Analysis
-
max time kernel
1050s -
max time network
1033s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 20:44
Static task
static1
Behavioral task
behavioral1
Sample
APK-Injector Builder.sfx.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
APK-Injector Builder.sfx.exe
Resource
win10v2004-20241007-en
General
-
Target
APK-Injector Builder.sfx.exe
-
Size
93.3MB
-
MD5
9108827f5efd8fb757d47cdd3f112b72
-
SHA1
788ace960c6b5f7af35c9cd8cc1b36e46c35b347
-
SHA256
010b4b3613d8e0feb0cb98ee08969c6ec75ec5a399090a3877b8bad94b3455c0
-
SHA512
ebfb9676c68e82530a95f9073e7d8de4ae54b697ebaccfcb9ec3850b06b093b8d88d2bc3fcc1bb5463340ee7cb0853a13a03d167c95cd48a4bce22e653bb08dc
-
SSDEEP
1572864:uRe+PTxYgrB+gg6M97RDro1c+crtzL05092AEK+pwUJomE/xitxOMRyFwLmzhLDx:u0ExYkXE975drw0BEK+uCPE/xOxOMR4T
Malware Config
Signatures
-
Detect Neshta payload 1 IoCs
resource yara_rule behavioral1/files/0x0005000000019241-38.dat family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 2 IoCs
pid Process 2308 Launcher.exe 1676 Spymaxv2.exe -
Loads dropped DLL 7 IoCs
pid Process 2828 APK-Injector Builder.sfx.exe 2828 APK-Injector Builder.sfx.exe 1204 Process not Found 1676 Spymaxv2.exe 1676 Spymaxv2.exe 1676 Spymaxv2.exe 1676 Spymaxv2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spymaxv2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main APK-Injector Builder.sfx.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 APK-Injector Builder.sfx.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1676 Spymaxv2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 APK-Injector Builder.sfx.exe 2828 APK-Injector Builder.sfx.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2308 2828 APK-Injector Builder.sfx.exe 30 PID 2828 wrote to memory of 2308 2828 APK-Injector Builder.sfx.exe 30 PID 2828 wrote to memory of 2308 2828 APK-Injector Builder.sfx.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\APK-Injector Builder.sfx.exe"C:\Users\Admin\AppData\Local\Temp\APK-Injector Builder.sfx.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\Desktop\rec\pkg\Launcher.exe"C:\Users\Admin\Desktop\rec\pkg\Launcher.exe"2⤵
- Executes dropped EXE
PID:2308
-
-
C:\Users\Admin\Desktop\Spymaxv2.exe"C:\Users\Admin\Desktop\Spymaxv2.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:2788
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:2912
-
C:\Windows\system32\rundll32.exerundll32.exe uxtheme.dll,#64 C:\Windows\resources\Themes\Aero\Aero.msstyles?NormalColor?NormalSize1⤵PID:1036
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:1632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5633e5b8199d4fa9f43f088099375044b
SHA1056b827aa06c7b4348342dd25cd725f4d79db7f0
SHA25673919f46fa73cf7b9407bc3806719c7738c55bae10a75890545069f0441ee74d
SHA5126b242e5fc8a4dd85a4abb1476da938fa8ac44317fc09b8daa1c27a66c1dbc284a079ba71388d4d9995f13dc06ce653c95b89b27e6279dd7135c3750a8762188f
-
Filesize
1.6MB
MD5243eff8bd862104fb399bcf1488b57a6
SHA1b651c9260f11ffde765c978a588a95159e5be612
SHA256917f35f86b35f5af676ae63ef2b8b4bd09b887a5643172d0c116aa7760015ff4
SHA512ac6603af930fe655bfaebe0b5f36b147c39e0b4d1169e5973df68fbbd20f80f24b72f7cecd7f1412a59aeaf338cd2175326557536f1ec10c3d3caedc9c42beb4
-
Filesize
1.6MB
MD5765bdc0f8bc0d77f7414e7a36ae45fd9
SHA1c303968d61bfeb154a110549217d40bbdaa7439c
SHA256aa8f8a3e268493157e62d93ab9cafb94573606fe43a80e63e3e4f2e5c9b22a5b
SHA5125bb1267c5f4b7dc67d7da75af08ce616d5f518ea5469443ded642c2c7410256b370d1b01c355191ae9df8cb3e56ce31910ff153761787aad054148b12add5718