Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 22:43

General

  • Target

    AndroidSideloaderv2.30.0.exe

  • Size

    4.2MB

  • MD5

    7e2b918a866b24b1faf8cf3ad9292a6e

  • SHA1

    798c5d509dfad39ee7384ed604e34a01ba8bd5cb

  • SHA256

    04ce50b0cf7fddaaac3e1940e21234ddfc6f05d352891989f8067310f4ec6a69

  • SHA512

    2cce264bc27f438cb3f1e0fd245158da620934eff58bf83ec5fd66460b9bfdeb0af7d9dfee09b6e9062d2d99cc8fa76219f3073afa44910ff07fb5351631314f

  • SSDEEP

    24576:kR2wjV//vxExkun/JcDJ7bdukqjVnlqud+/2P+Ap+KVwN52/h:w2w5//vxExjn/QJ7bYkqXfd+/9A9

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 16 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AndroidSideloaderv2.30.0.exe
    "C:\Users\Admin\AppData\Local\Temp\AndroidSideloaderv2.30.0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\7z.exe
      "7z.exe" x "C:\Users\Admin\AppData\Local\Temp\dependencies.7z" -y -o"C:\RSL\platform-tools" -bsp1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:628
    • C:\Users\Admin\AppData\Local\Temp\7z.exe
      "7z.exe" x "C:\Users\Admin\AppData\Local\Temp\rclone.zip" -y -o"C:\Users\Admin\AppData\Local\Temp" -bsp1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3860
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" kill-server
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4196
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" start-server
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\RSL\platform-tools\adb.exe
        adb -L tcp:5037 fork-server server --reply-fd 564
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4088
    • C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe
      "C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe" listremotes --config vrp.download.config --inplace
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2308
    • C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe
      "C:\Users\Admin\AppData\Local\Temp\rclone\rclone.exe" sync ":http:/meta.7z" "C:\Users\Admin\AppData\Local\Temp" --inplace --http-url https://theapp.vrrookie.xyz/ --tpslimit 1.0 --tpslimit-burst 3
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3348
    • C:\Users\Admin\AppData\Local\Temp\7z.exe
      "7z.exe" x "C:\Users\Admin\AppData\Local\Temp\meta.7z" -y -o"C:\Users\Admin\AppData\Local\Temp\meta" -p"gL59VfgPxoHR" -bsp1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3920
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" devices
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1636
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" shell dumpsys battery
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:996
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" shell df
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4184
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" shell pm list packages -3
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4292
    • C:\RSL\platform-tools\adb.exe
      "C:\RSL\platform-tools\adb.exe" shell df
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\RSL\platform-tools\AdbWinApi.dll

    Filesize

    105KB

    MD5

    d79a7c0a425f768fc9f9bcf2aa144d8f

    SHA1

    3da9e4c4566bd6d4efeeaf7ceab9e9e83f2f67e5

    SHA256

    1ad523231de449af3ba0e8664d3af332f0c5cc4f09141691ca05e35368fa811a

    SHA512

    ff650b98ecc55df6c2cb1b22221b1e71d63c01324f8a8b0f05f1497f5416131f7c33ef2ea17ed323cb2bfdbe7ae1824474544434899d2cb89e9c8c00db7dbb15

  • C:\RSL\platform-tools\AdbWinUsbApi.dll

    Filesize

    71KB

    MD5

    e6e1716f53624aff7dbce5891334669a

    SHA1

    9c17f50ba4c8e5db9c1118d164995379f8d686fb

    SHA256

    51a61758a6f1f13dd36530199c0d65e227cd9d43765372b2942944cc3296ca2c

    SHA512

    c47392b6f7d701e78f78e0b0ddce5508ab8d247a4095391e77cd665e955f4938e412ffcb6076534dcad287af4f78d84668496935e71b9bb46a98401522815eb9

  • C:\RSL\platform-tools\adb.exe

    Filesize

    5.6MB

    MD5

    64daf7cca61d468d26a407d79a7c26a9

    SHA1

    51b451089e73c9a03e2f24ab2fc81896d48c6126

    SHA256

    997324a38d89e3b282306bf25ccaa167c49a35850ac0ab4a169e7a15afa82fc8

    SHA512

    5a7bd06326e8ee868a2e6c724bc74bd290acaa00f3442807d3f69489a374a13a3cb41fbaf929c79525bdac319bd9a64ecfaf3cbdb6585ae332a485e911d8370d

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\ah11xjwl.newcfg

    Filesize

    3KB

    MD5

    c8293bc9b358629842e14ff4caa6029e

    SHA1

    07d31f9873603dc1ee89075bd85d0ba8680e9a3f

    SHA256

    8b44620d50ba42a42c701b09da49921a89c118aba0a52b1a4b683a4dc3cde6dc

    SHA512

    9ef6ec965d1486e1475bed7ffaa72522ea3f2b2c7d5267dd7049793bb64b0fe59d7c5c883da0c7083577d916a781066c66018ce6fcfa3ee189ee43219f7b82ed

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\st1fnsju.newcfg

    Filesize

    2KB

    MD5

    8526ebaafe9dc0828d877d547a47fee9

    SHA1

    10707c206291f540921441981d73967034860dc6

    SHA256

    350e32a82cbc32cee29f62ef073a45208eb6f76df4fbd838bb8ccc51e38d125c

    SHA512

    ba0141feae8cd808323ed8972fb47be5595bfd4c063f593f4635e18c439383fabb52638d66ec3bab345b45ad5fb2923afe26ec12f1f0900cd95e3118dc652063

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\user.config

    Filesize

    838B

    MD5

    6dc22626c68e39d1f7a92bc247d064fa

    SHA1

    06d72094b8ccfb2cd09e3b04fa79cd2f4efbb40c

    SHA256

    5b1cfb327e8e4f605cdb650526ab442cc846ce97cfdc51d1da23dfecb3abdf60

    SHA512

    09858fce9752da51c915859873510c5f115b8d2b2ffa9b3bfe8bee20b804de1fe3ef8bbe5448b2374d6089af29e9d7914e0098df675e5eef240d4f1649a0db72

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\user.config

    Filesize

    2KB

    MD5

    2551ca2a494ee18d2482c397638a3b29

    SHA1

    06fb6a0fcf448f9c55543a895173ddf83a084b99

    SHA256

    76c9edd7324ff356bca54b0059e32869267b356f0d2029ff290e849d350e7ea9

    SHA512

    ba4cf619c40f16394b4b9f4b15758691b9db1d834cc73177107efe8f91bad451c4cbbb15b987cd040a54ad5794b01aa0900f772518a3cc3890cd8ec81243af71

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\user.config

    Filesize

    2KB

    MD5

    21adbb8013400081b1af55efdbac38a9

    SHA1

    a0e359ed84c6afb989d7e9dffd89dc1d01852b50

    SHA256

    6814e431760eda918d9b347fb0cac5e851e16a26983a1675de8040bdbb5e935a

    SHA512

    f37a90f71c939a516443f93901d01234d5303260918e34b8dababa7f0dc8b3227872e9392fecdc871e0ba8bbccd41e6ab42208b79a0ab51bb84b1c181f1aec83

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\user.config

    Filesize

    3KB

    MD5

    129fd55a88ab9992a8b36aaa82b689a3

    SHA1

    f6a8bcd9d3b6472f40bf66d3ef7d4a2efab30311

    SHA256

    c7cd42b6709870a7b6449bc94777ff4948ad011148d4e183b7570b037b446e9e

    SHA512

    fb849435a38e955658c4e47169c3fa517031c96d23fee090f0bf7b0090bdd9747ad5afd4a67720500f718413a4b9b8e9e1f193123105fab16ccbdb337c24af55

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\ybpcbvtt.newcfg

    Filesize

    2KB

    MD5

    e5478c67e4bcd0c23233ad100150c708

    SHA1

    6d49afff53038594eb3e06ed385612f8e3c30f1d

    SHA256

    a8e989e2be2726957bcfcc33bc122858732042d5c187d113cb0600748df2d9d1

    SHA512

    5f39edbcfed800d9c3f721df441bd59e41e469b3985dde7e52a1e973f46771de5540af317816d8782cbdf15fc2e27953a6d7c00385797f4b346d43c0fbe35e0e

  • C:\Users\Admin\AppData\Local\Rookie.AndroidSideloader\AndroidSideloaderv2.30.0._Url_qmrkskoonoeizsnl501gzyzbhshbvpf4\2.0.0.0\yd4wxxsc.newcfg

    Filesize

    3KB

    MD5

    55ca1a8516271e6143e40ba7c2ef54de

    SHA1

    51748df3a01d969ada5ed594bedfac24f7af092e

    SHA256

    acdd128b0912946966e86ab3fadc1cc7547a05676c6b908c5327ab64af3d27a6

    SHA512

    cd6f10cc6ad0611bfdf960308b6f0a74ef3e9deb4f55a36e78df8bed0d31b44e95cca31e66fe6e20c204394b4b03715050c824176a3bcc2d3e372dfe63b992ff

  • C:\Users\Admin\AppData\Local\Temp\7z.exe

    Filesize

    1.2MB

    MD5

    1a7eaa1dab7867e15d7800ae0b5af5e3

    SHA1

    9e6d344bd8724aa1862f4254d8c42b7cc929a797

    SHA256

    356bea8b6e9eb84dfa0dd8674e7c03428c641a47789df605c5bea0730de4aed2

    SHA512

    a12373ec7ec4bac3421363f70cc593f4334b4bb5a5c917e050a45090220fab002c36ba8b03be81159fd70955b4680146c9469e44ddf75a901465d6b1231ee6cd

  • C:\Users\Admin\AppData\Local\Temp\dependencies.7z

    Filesize

    5.5MB

    MD5

    54850eca0050c5468f712187828655ce

    SHA1

    30607a286efe050f9387f3127888b4073595d1a1

    SHA256

    06e1523a9cc9be6bd9d7a33c2720519d1a071747222f044bdf0c4d590a508575

    SHA512

    40d575da0d48f6b0ab7dbeabf68a4b40551157671e34f5669fe2627fe51d8f623e00adcff24df6abf9ea765dd02ffdcca2783b73f617ee0fb1fca1a88f0d4675

  • C:\Users\Admin\AppData\Local\Temp\meta.7z

    Filesize

    30.2MB

    MD5

    d06f4d491b8b08f35644a1d37b6e907f

    SHA1

    42bbf0ba570cd2e65564b0a7966ee7446b4c7509

    SHA256

    ebf98d2fd6002b2404bb1e712805e8b63d967e541548ae8e88ab256606098b13

    SHA512

    705ca1d9658d610fed1cb6744652866905977b06b5d794a124506b84d5c37a36a3dfa0e2412ba4b7a2f11a82f11a8700c06a6a7cbeb0d224a709aa2cb5ad3829

  • C:\Users\Admin\AppData\Local\Temp\meta\.meta\notes\Cubism v291+1.7.4 -VRP.txt

    Filesize

    83B

    MD5

    a013a807855d864175a73f8db56eaf05

    SHA1

    ccd8405bcfb4d5b83d3aa6b51c56f3707b534e97

    SHA256

    77a3b8cdee01f86f3a7043296253215c4e05fd1b27a836d17c03fee0b3ec2c80

    SHA512

    7eed4b8422b5e63e8bab01365b42cacb8f1c16a70000de22e4e2879ca13d044e1c7a04974c4bb9ebdd7b7ba1eb5f4fb061260662e9216190b7677a843d0360a8

  • C:\Users\Admin\AppData\Local\Temp\meta\.meta\notes\Mad Max VR v2+2 -ByteUs.txt

    Filesize

    24B

    MD5

    95ecadb6472bf8d2b5e29c19ff7b6aec

    SHA1

    d418d8d05f1cac3547d233744d765c2100c53f26

    SHA256

    922180290a957b2db5cbd885f952df998245de0cbc9c0795a58c93c86f20c530

    SHA512

    c8c31b23989f5392a25d32b2fd1c14c8ad3cdb58117c509ec33ff7a70b3551a5914c0882c593b27ef36e6e96ce86b490d96d9bf5261b9094799ebd874864e3a7

  • C:\Users\Admin\AppData\Local\Temp\meta\.meta\notes\Pavlov Shack v1593+1.0.19 -VRP.txt

    Filesize

    12B

    MD5

    5db92c491778fc426d102a6cdccde39d

    SHA1

    725c01af9d4fe1f53a8f22da3185c6fb0fbfa417

    SHA256

    124a4f8420dae0a5ebf04ce715399de35dbc8817143225113e4f6f05f6c6f524

    SHA512

    ecd97119339b44c8e7eebcbf4604ef40edca13edc5ade502def9b840e477943c401acb2ed420f13c4e9091d00e88639b327924dde2ee60c9abb3c68b09e06214

  • C:\Users\Admin\AppData\Local\Temp\meta\VRP-GameList.txt

    Filesize

    187KB

    MD5

    468ddcadd5efe272c3de0bd189330e64

    SHA1

    370c4f4985f3aadb9dfb69c39a19d1d139e3aae6

    SHA256

    cbb0afb20bb89d02a3572533a02aae1121244a0efbb6fe72ac6bcb40a7e196f1

    SHA512

    0a9206d7a8daa8163dfd85a220d5f8a8b3d40e76f42a4b88be7a0ce50748c6d9b36c621d78ee6ebf70a6910cb896a2c2aa25cf1649e63c0834ba2e8bdaba0cfe

  • C:\Users\Admin\AppData\Local\Temp\nouns\blacklist.txt

    Filesize

    270KB

    MD5

    b214f2f0196baf9a3c7846fc151b27dd

    SHA1

    64fc3a8ea2fbfeff0bb9a024bc7f1053f2893044

    SHA256

    9dc4f17f1777adbfb20528bda920fc95f13c8cdbdaf9d3681777171915fca465

    SHA512

    5482688f3ff7361d206c1edaad379d24072e62cb0a6473beb95e77681d142fdb8a29ed24c14f7b522e3e06e8248d3577a163c60e4a9d0e34adb2d10c69a30a50

  • C:\Users\Admin\AppData\Local\Temp\rclone-v1.67.0-windows-amd64\README.html

    Filesize

    2.7MB

    MD5

    500a6699c3901b0c93ff2a71ec3b4375

    SHA1

    32958268a418a23cb48ebbd98636d739429302c6

    SHA256

    701f21c773776610c012740d1e99429b16490d09c1a9fcd870203724deb538ad

    SHA512

    412fadb84e9787f26256715670cc501809301ce6c5dfa2d157a3887c4801f8e4f6bfacee0d886240b8e5a32036d4b23cb8522dd0e1a6f7edcccdc8e35bf5ff4a

  • C:\Users\Admin\AppData\Local\Temp\rclone-v1.67.0-windows-amd64\README.txt

    Filesize

    2.2MB

    MD5

    a2615e31d5e8a4fd1c43f95c15e416f0

    SHA1

    b6d2b4491f6a2f4111fe246623881ced39939edd

    SHA256

    943c4b42b1914bfc98b822317e068c4c4f61525bc914d160775e8e7400206ee9

    SHA512

    8e3a514ba05e83133c48a93af55cd26735932f569dc18beea60de7c84617df6645a428408b9d7fa22069c89036dc8dc91e9e73abaacf90617d13cf757e19e57a

  • C:\Users\Admin\AppData\Local\Temp\rclone-v1.67.0-windows-amd64\git-log.txt

    Filesize

    87KB

    MD5

    5772d853963d55d09674b71a3d9cdd9f

    SHA1

    f2121894e9609885573cede6495ff4e14e00a83e

    SHA256

    1bbd86a8ad5dde0ed29d8f13294f607c4c61d95af8ae46be683eb9c2b1a56c09

    SHA512

    246ff67de109f4a3a1f395f89a2e6e07395a1065b3ddbef6875de6c6bb69781331d500f701a9db1faf4fa7834eaae3d46a2a7a525b7b83092b2d1d6e1736431f

  • C:\Users\Admin\AppData\Local\Temp\rclone-v1.67.0-windows-amd64\rclone.1

    Filesize

    2.5MB

    MD5

    1a66854721f4431f57d691845cbbb99e

    SHA1

    a2689e2a63d7f60f737cedfb411518d3cc7ac67f

    SHA256

    3e435c81cc364a3c6f1d5f9305f03dbf5152e85f445c9354cc16b30654fd444e

    SHA512

    171f289fbc94bab66ae3233335a022820b91fddc5fd2b1f9a9ade7e48e7474aacb3400c40424a85203d17cb3c36730fa69ae278bf65f4dbeb1834b246898a94b

  • C:\Users\Admin\AppData\Local\Temp\rclone.zip

    Filesize

    20.3MB

    MD5

    eae00849accd0d8d902eda140aee7238

    SHA1

    f6a3ca9091e099df1df1e56640ae93fa24c6acb7

    SHA256

    117b99441024607d6043e274c7fcbed64d07ad87347d17dd0a717bdc1c59716b

    SHA512

    80a3bde49a66c24ea97421591f3fbf0dd4b35af47c20f11ecd379a41cf5d64e7260144e6a01f74bfaf856bda38b82f9b34b98bdde28efef6bcd03a232f3547a7

  • memory/2320-2-0x0000000005700000-0x0000000005CA4000-memory.dmp

    Filesize

    5.6MB

  • memory/2320-174-0x0000000008430000-0x0000000008784000-memory.dmp

    Filesize

    3.3MB

  • memory/2320-81-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2320-80-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2320-6-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2320-3-0x0000000005010000-0x00000000050A2000-memory.dmp

    Filesize

    584KB

  • memory/2320-9-0x00000000054A0000-0x00000000054AE000-memory.dmp

    Filesize

    56KB

  • memory/2320-170-0x000000000A820000-0x000000000A8D2000-memory.dmp

    Filesize

    712KB

  • memory/2320-173-0x0000000008400000-0x0000000008422000-memory.dmp

    Filesize

    136KB

  • memory/2320-7-0x0000000005460000-0x000000000546A000-memory.dmp

    Filesize

    40KB

  • memory/2320-79-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2320-78-0x000000007450E000-0x000000007450F000-memory.dmp

    Filesize

    4KB

  • memory/2320-34-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2320-33-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/2320-0-0x000000007450E000-0x000000007450F000-memory.dmp

    Filesize

    4KB

  • memory/2320-8-0x0000000005470000-0x000000000547C000-memory.dmp

    Filesize

    48KB

  • memory/2320-1-0x00000000001E0000-0x0000000000614000-memory.dmp

    Filesize

    4.2MB

  • memory/2320-10-0x0000000005540000-0x00000000055CE000-memory.dmp

    Filesize

    568KB