Overview
overview
7Static
static
7droidkit-es-setup.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...Vs.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...up.exe
windows10-2004-x64
7$PLUGINSDI...00.dll
windows10-2004-x64
1$PLUGINSDI...00.dll
windows10-2004-x64
1$PLUGINSDIR/nsDui.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$PLUGINSDI...ll.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ib.dll
windows10-2004-x64
3$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...tn.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI..._1.dll
windows10-2004-x64
3$PLUGINSDI..._1.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$PLUGINSDIR/un.exe
windows10-2004-x64
3Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-es -
resource tags
arch:x64arch:x86image:win10v2004-20240802-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
23/09/2024, 04:55
Behavioral task
behavioral1
Sample
droidkit-es-setup.exe
Resource
win10v2004-20240802-es
Behavioral task
behavioral2
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral3
Sample
$PLUGINSDIR/CheckProVs.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral4
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral6
Sample
$PLUGINSDIR/dotNetFx45_Full_setup.exe
Resource
win10v2004-20240910-es
Behavioral task
behavioral7
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral8
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDui.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral13
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral14
Sample
$PLUGINSDIR/uninstall.exe
Resource
win10v2004-20240802-es
Behavioral task
behavioral15
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral16
Sample
$PLUGINSDIR/GoogleTracingLib.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral17
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral18
Sample
$PLUGINSDIR/SkinBtn.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral20
Sample
$PLUGINSDIR/libcrypto-1_1.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral21
Sample
$PLUGINSDIR/libssl-1_1.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral24
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240802-es
Behavioral task
behavioral25
Sample
$PLUGINSDIR/un.exe
Resource
win10v2004-20240802-es
General
-
Target
$PLUGINSDIR/uninstall.exe
-
Size
8.1MB
-
MD5
658b86ab0e3b32696afa02c79311faa0
-
SHA1
de1896bc3a1bb821ac29fb295ca2d6a200eea8aa
-
SHA256
ea5758a9f08524f81cc2924ce14985c8814fe7bc575e57e350e92219491718c0
-
SHA512
91e3c109cb9beb43633c815437e8dc605bae4fde0e9cd4a7cc585b4f6942ba0d2c7f9653ad68f67d5301919c07400dd6b3d8143f642b473731800cfb293313bd
-
SSDEEP
196608:Yp18/QDobE0TSkJzTtpQF6ZBPTS8y5BFwGIR6ip2eyWzi+8LX+1ZxWs:Y78/1EglTvS+S897pgGiNLeZxp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation uninstall.exe -
Executes dropped EXE 1 IoCs
pid Process 3284 uninstall.exe -
Loads dropped DLL 6 IoCs
pid Process 3172 uninstall.exe 3172 uninstall.exe 3172 uninstall.exe 3172 uninstall.exe 3172 uninstall.exe 3172 uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3172 uninstall.exe 3172 uninstall.exe 3172 uninstall.exe 3172 uninstall.exe 3172 uninstall.exe 3172 uninstall.exe 3172 uninstall.exe 3172 uninstall.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3284 uninstall.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3172 wrote to memory of 3284 3172 uninstall.exe 82 PID 3172 wrote to memory of 3284 3172 uninstall.exe 82 PID 3172 wrote to memory of 3284 3172 uninstall.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\uninstall.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe" "av:1.0.1" "gv:1.0.1.2" "gs:Official-es" "gi:UA-85655135-28" "an:DroidKit" "c:iMobie"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5d8fca35ff95fe00a7174177181f8bd13
SHA1fbafea4d2790dd2c0d022dfb08ded91de7f5265e
SHA256ad873f1e51e6d033e5507235ec735957256ebeeb0d3f22aa0b57bb4bd0846e4c
SHA512eb530b10f137cb0cdfdcd2c11fd9f50f774e0ce44e9d2da3e755f6a6df24fe6e7525c27b109e3e68e9d3e49a889937a22f4d9d78703b1055a83b8a58808a58ba
-
Filesize
4KB
MD529818862640ac659ce520c9c64e63e9e
SHA1485e1e6cc552fa4f05fb767043b1e7c9eb80be64
SHA256e96afa894a995a6097a405df76155a7a39962ff6cae7a59d89a25e5a34ab9eeb
SHA512ebb94eb21e060fb90ec9c86787eada42c7c9e1e7628ea4b16d3c7b414f554a94d5e4f4abe0e4ee30fddf4f904fd3002770a9b967fbd0feeca353e21079777057
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
7.4MB
MD5839640ba4c87b4a0fbd4d81fc54f8f51
SHA10fdf3cf3685de715f8206400a232bf389ce319d6
SHA25658b8642b2665efde3974c18c2613b6e27dcf31fbb4b048339f93b2019c26d6df
SHA51214b97fd80c8b58422949b9d8db2660e93c6ee7c41873e8388cc9b62396e791f346346465527088a50a58d6d9a358e21a8652a0934149dd6ed3947841a7e59354