Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/08/2024, 15:39

240802-s3t49svclf 8

02/08/2024, 15:32

240802-syqlaazcmn 6

02/08/2024, 15:28

240802-swdhyavalh 8

02/08/2024, 15:24

240802-ss9rzathna 8

Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 15:28

General

  • Target

    AndroidSideloader.exe

  • Size

    4.1MB

  • MD5

    b7fa8a83dd1c92d93679c58d06691369

  • SHA1

    0cff7bb71ff43ee92172f30566d8ee1b043129fc

  • SHA256

    6cf2bcdb1a463fc69eddb125eba8cc12854ee23effcd7c65b968667c668a7f0b

  • SHA512

    d74f8450f1fda260d0176ceba347bde6ad58b24a09eaac3cc921e20236a11707cab2f5eaee3bb10907c387d67efbcb66d823ae052b1317f3e953c4984a2b94b8

  • SSDEEP

    24576:JUjV//Ppn/JcDJ7bdukqjVnlqud+/2P+AXg:S5//Rn/QJ7bYkqXfd+/9AQ

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 16 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AndroidSideloader.exe
    "C:\Users\Admin\AppData\Local\Temp\AndroidSideloader.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\AppData\Local\Temp\7z.exe
      "7z.exe" x "C:\Users\Admin\AppData\Local\Temp\dependencies.7z" -y -o"C:\RSL\platform-tools" -bsp1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1372
    • C:\Users\Admin\AppData\Local\Temp\7z.exe
      "7z.exe" x "C:\Users\Admin\AppData\Local\Temp\rclone.zip" -y -o"C:\Users\Admin\AppData\Local\Temp" -bsp1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:948
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" kill-server
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4020
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" start-server
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\RSL\platform-tools\adb.exe
        adb -L tcp:5037 fork-server server --reply-fd 564
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3520
    • C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe
      "C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe" listremotes --config vrp.download.config
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4116
    • C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe
      "C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe" sync ":http:/meta.7z" "C:\Users\Admin\AppData\Local\Temp" --http-url https://theapp.vrrookie.xyz/ --tpslimit 1.0 --tpslimit-burst 3
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2172
    • C:\Users\Admin\AppData\Local\Temp\7z.exe
      "7z.exe" x "C:\Users\Admin\AppData\Local\Temp\meta.7z" -y -o"C:\Users\Admin\AppData\Local\Temp\meta" -p"gL59VfgPxoHR" -bsp1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1596
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" devices
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1920
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" shell dumpsys battery
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4468
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" shell df
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2708
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" shell pm list packages -3
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3428
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" shell df
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\RSL\platform-tools\AdbWinApi.dll

    Filesize

    105KB

    MD5

    d79a7c0a425f768fc9f9bcf2aa144d8f

    SHA1

    3da9e4c4566bd6d4efeeaf7ceab9e9e83f2f67e5

    SHA256

    1ad523231de449af3ba0e8664d3af332f0c5cc4f09141691ca05e35368fa811a

    SHA512

    ff650b98ecc55df6c2cb1b22221b1e71d63c01324f8a8b0f05f1497f5416131f7c33ef2ea17ed323cb2bfdbe7ae1824474544434899d2cb89e9c8c00db7dbb15

  • C:\RSL\platform-tools\AdbWinUsbApi.dll

    Filesize

    71KB

    MD5

    e6e1716f53624aff7dbce5891334669a

    SHA1

    9c17f50ba4c8e5db9c1118d164995379f8d686fb

    SHA256

    51a61758a6f1f13dd36530199c0d65e227cd9d43765372b2942944cc3296ca2c

    SHA512

    c47392b6f7d701e78f78e0b0ddce5508ab8d247a4095391e77cd665e955f4938e412ffcb6076534dcad287af4f78d84668496935e71b9bb46a98401522815eb9

  • C:\RSL\platform-tools\adb.exe

    Filesize

    5.6MB

    MD5

    64daf7cca61d468d26a407d79a7c26a9

    SHA1

    51b451089e73c9a03e2f24ab2fc81896d48c6126

    SHA256

    997324a38d89e3b282306bf25ccaa167c49a35850ac0ab4a169e7a15afa82fc8

    SHA512

    5a7bd06326e8ee868a2e6c724bc74bd290acaa00f3442807d3f69489a374a13a3cb41fbaf929c79525bdac319bd9a64ecfaf3cbdb6585ae332a485e911d8370d

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\fnqipdfd.newcfg

    Filesize

    3KB

    MD5

    092685e2bec9fdf2fd6923cd5a6facf2

    SHA1

    aa137e6639d8ff2dcf5cb92ba5fb750454a51519

    SHA256

    05db2682b0c0e57d63ea0549cc772e691f469577474dacbe73ee80abbc943d6f

    SHA512

    5cb647dcdb08903ff8b19b83c8f742c195b4d085e6a0fcd79f30d4a544ec352a5386c5f969a326ac36021280cdf93e8b43c8dff78cd4388aecab22fb0ba84e2d

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\pykt3uza.newcfg

    Filesize

    2KB

    MD5

    c4a3ea929f756da4b5c4998f5e9a268b

    SHA1

    4f85649af3e0bc144f3357c3bc780104ddf6b952

    SHA256

    e1a3c3238d7e63ddf90a6cd88e342a66199ac6aabe2679991a61ee5ae3c7619a

    SHA512

    f2923d31b83f34675bba12082ffc62750ff36cacd9468a9ef7a186f77a238e2a4b2b451369f8a39ff7e625f8ff6ee9b0896e0843a3a26e84286980731e994641

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

    Filesize

    838B

    MD5

    6dc22626c68e39d1f7a92bc247d064fa

    SHA1

    06d72094b8ccfb2cd09e3b04fa79cd2f4efbb40c

    SHA256

    5b1cfb327e8e4f605cdb650526ab442cc846ce97cfdc51d1da23dfecb3abdf60

    SHA512

    09858fce9752da51c915859873510c5f115b8d2b2ffa9b3bfe8bee20b804de1fe3ef8bbe5448b2374d6089af29e9d7914e0098df675e5eef240d4f1649a0db72

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

    Filesize

    3KB

    MD5

    88318e52d11301fb8932558a20c91e4f

    SHA1

    fce099c01db0c3901088c96cb8929ee393159075

    SHA256

    90b045f3357fe482a2c0fc9820a51b27ed7b62ec4cd11871d3811f94803187c0

    SHA512

    a5964fc6d49004749e27a7582ebfd47cc890d79ce9b1d3e97387a8f367092ab63b6c30f039b8813725683cc82b3d626548172bc146be9f1aed3a96f46e0bc1ef

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

    Filesize

    2KB

    MD5

    3f6c84f6cecb6c2ce81b966f135cc2a7

    SHA1

    b7406c7f579de7277391617d52674c4725cd62f4

    SHA256

    0702446692bfdb7b75355fe301ce0766a7e7d7ed7060c1c176b694cbac417147

    SHA512

    56e5a6524d602c00a39b49d8c59a80332ebbd7033f5aceb281b833b55139a1471dcc7a0a23a0f73ba8298264c800b619c54e08a831e88822173b49ceb9b918e4

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

    Filesize

    3KB

    MD5

    33dee1a0569f133ad97436f4e07b89a4

    SHA1

    5ef15a0c9a628410c84fe569033c87fd6c8311ec

    SHA256

    282e4af1a2c4ecf49802da657854d0bdca651fae3d3a7a55663e30a5e3bbe6ae

    SHA512

    1bdd34278a5f97599187119c041f6adbb447466a331337a5207b4cb44bae6d0d7504e9d2807110eb2fd6a13877fd8b87dea6b3c59836c5cbe21fab5be6f771da

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

    Filesize

    2KB

    MD5

    d39506b2485931d13fcc86e8bc268b1d

    SHA1

    5eb64694757d54f8b3cbcaa9c8f63d2d48a9bf5f

    SHA256

    7369d23380667118542d84a76a6d2cc91f73e050e79ed8bfc23bb55b9ad7912e

    SHA512

    d7945d70d5edc112070eccf0f5d5130f17e01e6318e8186fa502fba2958729e5684c4a46bc0be3807282bb92c320f3af0cb2093ecbb1f7ac6d384d75b924654d

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

    Filesize

    2KB

    MD5

    db0263a9b413469ad5e76fdebfe05b7a

    SHA1

    f1fea181a198d8ad4c32d85433a6d4a3dc39c87a

    SHA256

    3f688041c3323993cd1b66e3c6d019e491cd0eb04fdf78d46d8745a8f02f845d

    SHA512

    bf9b92940405ece105e64ab635cff24fe46c1522dfbc643ee927bd20ba22598cfa964734cc685c808d347c24fbe481edf4efbb16637d8ea53c0db65c4f3fdc25

  • C:\Users\Admin\AppData\Local\Temp\7z.exe

    Filesize

    1.2MB

    MD5

    1a7eaa1dab7867e15d7800ae0b5af5e3

    SHA1

    9e6d344bd8724aa1862f4254d8c42b7cc929a797

    SHA256

    356bea8b6e9eb84dfa0dd8674e7c03428c641a47789df605c5bea0730de4aed2

    SHA512

    a12373ec7ec4bac3421363f70cc593f4334b4bb5a5c917e050a45090220fab002c36ba8b03be81159fd70955b4680146c9469e44ddf75a901465d6b1231ee6cd

  • C:\Users\Admin\AppData\Local\Temp\dependencies.7z

    Filesize

    5.5MB

    MD5

    54850eca0050c5468f712187828655ce

    SHA1

    30607a286efe050f9387f3127888b4073595d1a1

    SHA256

    06e1523a9cc9be6bd9d7a33c2720519d1a071747222f044bdf0c4d590a508575

    SHA512

    40d575da0d48f6b0ab7dbeabf68a4b40551157671e34f5669fe2627fe51d8f623e00adcff24df6abf9ea765dd02ffdcca2783b73f617ee0fb1fca1a88f0d4675

  • C:\Users\Admin\AppData\Local\Temp\meta.7z

    Filesize

    28.8MB

    MD5

    8c12c1d81c3ba5477893b0578877a515

    SHA1

    85b9556829b41b165ac4e8e1ca1975e659441119

    SHA256

    492d2e4d0e013a5792dd68dbc7793383745e9d0a52863c3108eef280add70b00

    SHA512

    2ce9d55d207801ad3005b39029ccc55235e99d77556bc9e68cc2f44e7501bee3e6472411bf120a052072ee383610cdc8a82aa0b07abe9e6874215fadcbdf1665

  • C:\Users\Admin\AppData\Local\Temp\meta\.meta\notes\Fix-it Ralph VR v2+2 -ByteUs.txt

    Filesize

    24B

    MD5

    95ecadb6472bf8d2b5e29c19ff7b6aec

    SHA1

    d418d8d05f1cac3547d233744d765c2100c53f26

    SHA256

    922180290a957b2db5cbd885f952df998245de0cbc9c0795a58c93c86f20c530

    SHA512

    c8c31b23989f5392a25d32b2fd1c14c8ad3cdb58117c509ec33ff7a70b3551a5914c0882c593b27ef36e6e96ce86b490d96d9bf5261b9094799ebd874864e3a7

  • C:\Users\Admin\AppData\Local\Temp\meta\.meta\notes\ForeVR Pool v926+2.0.926 -NIF.txt

    Filesize

    12B

    MD5

    5db92c491778fc426d102a6cdccde39d

    SHA1

    725c01af9d4fe1f53a8f22da3185c6fb0fbfa417

    SHA256

    124a4f8420dae0a5ebf04ce715399de35dbc8817143225113e4f6f05f6c6f524

    SHA512

    ecd97119339b44c8e7eebcbf4604ef40edca13edc5ade502def9b840e477943c401acb2ed420f13c4e9091d00e88639b327924dde2ee60c9abb3c68b09e06214

  • C:\Users\Admin\AppData\Local\Temp\meta\.meta\notes\Holotanks (BETA) v169+1.102 -VRP.txt

    Filesize

    83B

    MD5

    a013a807855d864175a73f8db56eaf05

    SHA1

    ccd8405bcfb4d5b83d3aa6b51c56f3707b534e97

    SHA256

    77a3b8cdee01f86f3a7043296253215c4e05fd1b27a836d17c03fee0b3ec2c80

    SHA512

    7eed4b8422b5e63e8bab01365b42cacb8f1c16a70000de22e4e2879ca13d044e1c7a04974c4bb9ebdd7b7ba1eb5f4fb061260662e9216190b7677a843d0360a8

  • C:\Users\Admin\AppData\Local\Temp\meta\.meta\notes\XRWorkout v15066+1.1b -VRP.txt

    Filesize

    40B

    MD5

    441cdaca186f101873ef0c671fde2d09

    SHA1

    e35c737a520fa4254718fdd3d93061635ff90948

    SHA256

    277e5de7af35dfcac250238a9fa211a4653c9cec84af371ed0bf5927bcece784

    SHA512

    3410fd95390c1c8095e5b24dac5bfaa7f9cac32b9ad25a06d1b9ff8a8af9aa4400429736f24bff8bfba765995d41990b8f4f3794d30f570accae764c7f59f1bd

  • C:\Users\Admin\AppData\Local\Temp\meta\VRP-GameList.txt

    Filesize

    179KB

    MD5

    e337ef7830cd4d7875962f3a79bd8c60

    SHA1

    5ed7b224d8bd474044105e1417c63821580b15e3

    SHA256

    c4df73df4b1a5aa451dfd1b5c1ccfa3f1cb7201514e2bbf1511bc1aea839e8cc

    SHA512

    a28534e0ae445c0af80be4760d0a47ac20bc2a50a48193ef3526bedca8e736b6e56e110f15102cecc4c49ac32fb8165dd8996d0ffa3dd06a727d3f19e7af5d1c

  • C:\Users\Admin\AppData\Local\Temp\nouns\blacklist.txt

    Filesize

    265KB

    MD5

    56beb39a23e0bf6bcebeb4f94eb7f08a

    SHA1

    73294d5582ac4fdbc3c6928cf54414cb55a6fa71

    SHA256

    01e9beed0d7443c2b979b60b72780d8df20e79dcfba64f3afe09235147c5bd20

    SHA512

    eb46cb36c12ee549135c5426a9fd94fa4d7e9efe8d6748b0642e42a6f00381aa6f80c6457a9801f16054cbacf27e21cc88e41cf9c9049c082be2c0d403e18b43

  • C:\Users\Admin\AppData\Local\Temp\rclone.zip

    Filesize

    20.1MB

    MD5

    10babe225d85f3da58ee8cc260b63793

    SHA1

    900da981ad757c5b8696b71475341c9228e84be9

    SHA256

    8e8bb13fb0d7beb316487ecde8ead5426784cdcdbf8b4d8dd381c6fe8c7d92a0

    SHA512

    d771c4631b607fc447be37d2ee266859dec4e09aa5544559edff2dea6d277ac9a28792ef1d12875c51b48773e155a983633b9f7ad59e14a36fb36de4d7fe9246

  • memory/1092-79-0x00000000746E0000-0x0000000074E90000-memory.dmp

    Filesize

    7.7MB

  • memory/1092-0-0x00000000746EE000-0x00000000746EF000-memory.dmp

    Filesize

    4KB

  • memory/1092-78-0x00000000746E0000-0x0000000074E90000-memory.dmp

    Filesize

    7.7MB

  • memory/1092-77-0x00000000746EE000-0x00000000746EF000-memory.dmp

    Filesize

    4KB

  • memory/1092-34-0x00000000746E0000-0x0000000074E90000-memory.dmp

    Filesize

    7.7MB

  • memory/1092-139-0x00000000746E0000-0x0000000074E90000-memory.dmp

    Filesize

    7.7MB

  • memory/1092-160-0x000000000B380000-0x000000000B432000-memory.dmp

    Filesize

    712KB

  • memory/1092-163-0x0000000008B50000-0x0000000008B72000-memory.dmp

    Filesize

    136KB

  • memory/1092-164-0x0000000008B80000-0x0000000008ED4000-memory.dmp

    Filesize

    3.3MB

  • memory/1092-33-0x00000000746E0000-0x0000000074E90000-memory.dmp

    Filesize

    7.7MB

  • memory/1092-10-0x0000000005DA0000-0x0000000005E2E000-memory.dmp

    Filesize

    568KB

  • memory/1092-9-0x0000000005C10000-0x0000000005C1E000-memory.dmp

    Filesize

    56KB

  • memory/1092-8-0x0000000005BE0000-0x0000000005BEC000-memory.dmp

    Filesize

    48KB

  • memory/1092-7-0x0000000005BD0000-0x0000000005BDA000-memory.dmp

    Filesize

    40KB

  • memory/1092-6-0x00000000746E0000-0x0000000074E90000-memory.dmp

    Filesize

    7.7MB

  • memory/1092-3-0x0000000005B00000-0x0000000005B92000-memory.dmp

    Filesize

    584KB

  • memory/1092-2-0x0000000006180000-0x0000000006724000-memory.dmp

    Filesize

    5.6MB

  • memory/1092-1-0x0000000000D10000-0x0000000001132000-memory.dmp

    Filesize

    4.1MB