Resubmissions

11-01-2025 14:53

250111-r9fpsatrbr 6

11-01-2025 14:23

250111-rqecls1mcv 10

11-01-2025 14:13

250111-rjve9a1lbx 10

Analysis

  • max time kernel
    60s
  • max time network
    27s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-01-2025 14:53

General

  • Target

    7cb7c01cf38976a0885a9b737f633ecc131381c5fcca3dfd94818df8f1716f47.apk

  • Size

    9.4MB

  • MD5

    623ce8b36331e347a676581c70d2bb41

  • SHA1

    2ca0da29b519817ba03dba942aff005dd565c522

  • SHA256

    7cb7c01cf38976a0885a9b737f633ecc131381c5fcca3dfd94818df8f1716f47

  • SHA512

    6a25c7af683e70ae7b87ea67c42e98d725e30d66843cc59ab049e50ec634bf21de54c0a0a62cf2b0b589dfb64f2fa6e0fa5e0cc44c392224a9bfc3b87bc7bb38

  • SSDEEP

    98304:Nsg/gg8j7aRsrM5iSRGUBVKeMwupCivpXRbPPU9W4ZlWq+ffD89QZrQ:R/gTj7aRTrfUpxpCivFRbPlaQ3Il

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\7cb7c01cf38976a0885a9b737f633ecc131381c5fcca3dfd94818df8f1716f47.apk
    1⤵
    • Modifies registry class
    PID:1376
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1400
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4092
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f8c4cc40,0x7ff9f8c4cc4c,0x7ff9f8c4cc58
        2⤵
          PID:2448
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1844 /prefetch:2
          2⤵
            PID:4368
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2116,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:3
            2⤵
              PID:2888
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2408 /prefetch:8
              2⤵
                PID:3240
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:1
                2⤵
                  PID:3604
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3160,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3316 /prefetch:1
                  2⤵
                    PID:2372
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4428,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4464 /prefetch:1
                    2⤵
                      PID:4088
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4828,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:8
                      2⤵
                        PID:3080
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4468,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4892 /prefetch:8
                        2⤵
                          PID:5076
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4872,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4856 /prefetch:8
                          2⤵
                            PID:3420
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4984,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4960 /prefetch:8
                            2⤵
                              PID:2304
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4932,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5016 /prefetch:8
                              2⤵
                                PID:3164
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5044,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:8
                                2⤵
                                  PID:4720
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5016,i,12133972051724812185,2229026897321786133,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:2
                                  2⤵
                                    PID:1380
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:3572
                                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1120
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:5056

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                      Filesize

                                      649B

                                      MD5

                                      02737f35265ad9c789055af6d3bda7db

                                      SHA1

                                      6946a317177d45d99d6cb37db9dbd82fc159a795

                                      SHA256

                                      37a0ec921010d45e2b640efa004337fe7081e3442d5cf75d89c5f4bfe474f457

                                      SHA512

                                      37fc7198217f7a232a3a3a99af58e227fee1f6806571c52a5a942798175826083f5ed6886a291fa1962e5c8eb6f4e8e19fd39aba1acd29d439444ba66bc47cfb

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json

                                      Filesize

                                      851B

                                      MD5

                                      07ffbe5f24ca348723ff8c6c488abfb8

                                      SHA1

                                      6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                      SHA256

                                      6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                      SHA512

                                      7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json

                                      Filesize

                                      854B

                                      MD5

                                      4ec1df2da46182103d2ffc3b92d20ca5

                                      SHA1

                                      fb9d1ba3710cf31a87165317c6edc110e98994ce

                                      SHA256

                                      6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                      SHA512

                                      939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                      Filesize

                                      2B

                                      MD5

                                      d751713988987e9331980363e24189ce

                                      SHA1

                                      97d170e1550eee4afc0af065b78cda302a97674c

                                      SHA256

                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                      SHA512

                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      356B

                                      MD5

                                      212404dbb49c8bb51d7997ff57731d0f

                                      SHA1

                                      e570f2357245dae65114dedfdb287d9be715091f

                                      SHA256

                                      9fb73481b12b2fdacab178734d10dd15029892500546bcaec53db82bc6dcf5ac

                                      SHA512

                                      c2fb60f743065bbc00c98e75dc2bc30d72cf4cce6ac5f632809275c3ff9e9a7261b3a73f4427b640743fc2a22e91784e44898744dd52cce04ece38a81f5144c6

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      9KB

                                      MD5

                                      60d6ffb171abe8495b0f6080a5ffa1a6

                                      SHA1

                                      98889c1272664ce6539ba95f6d2caeca818a973d

                                      SHA256

                                      11f3f3306aca118f5f92ff6831515bfcea4a865e8410a5a3565d7a67d923518a

                                      SHA512

                                      9b5edda2276c7420e40f6bf886c34f5a0a731b1ea1dae3355205ad48e1fbea310cf1c227f41cecd1a6b4de27890baca2505f509d9ee5b7259e8e017342d80b54

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      9KB

                                      MD5

                                      960edde5017ea7b0493a69f22a4c273a

                                      SHA1

                                      ec9f30d0dcdbe1eddb4e9a86c9a830216439a769

                                      SHA256

                                      c8fa6dd21ec62b2971cf1096ecf6c42a2993a8cd74e1efb04bc7a765ee40433d

                                      SHA512

                                      2b247a5bf6eb715d68dc3118e5492f24366de21b2e73621e6b0ea67178c992b31c01634b08a90475e798fb4380c268249d3f9ba39b7c494e695f5e01ee290e4b

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      9KB

                                      MD5

                                      e92bc9693a46f1ed32850758d15f4a2c

                                      SHA1

                                      c874152f5d5aca5c6466deeb1854e23cdff75091

                                      SHA256

                                      61d53523dac3310ff0cecbfe1c6d0fbfd0c063cc1c0d8250489f1c433bce9c07

                                      SHA512

                                      4e173d53d6132951504a0663aa20b217bf65be20b3dc2d8975baddd239fa71f13343edffa058d7b238ca094fa3cc5147925224a8581d3a4424d3016089a17cf6

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                      Filesize

                                      15KB

                                      MD5

                                      3260b57914bd1f5445b3c524b89269d0

                                      SHA1

                                      58261e4b98e989fec13aa998f4b1531707bdcf0a

                                      SHA256

                                      3f61ffad9ba9ee6e1474611976a92d1538c47b7c55e5ab043e2ded332680f4f1

                                      SHA512

                                      1729009ba1a29398df89c89031460f252faa6885179929d8418d575612096c68e4401c71b8cab8bd05c28fa1ad7908387762ce34f8f68199020780dc754bb115

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                      Filesize

                                      72B

                                      MD5

                                      cf44fde3c21c7683761251999e617fce

                                      SHA1

                                      97cff73f919b23842adfcfa27b1641d8f42a05ab

                                      SHA256

                                      844b3b798b61a607bf770fe197be9761effb835f8a0af6376592f16b1104f1bb

                                      SHA512

                                      c33837679000130660ffdf8083e6d3d9ab2974d9bb8af2a39c743959b193c05d1878385e2381db81e58b95a333a8eae038184b8628af731fc5c43cef79821c8c

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      231KB

                                      MD5

                                      ec9ee466a6ec1c6edae6333ed88f7453

                                      SHA1

                                      8b8c0a6b6a0f36c689b4eac299dc87b96af25b61

                                      SHA256

                                      0f31c7696daf991898b83645532045a25ecfab5392edb38a215ba74735b2ab3e

                                      SHA512

                                      8555ef73e70f6ac9029db0b899ba8db87976e7416a29a4acb48ea21d2eca0d4ed7b8f1d28ba1f133bead70eaf445e2856a8e079a37f69dcc111e3e0dc61f647f

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      231KB

                                      MD5

                                      73a2c3723c4d1d6bd2b6aef8b120db88

                                      SHA1

                                      95f4f79799741a49d17e381bf876c0503d245f7b

                                      SHA256

                                      a7a4d085cee4783d9f384e3f728a37f496c8dd88198974846bb7e659f8ca6de7

                                      SHA512

                                      376ac272d703800b3b2cd1236888d62d4047b65ec123a51183f5633ea7e694185d91a9f694db61dfb6791ed4c260230b73f028c16a656326e7e8f125433259e9

                                    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                      Filesize

                                      10KB

                                      MD5

                                      327975ba2c226434c0009085b3702a06

                                      SHA1

                                      b7b8b25656b3caefad9c5a657f101f06e2024bbd

                                      SHA256

                                      6fa9064f304b70d6dcebee643ca017c2417ff325106917058f6e11341678583c

                                      SHA512

                                      150a57c143fc5ff2462f496f5a9451310b8d99e32c4d570641204c8062a78590f14bed438ac981e8b0609a0c87b859a1f8502a78687bc36c3a9529d633a58e51

                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir1676_2090830220\1e52a932-7bc5-41e6-b1eb-4e85f9f2d522.tmp

                                      Filesize

                                      150KB

                                      MD5

                                      14937b985303ecce4196154a24fc369a

                                      SHA1

                                      ecfe89e11a8d08ce0c8745ff5735d5edad683730

                                      SHA256

                                      71006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff

                                      SHA512

                                      1d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c

                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir1676_2090830220\CRX_INSTALL\_locales\en\messages.json

                                      Filesize

                                      711B

                                      MD5

                                      558659936250e03cc14b60ebf648aa09

                                      SHA1

                                      32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                      SHA256

                                      2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                      SHA512

                                      1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727