Analysis

  • max time kernel
    1565s
  • max time network
    1569s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 08:49

General

  • Target

    droidkit-en-setup.exe

  • Size

    19.5MB

  • MD5

    10b9713adf037d033d31f84d89d32c3d

  • SHA1

    1396c8735135bfd8e96738fa48a3f88e8c45d3c7

  • SHA256

    ae2001d5b60a2f0bd8e72c0106363950cd9f68e9ce42b9a40b0af26814908809

  • SHA512

    9e7fbd6bbc2439b2eda5c5b5ccef8d639f9e9a772e34c05e0f949c28a4cf54eed98aa2fa6d4828fb250a8edd72fbc3ddf4a8f44b2119aa607983d91a1b26e178

  • SSDEEP

    393216:YqrsNeQztKB1QH9MCPIpB6LhMtGiUIsBws6XYbTkrXDTNiDRUGJwPAEWXD:YUibzQoH9MSIMgDYUX3NiDRUGJ2YT

Score
4/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\droidkit-en-setup.exe
    "C:\Users\Admin\AppData\Local\Temp\droidkit-en-setup.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "curl -X POST -H "Content-Type: application/json" -d "{\"client_id\":\"dk-Windows\",\"user_id\":\"5C8E156F\",\"events\":[{\"name\":\"Install_SW\",\"params\":{\"engagement_time_msec\":\"1\",\"ea\":\"Launch App\",\"el\":\"1\",\"pv\":\"dk-win\",\"install_productversion\":\"Official-com\",\"install_trackversion\":\"1.0.1.1\",\"soft_os_version\":\"Windows_64\"}}]}" "https://www.google-analytics.com/mp/collect?measurement_id=G-VR4P911QVY&api_secret=RrQJtReGS520apjVhJz5xw""
      2⤵
        PID:2604

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Local\Temp\nsi1C19.tmp\CheckProVs.dll

            Filesize

            7KB

            MD5

            62e85098ce43cb3d5c422e49390b7071

            SHA1

            df6722f155ce2a1379eff53a9ad1611ddecbb3bf

            SHA256

            ee7e26894cbf89c93ae4df15bdb12cd9a21f5deacedfa99a01eefe8fa52daec2

            SHA512

            dfe7438c2b46f822e2a810bc355e5226043547608d19d1c70314e4325c06ad9ad63a797905e30d19f5d9a86ee1a6d9c28f525a298731e79dbf6f3d6441179a8e

          • \Users\Admin\AppData\Local\Temp\nsi1C19.tmp\GoogleTracingLib.dll

            Filesize

            36KB

            MD5

            d8fca35ff95fe00a7174177181f8bd13

            SHA1

            fbafea4d2790dd2c0d022dfb08ded91de7f5265e

            SHA256

            ad873f1e51e6d033e5507235ec735957256ebeeb0d3f22aa0b57bb4bd0846e4c

            SHA512

            eb530b10f137cb0cdfdcd2c11fd9f50f774e0ce44e9d2da3e755f6a6df24fe6e7525c27b109e3e68e9d3e49a889937a22f4d9d78703b1055a83b8a58808a58ba

          • \Users\Admin\AppData\Local\Temp\nsi1C19.tmp\System.dll

            Filesize

            11KB

            MD5

            ca332bb753b0775d5e806e236ddcec55

            SHA1

            f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f

            SHA256

            df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d

            SHA512

            2de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00

          • \Users\Admin\AppData\Local\Temp\nsi1C19.tmp\msvcp100.dll

            Filesize

            593KB

            MD5

            d029339c0f59cf662094eddf8c42b2b5

            SHA1

            a0b6de44255ce7bfade9a5b559dd04f2972bfdc8

            SHA256

            934d882efd3c0f3f1efbc238ef87708f3879f5bb456d30af62f3368d58b6aa4c

            SHA512

            021d9af52e68cb7a3b0042d9ed6c9418552ee16df966f9ccedd458567c47d70471cb8851a69d3982d64571369664faeeae3be90e2e88a909005b9cdb73679c82

          • \Users\Admin\AppData\Local\Temp\nsi1C19.tmp\msvcr100.dll

            Filesize

            809KB

            MD5

            366fd6f3a451351b5df2d7c4ecf4c73a

            SHA1

            50db750522b9630757f91b53df377fd4ed4e2d66

            SHA256

            ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5

            SHA512

            2de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130

          • \Users\Admin\AppData\Local\Temp\nsi1C19.tmp\nsDui.dll

            Filesize

            10.0MB

            MD5

            368841af8b0074e348418f106716e603

            SHA1

            75469510665b651b38e3b4fb7c4240722c756126

            SHA256

            3be54dea5aedc0d8d16d6c4bd4e046e2d93bfc550a1a035a94768c2d5901e327

            SHA512

            3804afa3930a90f258a2b4e7106e1d0211e5d4ca6a7f5ba23da11e3908b4e202295ddbcb1ecf1e15215bc9a0aece1a46efad07ad94feddd4f316b0de674c50d5