Analysis

  • max time kernel
    21s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 05:35

General

  • Target

    AndroidSideloader.exe

  • Size

    4.1MB

  • MD5

    b7fa8a83dd1c92d93679c58d06691369

  • SHA1

    0cff7bb71ff43ee92172f30566d8ee1b043129fc

  • SHA256

    6cf2bcdb1a463fc69eddb125eba8cc12854ee23effcd7c65b968667c668a7f0b

  • SHA512

    d74f8450f1fda260d0176ceba347bde6ad58b24a09eaac3cc921e20236a11707cab2f5eaee3bb10907c387d67efbcb66d823ae052b1317f3e953c4984a2b94b8

  • SSDEEP

    24576:JUjV//Ppn/JcDJ7bdukqjVnlqud+/2P+AXg:S5//Rn/QJ7bYkqXfd+/9AQ

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AndroidSideloader.exe
    "C:\Users\Admin\AppData\Local\Temp\AndroidSideloader.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 2196
      2⤵
      • Program crash
      PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    408537cd47c9b29861b08fcf85c8d2cf

    SHA1

    d4d50ea3885d9941d24816725f4e78403e86aa90

    SHA256

    a284ec5576e413d0e021627ce2e8db6d8d8aa3817505c3df8915ff4734cbdf78

    SHA512

    ca8dc0865d86149231e0112179d15b3b33d9bf6feef6ff8acffdb39bcea60cdc652d4f41979e91f499c862c8e7420c7edea0585d792a2511deac7cfbef4bac92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf2bd7fe57549fbfa5a42daed00b1a33

    SHA1

    2daa11303b9672e3f4408ddd8992b3c5b2ea0419

    SHA256

    b4c8f0bb60bc2c5240dc19d373fc0f19438ed4cd92d3f79753e0d3c7b1d49370

    SHA512

    30b328c71b9a2a442da7a85d6bfbc6eb4fe929763a339ac04af21768e3d3a911d22efae378116ec522c22892b8757134a8116afbdf16a68f33abc327027fc3bf

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\egyhlijx.newcfg

    Filesize

    2KB

    MD5

    54cb9bb60d4af12b262abb39be275982

    SHA1

    7b76bf7dd19f1ea3410d874cda74c81e98c32b3e

    SHA256

    eb51ae6ac075c4df75dc172aa098a4d910c00061a85f7e18f2edc3d6c9b0b0f2

    SHA512

    0590d34ae6e9c12ec4c98ee3f6e52ffd786fc1d5ff81aa99a808a9dc0d7ba612c70421694d843c50205cdb1fa8fff8afcf18fa0625541bb3ca2dd3bf0d7e4e91

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\h3cjrf2k.newcfg

    Filesize

    2KB

    MD5

    69eccf6c2aa97c65826019738a5b9fc6

    SHA1

    47f8c2116ae1ec09e4dcfcad485859c82ac3f67d

    SHA256

    e9ee271771fff4bc681ad11a7e1a6dd83bcdfe8692f790c820bfd782cdc2aa02

    SHA512

    b56171b67c50eaaa1606c8405677768e80610d9f16f8a90427700886c9e2f7cde71fbb521c1ffe401afbfdb9e98dfc44fc68c2257c9647ae2b49bdb6b08bd415

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

    Filesize

    838B

    MD5

    6dc22626c68e39d1f7a92bc247d064fa

    SHA1

    06d72094b8ccfb2cd09e3b04fa79cd2f4efbb40c

    SHA256

    5b1cfb327e8e4f605cdb650526ab442cc846ce97cfdc51d1da23dfecb3abdf60

    SHA512

    09858fce9752da51c915859873510c5f115b8d2b2ffa9b3bfe8bee20b804de1fe3ef8bbe5448b2374d6089af29e9d7914e0098df675e5eef240d4f1649a0db72

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

    Filesize

    2KB

    MD5

    b92cbd2be89ddb0e099eeb575aeb5721

    SHA1

    84758c6b62178c95d29a0aeefdc77df0e9791fde

    SHA256

    484929f48b5992d2ea06bca5c34cf6ad1936770703892debb45418a8c27fd730

    SHA512

    1175aedeac1e6b2ee4bcc640c33458ed4236081a9236101f21ab15a4d2c87cc73ddba4e20bdee457dd54154a757debcd10b00cc1d28cdb673d33bc7b1b6ee9c2

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

    Filesize

    2KB

    MD5

    7e160c70ece99a210529d82a7cc12992

    SHA1

    40ba92775e4bd8cf9aa5567785999a74e59fe76f

    SHA256

    4cf8ca960d370be7295805c539caf055f293e06e6fe5e5c8fdd7c39ed749e9f2

    SHA512

    91bd036a7fbf7dc1ae26a05c5047a5e6e024c140f4a8def47c72aa3e42b6fa1c122c84f66f2440d5e138acaf3e218d2e7d395d6434fb724ea5d40916d015e896

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

    Filesize

    3KB

    MD5

    c962354d94a15ae4e56ad69311a5f459

    SHA1

    e9e9ae49f299d36e6158c8a40bcc1a288f861a35

    SHA256

    262003156da2b16d9efd3f81e60f292641a1c8eea345ba5e61375e58a29ffe97

    SHA512

    b105a7da4b115f98d6a6e7e05fbf4c72fba1525daf31f25bebf65f08ce1efd4c1ff24459eb320bf9f47a4584744295f9a00452ba1f82bf1573bedc0769879fa3

  • C:\Users\Admin\AppData\Local\Temp\CabDAF6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDBA5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1900-33-0x0000000074D10000-0x00000000753FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1900-0-0x0000000074D1E000-0x0000000074D1F000-memory.dmp

    Filesize

    4KB

  • memory/1900-32-0x0000000074D10000-0x00000000753FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1900-7-0x00000000046A0000-0x000000000472E000-memory.dmp

    Filesize

    568KB

  • memory/1900-102-0x0000000074D1E000-0x0000000074D1F000-memory.dmp

    Filesize

    4KB

  • memory/1900-131-0x0000000074D10000-0x00000000753FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1900-132-0x0000000074D10000-0x00000000753FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1900-6-0x00000000005D0000-0x00000000005DE000-memory.dmp

    Filesize

    56KB

  • memory/1900-5-0x00000000002F0000-0x00000000002FC000-memory.dmp

    Filesize

    48KB

  • memory/1900-4-0x0000000074D10000-0x00000000753FE000-memory.dmp

    Filesize

    6.9MB

  • memory/1900-1-0x0000000000CF0000-0x0000000001112000-memory.dmp

    Filesize

    4.1MB