Analysis
-
max time kernel
443s -
max time network
445s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-uk -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-uklocale:uk-uaos:windows10-ltsc 2021-x64systemwindows -
submitted
15-01-2025 02:06
Behavioral task
behavioral1
Sample
1704327339_tasker-v6-2-22-mod-5mod_ru.apk
Resource
win10ltsc2021-20250113-uk
windows10-ltsc 2021-x64
3 signatures
900 seconds
Behavioral task
behavioral2
Sample
1704327339_tasker-v6-2-22-mod-5mod_ru.apk
Resource
win11-20241007-uk
windows11-21h2-x64
3 signatures
900 seconds
General
-
Target
1704327339_tasker-v6-2-22-mod-5mod_ru.apk
-
Size
35.8MB
-
MD5
929ca6ca05718208e5d98da6c548213e
-
SHA1
517fdce87f3b0e3590058d84ee0bf18e3449c29c
-
SHA256
d2695cf764d383d526e2a33cd6cf20ad78925e3efc5bb054a93944474b52a5cc
-
SHA512
374e3da0b68f7fa1ecc0214c945219076ddb97bacb781770c0a1e83597f36d5482cf444890174a4f4d25b431738ae167a7c365980cc12d4171753f5f57d4cadf
-
SSDEEP
786432:ePwCQ76yYV/mm6qRrs1+j7P3AAUsVMkIi2IRSPzOdQ:ePoHySO7PQALWkH2I4PzsQ
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1581648047-808845429-2272123689-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1581648047-808845429-2272123689-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1012 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1704327339_tasker-v6-2-22-mod-5mod_ru.apk1⤵
- Modifies registry class
PID:3540
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1012