Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    20/08/2024, 14:11

General

  • Target

    AndroidSideloader.exe

  • Size

    4.1MB

  • MD5

    b7fa8a83dd1c92d93679c58d06691369

  • SHA1

    0cff7bb71ff43ee92172f30566d8ee1b043129fc

  • SHA256

    6cf2bcdb1a463fc69eddb125eba8cc12854ee23effcd7c65b968667c668a7f0b

  • SHA512

    d74f8450f1fda260d0176ceba347bde6ad58b24a09eaac3cc921e20236a11707cab2f5eaee3bb10907c387d67efbcb66d823ae052b1317f3e953c4984a2b94b8

  • SSDEEP

    24576:JUjV//Ppn/JcDJ7bdukqjVnlqud+/2P+AXg:S5//Rn/QJ7bYkqXfd+/9AQ

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 8 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AndroidSideloader.exe
    "C:\Users\Admin\AppData\Local\Temp\AndroidSideloader.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Users\Admin\AppData\Local\Temp\7z.exe
      "7z.exe" x "C:\Users\Admin\AppData\Local\Temp\dependencies.7z" -y -o"C:\RSL\platform-tools" -bsp1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3324
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" kill-server
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1556
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" kill-server
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1500
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" start-server
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\RSL\platform-tools\adb.exe
        adb -L tcp:5037 fork-server server --reply-fd 568
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 3240
      2⤵
      • Program crash
      PID:4928
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4680
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
    1⤵
      PID:4768
    • C:\Windows\SysWOW64\werfault.exe
      werfault.exe /h /shared Global\3ec880d3c5334837962d383ff4928a5f /t 1704 /p 3496
      1⤵
        PID:2152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3496 -ip 3496
        1⤵
          PID:4128

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\RSL\platform-tools\AdbWinApi.dll

          Filesize

          105KB

          MD5

          d79a7c0a425f768fc9f9bcf2aa144d8f

          SHA1

          3da9e4c4566bd6d4efeeaf7ceab9e9e83f2f67e5

          SHA256

          1ad523231de449af3ba0e8664d3af332f0c5cc4f09141691ca05e35368fa811a

          SHA512

          ff650b98ecc55df6c2cb1b22221b1e71d63c01324f8a8b0f05f1497f5416131f7c33ef2ea17ed323cb2bfdbe7ae1824474544434899d2cb89e9c8c00db7dbb15

        • C:\RSL\platform-tools\AdbWinUsbApi.dll

          Filesize

          71KB

          MD5

          e6e1716f53624aff7dbce5891334669a

          SHA1

          9c17f50ba4c8e5db9c1118d164995379f8d686fb

          SHA256

          51a61758a6f1f13dd36530199c0d65e227cd9d43765372b2942944cc3296ca2c

          SHA512

          c47392b6f7d701e78f78e0b0ddce5508ab8d247a4095391e77cd665e955f4938e412ffcb6076534dcad287af4f78d84668496935e71b9bb46a98401522815eb9

        • C:\RSL\platform-tools\adb.exe

          Filesize

          5.6MB

          MD5

          64daf7cca61d468d26a407d79a7c26a9

          SHA1

          51b451089e73c9a03e2f24ab2fc81896d48c6126

          SHA256

          997324a38d89e3b282306bf25ccaa167c49a35850ac0ab4a169e7a15afa82fc8

          SHA512

          5a7bd06326e8ee868a2e6c724bc74bd290acaa00f3442807d3f69489a374a13a3cb41fbaf929c79525bdac319bd9a64ecfaf3cbdb6585ae332a485e911d8370d

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

          Filesize

          10KB

          MD5

          c3e08121cabb9380e3d50cadde97d53a

          SHA1

          0e666954e83e97e3883e52092fe2be88a520e8f8

          SHA256

          76e1d3ab7320c4b863adb091b5b77205d81e13eafb539a18ebe3d8ea46b29433

          SHA512

          9a6ef7710781d2f3a1f873129b21990548c1b275720080d87fe4051b464b0aef4ad8625656c388a65163563c6fb2086c29c01ba5f518c5b9679e7227fcc7941f

        • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\3his1t5b.newcfg

          Filesize

          2KB

          MD5

          17b7ae9ff7f903313ea9839873a15c19

          SHA1

          6740763fdf6067d6f397ba071ad146dffe9c8881

          SHA256

          5f2d7b769ae591bfaefee0c61bd47244be709633b582f4734ff28dcb32a0a703

          SHA512

          8ededc1064ebd14eaa0b9281bac8be4997aa131c45e3c3709a70e25be04cbcd9c87a8dcf5a3ac088d30a56b3960b3f8940b3b42de6f5c84bf87a6f6a469ae6c4

        • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\kw3yrzdn.newcfg

          Filesize

          3KB

          MD5

          33399e05b39b55a671181baac7fc35c8

          SHA1

          01d9fc52894918ec1d6d88d5f2d59e325a555ea4

          SHA256

          6556d638101a3269104700fd4b894ed874c48ddc9731fa2399c3aa58489d4ddb

          SHA512

          0f0be951b6bd689475ff7a99f22b86a969c2aeaeeb7da627073d54f9d210d5ca496296454f83a11434bbadb158fcd1464abdcd629d0359d29c66b1527dc550dd

        • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\pg2yw0mx.newcfg

          Filesize

          2KB

          MD5

          126138303027fe441897ab431cd2401a

          SHA1

          57ea49e5fc8d1079c5504438f397436370282deb

          SHA256

          348cb33fc4d45b64d634cf519808bb756a8370ffb721fc0a60731f9a330d50b6

          SHA512

          1a26060f3d17ea7e260b33e3f551427d8c4999c4c6ec0277afb76dc68c98059f2f1664b5037e9d3b0934f5628d8539e155ed6da3ae72c5b69e2bc71b00533f95

        • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

          Filesize

          838B

          MD5

          6dc22626c68e39d1f7a92bc247d064fa

          SHA1

          06d72094b8ccfb2cd09e3b04fa79cd2f4efbb40c

          SHA256

          5b1cfb327e8e4f605cdb650526ab442cc846ce97cfdc51d1da23dfecb3abdf60

          SHA512

          09858fce9752da51c915859873510c5f115b8d2b2ffa9b3bfe8bee20b804de1fe3ef8bbe5448b2374d6089af29e9d7914e0098df675e5eef240d4f1649a0db72

        • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

          Filesize

          2KB

          MD5

          da6c60273689c904e6d4e56dfa31f26a

          SHA1

          9dcda99705537457cd19ffbda31dd3b5ee545c3b

          SHA256

          3ced6488d4b1326cdd365ac94c33cea992da8d8047cb802f970fa81496224544

          SHA512

          a1f265a832dc4b89966f0b4ccb72bc0c2dd64d48588357eb1da530693343b4a6f3e366f0958297e3ec62b9b91da430fa353650d17ab0b499c2ce6e024ae7aa82

        • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader.exe_Url_3wcjmuu02ugveehxxd13xxpo50icwnnk\2.0.0.0\user.config

          Filesize

          2KB

          MD5

          6a7a549b899ed4bcc67ab252fa6f2461

          SHA1

          66fadb4290fee40736a03fa4fe6f900d33b8ca5b

          SHA256

          d5d15bd2f0347ae3c5390919e1c61569b3c5b80e42bd01a4c774863d1f6313d4

          SHA512

          91a163d47e2d31619054a61a283fbf43c9d7b7eb6ab40df8d4cd8cb92ad768f80cfefaf3c6ec29fcebdd10088c0f9d9091b423a5de0b02265709df8f137f1544

        • C:\Users\Admin\AppData\Local\Temp\7z.exe

          Filesize

          1.2MB

          MD5

          1a7eaa1dab7867e15d7800ae0b5af5e3

          SHA1

          9e6d344bd8724aa1862f4254d8c42b7cc929a797

          SHA256

          356bea8b6e9eb84dfa0dd8674e7c03428c641a47789df605c5bea0730de4aed2

          SHA512

          a12373ec7ec4bac3421363f70cc593f4334b4bb5a5c917e050a45090220fab002c36ba8b03be81159fd70955b4680146c9469e44ddf75a901465d6b1231ee6cd

        • C:\Users\Admin\AppData\Local\Temp\dependencies.7z

          Filesize

          5.5MB

          MD5

          54850eca0050c5468f712187828655ce

          SHA1

          30607a286efe050f9387f3127888b4073595d1a1

          SHA256

          06e1523a9cc9be6bd9d7a33c2720519d1a071747222f044bdf0c4d590a508575

          SHA512

          40d575da0d48f6b0ab7dbeabf68a4b40551157671e34f5669fe2627fe51d8f623e00adcff24df6abf9ea765dd02ffdcca2783b73f617ee0fb1fca1a88f0d4675

        • memory/3496-9-0x0000000005000000-0x000000000500E000-memory.dmp

          Filesize

          56KB

        • memory/3496-0-0x000000007461E000-0x000000007461F000-memory.dmp

          Filesize

          4KB

        • memory/3496-37-0x000000007461E000-0x000000007461F000-memory.dmp

          Filesize

          4KB

        • memory/3496-38-0x0000000074610000-0x0000000074DC1000-memory.dmp

          Filesize

          7.7MB

        • memory/3496-39-0x0000000074610000-0x0000000074DC1000-memory.dmp

          Filesize

          7.7MB

        • memory/3496-33-0x0000000074610000-0x0000000074DC1000-memory.dmp

          Filesize

          7.7MB

        • memory/3496-10-0x00000000052B0000-0x000000000533E000-memory.dmp

          Filesize

          568KB

        • memory/3496-34-0x0000000074610000-0x0000000074DC1000-memory.dmp

          Filesize

          7.7MB

        • memory/3496-88-0x0000000000DF0000-0x0000000000E56000-memory.dmp

          Filesize

          408KB

        • memory/3496-8-0x0000000004FD0000-0x0000000004FDC000-memory.dmp

          Filesize

          48KB

        • memory/3496-7-0x0000000004FC0000-0x0000000004FCA000-memory.dmp

          Filesize

          40KB

        • memory/3496-6-0x0000000074610000-0x0000000074DC1000-memory.dmp

          Filesize

          7.7MB

        • memory/3496-3-0x0000000005040000-0x00000000050D2000-memory.dmp

          Filesize

          584KB

        • memory/3496-2-0x00000000055F0000-0x0000000005B96000-memory.dmp

          Filesize

          5.6MB

        • memory/3496-1-0x00000000000C0000-0x00000000004E2000-memory.dmp

          Filesize

          4.1MB

        • memory/3496-181-0x0000000074610000-0x0000000074DC1000-memory.dmp

          Filesize

          7.7MB