Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 10:03

General

  • Target

    AndroidSideloader v2.29.2.exe

  • Size

    4.1MB

  • MD5

    b7fa8a83dd1c92d93679c58d06691369

  • SHA1

    0cff7bb71ff43ee92172f30566d8ee1b043129fc

  • SHA256

    6cf2bcdb1a463fc69eddb125eba8cc12854ee23effcd7c65b968667c668a7f0b

  • SHA512

    d74f8450f1fda260d0176ceba347bde6ad58b24a09eaac3cc921e20236a11707cab2f5eaee3bb10907c387d67efbcb66d823ae052b1317f3e953c4984a2b94b8

  • SSDEEP

    24576:JUjV//Ppn/JcDJ7bdukqjVnlqud+/2P+AXg:S5//Rn/QJ7bYkqXfd+/9AQ

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AndroidSideloader v2.29.2.exe
    "C:\Users\Admin\AppData\Local\Temp\AndroidSideloader v2.29.2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 2140
      2⤵
      • Program crash
      PID:1332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader_v2.29.2_Url_yoqfpljawlmuvev2xykf0ju0t0p31uqo\2.0.0.0\gnjcxgdj.newcfg

    Filesize

    2KB

    MD5

    d13cab2fb393d8a507fde74b9913c4b4

    SHA1

    0263d04cdd8527676f4298e7de90121fbdbf2ef5

    SHA256

    ae7d859ab2b252513b0c458766e3a107d6301af10d5346d3c513f778a0e820c7

    SHA512

    14d492c4ce25628d13ffbcb7bbc3d9c8c5c0466a99427b4a3d7551236f9ba3257a603b5ec9373c1a61d5a1c7429ff9f40f6af9e6e17ae74c3e307afe532eebc9

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader_v2.29.2_Url_yoqfpljawlmuvev2xykf0ju0t0p31uqo\2.0.0.0\jjdxdcmq.newcfg

    Filesize

    3KB

    MD5

    80940c9e20089b1c56c45816898634c2

    SHA1

    9ac7e3bfd837ac0b85836c17cb7d2b81b89845be

    SHA256

    52fde25bb41bc355119e4da4fdbef8f416473b646449453b8282396ad08c9db9

    SHA512

    6f2210bd9963c818f6b217f0cb66e29bbea2bb7324fbe0b60ec6481ffe57c5be19a95873f589b00ec7ec905fcc5058b37f3bae3692db3803cb518196f7391e14

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader_v2.29.2_Url_yoqfpljawlmuvev2xykf0ju0t0p31uqo\2.0.0.0\user.config

    Filesize

    838B

    MD5

    6dc22626c68e39d1f7a92bc247d064fa

    SHA1

    06d72094b8ccfb2cd09e3b04fa79cd2f4efbb40c

    SHA256

    5b1cfb327e8e4f605cdb650526ab442cc846ce97cfdc51d1da23dfecb3abdf60

    SHA512

    09858fce9752da51c915859873510c5f115b8d2b2ffa9b3bfe8bee20b804de1fe3ef8bbe5448b2374d6089af29e9d7914e0098df675e5eef240d4f1649a0db72

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader_v2.29.2_Url_yoqfpljawlmuvev2xykf0ju0t0p31uqo\2.0.0.0\user.config

    Filesize

    2KB

    MD5

    90910b657f2847c6a4868c8a7e8a7dc4

    SHA1

    ff0af02cbe954440898b05b8bbbfc10c907d37c2

    SHA256

    635cc6dd4eedc9a30feb6243071d80b5af511d4b0eab3b48bf3a6261047b2548

    SHA512

    8814dbcfceecd218b31725c7f6f3b2cabb7439dd88e1d74397e63ef0fb2179d29815a617b73a0d284558f942e4de26afa8d99ae34c44daa500866980f17180d0

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader_v2.29.2_Url_yoqfpljawlmuvev2xykf0ju0t0p31uqo\2.0.0.0\vorufcs5.newcfg

    Filesize

    2KB

    MD5

    eb0114c76902a600ea42029825332077

    SHA1

    7dc9e4ca425c2ebed420450d8cdee24a1f2ee597

    SHA256

    1d20ee85cd52db38e7e3b802debf14a62dfa3221ebadb7dac98701f5224267c1

    SHA512

    8b4ea019e54595ab44a5bc529fc6de2dc5a1513b18a74ea30d62a1a721f0018e3370556b353a9e7b7a254f742fa889fa508edafd48b503fa3732657d2b16d4ea

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloader_v2.29.2_Url_yoqfpljawlmuvev2xykf0ju0t0p31uqo\2.0.0.0\vzeyyibl.newcfg

    Filesize

    2KB

    MD5

    f68659024025b529aa50657e17ef8076

    SHA1

    800cc6e3ce61e4f351945a098fe35cda6e31ac0f

    SHA256

    0c81be961cde52328f2802902509248eb44209c6cf95486d46ad7b8fb2525d79

    SHA512

    a05714510bc464e0ea2eb72eeaef092e22a46492ef05e2ad28ef12d693e71ffa82abcfa5df5673b03e366ec8501dcbb87007d99bb6825d124d71213f36d38b88

  • C:\Users\Admin\AppData\Local\Temp\CabF874.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF887.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2012-32-0x0000000074620000-0x0000000074D0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2012-33-0x0000000074620000-0x0000000074D0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2012-0-0x000000007462E000-0x000000007462F000-memory.dmp

    Filesize

    4KB

  • memory/2012-7-0x0000000004440000-0x00000000044CE000-memory.dmp

    Filesize

    568KB

  • memory/2012-6-0x00000000009A0000-0x00000000009AE000-memory.dmp

    Filesize

    56KB

  • memory/2012-140-0x000000007462E000-0x000000007462F000-memory.dmp

    Filesize

    4KB

  • memory/2012-141-0x0000000074620000-0x0000000074D0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2012-142-0x0000000074620000-0x0000000074D0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2012-5-0x0000000000820000-0x000000000082C000-memory.dmp

    Filesize

    48KB

  • memory/2012-4-0x0000000074620000-0x0000000074D0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2012-1-0x0000000000020000-0x0000000000442000-memory.dmp

    Filesize

    4.1MB

  • memory/2012-244-0x0000000074620000-0x0000000074D0E000-memory.dmp

    Filesize

    6.9MB