Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 03:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
77810.exe
Resource
win7-20240220-en
windows7-x64
7 signatures
150 seconds
General
-
Target
77810.exe
-
Size
94KB
-
MD5
f93b32527bf4a3336aaf723e3843e167
-
SHA1
1eff6bc9d4071208e5c27e3d888b841b77821504
-
SHA256
773dba4375f27e9444e7c51755b6d070d3c18fce223e5a52d37f173563b16290
-
SHA512
e32e08a55b188b40ee0c4de9b823a6d176323c6a99c9522869d4350eaaa5c068a99dc9d38f1c850f043ade9518f30e31f4dc25c0adf403deb74382a97e6d8c05
-
SSDEEP
1536:WnnFGOHtnmJXRDB3EZTz71YvUAGjztobIu+Vh/QRFBAw1:WTYXRgbjCbb+D/QRFBZ
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE droidoobe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies droidoobe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 droidoobe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 droidoobe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix droidoobe.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" droidoobe.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" droidoobe.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1556 77810.exe 1556 77810.exe 956 77810.exe 956 77810.exe 3864 droidoobe.exe 3864 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe 4092 droidoobe.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 956 77810.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1556 wrote to memory of 956 1556 77810.exe 86 PID 1556 wrote to memory of 956 1556 77810.exe 86 PID 1556 wrote to memory of 956 1556 77810.exe 86 PID 3864 wrote to memory of 4092 3864 droidoobe.exe 88 PID 3864 wrote to memory of 4092 3864 droidoobe.exe 88 PID 3864 wrote to memory of 4092 3864 droidoobe.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\77810.exe"C:\Users\Admin\AppData\Local\Temp\77810.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\77810.exe"C:\Users\Admin\AppData\Local\Temp\77810.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:956
-
-
C:\Windows\SysWOW64\droidoobe.exe"C:\Windows\SysWOW64\droidoobe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\droidoobe.exe"C:\Windows\SysWOW64\droidoobe.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4092
-