Overview
overview
7Static
static
7droidkit-en-setup.exe
windows7-x64
4droidkit-en-setup.exe
windows10-2004-x64
5$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...Vs.dll
windows7-x64
3$PLUGINSDI...Vs.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows7-x64
1$PLUGINSDI...ib.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...up.exe
windows7-x64
7$PLUGINSDI...up.exe
windows10-2004-x64
7$PLUGINSDI...00.dll
windows7-x64
1$PLUGINSDI...00.dll
windows10-2004-x64
1$PLUGINSDI...00.dll
windows7-x64
1$PLUGINSDI...00.dll
windows10-2004-x64
1$PLUGINSDIR/nsDui.dll
windows7-x64
3$PLUGINSDIR/nsDui.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$PLUGINSDI...ll.exe
windows7-x64
4$PLUGINSDI...ll.exe
windows10-2004-x64
5$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows7-x64
1$PLUGINSDI...ib.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-03-2024 17:44
Behavioral task
behavioral1
Sample
droidkit-en-setup.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
droidkit-en-setup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win7-20240319-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/dotNetFx45_Full_setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/dotNetFx45_Full_setup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDui.dll
Resource
win7-20240319-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDui.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/uninstall.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win10v2004-20240319-en
General
-
Target
$PLUGINSDIR/uninstall.exe
-
Size
8.1MB
-
MD5
b73940b9b108c8196600617a7f734d64
-
SHA1
f70aee50bcd93db0180ac0969126562882934bd4
-
SHA256
5bd33a6ba5e012c3e6f8ccc5ab322728d5df31e9e7b74daaf327aa54fc95028f
-
SHA512
ebd98143c766b12e12198ce8b310423cd6e4e638fca809afb006ff5953f65ee820b7140264bc93cbfe2f6015d4e00f26b696e7773ee55ad6da67baf5d973cc02
-
SSDEEP
196608:+l18/QDobE0TSkJzTtpQF6ZBPTS8y5BFwGIR6ip2eyWzi+8LX+1ZxWj:+H8/1EglTvS+S897pgGiNLeZxG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
uninstall.exepid process 2560 uninstall.exe -
Loads dropped DLL 5 IoCs
Processes:
uninstall.exepid process 2168 uninstall.exe 2168 uninstall.exe 2168 uninstall.exe 2168 uninstall.exe 2168 uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
uninstall.exepid process 2168 uninstall.exe 2168 uninstall.exe 2168 uninstall.exe 2168 uninstall.exe 2168 uninstall.exe 2168 uninstall.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
uninstall.exedescription pid process Token: SeDebugPrivilege 2560 uninstall.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
uninstall.exepid process 2168 uninstall.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
uninstall.exedescription pid process target process PID 2168 wrote to memory of 2560 2168 uninstall.exe uninstall.exe PID 2168 wrote to memory of 2560 2168 uninstall.exe uninstall.exe PID 2168 wrote to memory of 2560 2168 uninstall.exe uninstall.exe PID 2168 wrote to memory of 2560 2168 uninstall.exe uninstall.exe PID 2168 wrote to memory of 2560 2168 uninstall.exe uninstall.exe PID 2168 wrote to memory of 2560 2168 uninstall.exe uninstall.exe PID 2168 wrote to memory of 2560 2168 uninstall.exe uninstall.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe" "av:1.0.1" "gv:1.0.1.1" "gs:Official-com" "gi:UA-85655135-28" "an:DroidKit" "c:iMobie"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5d8fca35ff95fe00a7174177181f8bd13
SHA1fbafea4d2790dd2c0d022dfb08ded91de7f5265e
SHA256ad873f1e51e6d033e5507235ec735957256ebeeb0d3f22aa0b57bb4bd0846e4c
SHA512eb530b10f137cb0cdfdcd2c11fd9f50f774e0ce44e9d2da3e755f6a6df24fe6e7525c27b109e3e68e9d3e49a889937a22f4d9d78703b1055a83b8a58808a58ba
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
15KB
MD5de19ec3c0bb7d8c1262b6a5eeb4a38b9
SHA147ae4578fa185a08b91d92cf46e462879ddfbc73
SHA25607a48b985066af94ab7c0373ac28dbec1ec98fefb9af906102fb961c79b0f61e
SHA51213f213dcab32088da050dc7cfcbeeb3ae60765df9ca343ef71e24e7c1042a3568d0b7e916496f4eb6fc1dc15ac0eaf59332df8154aaf9a53af6a236038f6b95e
-
Filesize
4.1MB
MD5d4ac6f49c3248e75ed70df3fb6e6ef7f
SHA110d745cca5e24c96f0677482d403e617e4021262
SHA256507e0a2eccd0a9bff656776332639e63875f9ff1f4415471059c594aabb04217
SHA5122a506b6c6d01f3684520903cfed86d4e46c55faea1a05bcfb0e5fceac3439bba52c272bcb5f2e4e1b47a0035c88ac80e0330bb85bb0610be339a90fa01a4dc53
-
Filesize
4.4MB
MD52d53d7d1fe60785ed89de15e86f036f1
SHA1ae441457c64d3e5f6973b18722cf96ebf8aa5f36
SHA2565636edb729aa0fb266b9d375d7b5776f7aab955d9c9c329267fbda475d658d00
SHA512e667f6fadde031ca762b5816975d89f509903a1202fbef35cd31b1a6f5cd64a87c2bd75c860a40f5d4518caea3d70a1876ea4ab9daef9c53cfd9d8bd88913758
-
Filesize
4KB
MD529818862640ac659ce520c9c64e63e9e
SHA1485e1e6cc552fa4f05fb767043b1e7c9eb80be64
SHA256e96afa894a995a6097a405df76155a7a39962ff6cae7a59d89a25e5a34ab9eeb
SHA512ebb94eb21e060fb90ec9c86787eada42c7c9e1e7628ea4b16d3c7b414f554a94d5e4f4abe0e4ee30fddf4f904fd3002770a9b967fbd0feeca353e21079777057
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
3.8MB
MD5c71402b60850ebd7b8708ccc531695df
SHA1826384437ac0130fa5a7fc4246b020fd482d96f9
SHA256201a51cf072a46ec2f39674df25cfdf8dc865adef37d30d369d4c67e5f620d35
SHA512f9a7abd94efd6dcd5095ca152a32266a27be483db78ec7c696ed53de6c98cb5e477ef0aa73e8978426c267a9e9fd5f4f2223ff1ecda2bf208bdf4a520c0d8444