Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3DroidCam_6.5.2.exe
windows7-x64
8DroidCam_6.5.2.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3DroidCamApp.exe
windows7-x64
1DroidCamApp.exe
windows10-2004-x64
1adb/AdbWinApi.dll
windows7-x64
3adb/AdbWinApi.dll
windows10-2004-x64
3adb/AdbWinUsbApi.dll
windows7-x64
1adb/AdbWinUsbApi.dll
windows10-2004-x64
3adb/adb.exe
windows7-x64
1adb/adb.exe
windows10-2004-x64
1lib/DroidC...32.dll
windows7-x64
1lib/DroidC...32.dll
windows10-2004-x64
1lib/insdrv.exe
windows7-x64
1lib/insdrv.exe
windows10-2004-x64
1plist.dll
windows7-x64
3plist.dll
windows10-2004-x64
3usbmuxd.dll
windows7-x64
1usbmuxd.dll
windows10-2004-x64
1vc_redist.x86.exe
windows7-x64
7vc_redist.x86.exe
windows10-2004-x64
7Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 16:20 UTC
Static task
static1
Behavioral task
behavioral1
Sample
DroidCam_6.5.2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DroidCam_6.5.2.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
DroidCamApp.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
DroidCamApp.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
adb/AdbWinApi.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
adb/AdbWinApi.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
adb/AdbWinUsbApi.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
adb/AdbWinUsbApi.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
adb/adb.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
adb/adb.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
lib/DroidCamFilter32.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
lib/DroidCamFilter32.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
lib/insdrv.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
lib/insdrv.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
plist.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
plist.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
usbmuxd.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
usbmuxd.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
vc_redist.x86.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
vc_redist.x86.exe
Resource
win10v2004-20240221-en
General
-
Target
lib/DroidCamFilter32.dll
-
Size
84KB
-
MD5
efe71ae8a02ca59a0855cd649f5e58b8
-
SHA1
0a5ba3257ad82f71890c0fa55a5f7405d0b6b4ac
-
SHA256
ffb22ab7b98ecc98c22cf675bfab61c875127137277e1f66bc3d7269c3b42652
-
SHA512
bad93c560355019f739158d2a25e7643a08cdcb000b378099aa2431ba4d023aa72741e674912d738b0ac6d21e44417f5406eee67f16035f6a783a5226b0d65a4
-
SSDEEP
1536:Jld1X/W0/2LAd2btU5b7ToSWVd1MjYx0EY6uJotlzoOaB2mu0gFfhdtmPv2kXlOZ:J/1Xue2LY2e5b7ToSWV7MjYFuJotlSug
Malware Config
Signatures
-
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\FriendlyName = "DroidCam Source 2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lib\\DroidCamFilter32.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\FilterData = 02000000000060000100000000000000307069330800000000000000010000000000000000000000307479330000000038000000480000007669647300001000800000aa00389b7100000000000000000000000000000000 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\ = "DroidCam Source 2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}\CLSID = "{9E2FBAC0-C951-4AA8-BFA9-4B196644964C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11D0-BD3B-00A0C911CE86} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{860BB310-5D01-11d0-BD3B-00A0C911CE86}\Instance\{9E2FBAC0-C951-4AA8-BFA9-4B196644964C} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2196 2384 regsvr32.exe 85 PID 2384 wrote to memory of 2196 2384 regsvr32.exe 85 PID 2384 wrote to memory of 2196 2384 regsvr32.exe 85
Processes
Network
-
Remote address:8.8.8.8:53Request69.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.178.17.96.in-addr.arpaIN PTRResponse200.178.17.96.in-addr.arpaIN PTRa96-17-178-200deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request58.99.105.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request197.178.17.96.in-addr.arpaIN PTRResponse197.178.17.96.in-addr.arpaIN PTRa96-17-178-197deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request210.178.17.96.in-addr.arpaIN PTRResponse210.178.17.96.in-addr.arpaIN PTRa96-17-178-210deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request210.143.182.52.in-addr.arpaIN PTRResponse
-
71 B 157 B 1 1
DNS Request
69.31.126.40.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
200.178.17.96.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
58.99.105.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
197.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
21.236.111.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
210.178.17.96.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
210.143.182.52.in-addr.arpa