Resubmissions

03/02/2023, 13:39

230203-qyesnsba61 8

03/02/2023, 13:35

230203-qvmzwafe58 8

Analysis

  • max time kernel
    70s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2023, 13:39

General

  • Target

    DroidCam.Setup.6.5.2.exe

  • Size

    15.6MB

  • MD5

    d952d907646a522caf6ec5d00d114ce1

  • SHA1

    75ad9bacb60ded431058a50a220e22a35e3d03f7

  • SHA256

    f92ad1e92780a039397fd62d04affe97f1a65d04e7a41c9b5da6dd3fd265967e

  • SHA512

    3bfaee91d161de09c66ef7a85ad402f180624293cdc13d048edbeec5a3c4ad2bc84d5fde92383feb9b9f2d83e40a3e9ff27e81a32e605513611b6001f284b9fe

  • SSDEEP

    393216:oZsfK4YUD12zS7SEOegn4j7BgNE9O+wcDGFdClu8ZLzzpC4:gsfKPUD1kS7249O3cDGvClnlC4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DroidCam.Setup.6.5.2.exe
    "C:\Users\Admin\AppData\Local\Temp\DroidCam.Setup.6.5.2.exe"
    1⤵
    • Loads dropped DLL
    PID:112

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\nsdF2AA.tmp\System.dll

          Filesize

          11KB

          MD5

          c9473cb90d79a374b2ba6040ca16e45c

          SHA1

          ab95b54f12796dce57210d65f05124a6ed81234a

          SHA256

          b80a5cba69d1853ed5979b0ca0352437bf368a5cfb86cb4528edadd410e11352

          SHA512

          eafe7d5894622bc21f663bca4dd594392ee0f5b29270b6b56b0187093d6a3a103545464ff6398ad32d2cf15dab79b1f133218ba9ba337ddc01330b5ada804d7b

        • \Users\Admin\AppData\Local\Temp\nsdF2AA.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          12465ce89d3853918ed3476d70223226

          SHA1

          4c9f4b8b77a254c2aeace08c78c1cffbb791640d

          SHA256

          5157fe688cca27d348171bd5a8b117de348c0844ca5cb82bc68cbd7d873a3fdc

          SHA512

          20495270bcd0cae3102ffae0a3e783fad5f0218a5e844c767b07a10d2cfab2fab0afb5e07befa531ba466393a3d6255741f89c6def21ec2887234f49adceea2f

        • memory/112-54-0x0000000075E31000-0x0000000075E33000-memory.dmp

          Filesize

          8KB