352ec935204230d42bcd5ec9af45350d4aa66ea374c2461e101dfa19d36e2d5df

  • SSDEEP

    12288:vOUWc4yiz0563G+r0Lusi1BK3+jDG+r0BRnYOAHOA9V7tkw3SDxrlW+js:vmcFq3FwEkOjDFwfYOyD9f3SDBTjs

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\629f9e70b58afec57d995fc86da4dfb3b3f57fd5202a08b0a26d4be625f40a05.apk
    1⤵
    • Modifies registry class
    PID:844
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads