Resubmissions
25/01/2025, 07:51
250125-jp628svlfk 1025/01/2025, 07:47
250125-jmnswasrby 625/01/2025, 07:40
250125-jhj9wsspdv 10Analysis
-
max time kernel
52s -
max time network
65s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/01/2025, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
com.tencent.mm.apk
Resource
win11-20241007-en
General
-
Target
com.tencent.mm.apk
-
Size
3.7MB
-
MD5
e15906ac8b360aa6e7867fcbb2922089
-
SHA1
53555056dd2af1933b911ac8adc81a2f438216c1
-
SHA256
9eaabb6d9f532f9fa304a6826b269296d7ed7ebc404827eb99b3dec1f9bc2b89
-
SHA512
d79083592e07fe78d3bfabe5989aab9e6eba61ee1632b724115e6170daaad84e9d58f42658aa2dabfa00fe6afa2c8c4b9390d924bde9c538dbddbb4a4a8157f2
-
SSDEEP
98304:jPR8//FcLJcwHCxZei/svO7LgJQYlcqPTwWVKQ/9Nx:rRy/K1cwix9svOuGqPTp3x
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\.apk OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\apk_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ƫ\ = "apk_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\apk_auto_file\shell\Read\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\潤瑭敲e갨鐀耀D3D10Ref OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\潤瑭敲e갨鐀耀D3D10Ref\ = "apk_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\apk_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ƫ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\apk_auto_file\shell\Read OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\.apk\ = "apk_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\apk_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1328 OpenWith.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1328 OpenWith.exe 1296 AcroRd32.exe 1296 AcroRd32.exe 1296 AcroRd32.exe 1296 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1296 1328 OpenWith.exe 80 PID 1328 wrote to memory of 1296 1328 OpenWith.exe 80 PID 1328 wrote to memory of 1296 1328 OpenWith.exe 80 PID 1296 wrote to memory of 1588 1296 AcroRd32.exe 84 PID 1296 wrote to memory of 1588 1296 AcroRd32.exe 84 PID 1296 wrote to memory of 1588 1296 AcroRd32.exe 84 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 2984 1588 RdrCEF.exe 85 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86 PID 1588 wrote to memory of 1216 1588 RdrCEF.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\com.tencent.mm.apk1⤵
- Modifies registry class
PID:4232
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\com.tencent.mm.apk"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3467216B21915CDEDBF0DF9899F39BF9 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D9E81D15C0FAEBE31BF46B91B288E712 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D9E81D15C0FAEBE31BF46B91B288E712 --renderer-client-id=2 --mojo-platform-channel-handle=1780 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:1216
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AB96A6A1A6ACACCED777F3DB66661F54 --mojo-platform-channel-handle=2344 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5291CE42FD9ED5849C032222A6B6C0E1 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1200
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E794AA934489661FF9F6FDD35C39A816 --mojo-platform-channel-handle=2556 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2092
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:1328
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4940