Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
11-04-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
0a90fcb89e5c36783d14359dfd0d2462.exe
Resource
win7-20220311-en
General
-
Target
0a90fcb89e5c36783d14359dfd0d2462.exe
-
Size
2.9MB
-
MD5
0a90fcb89e5c36783d14359dfd0d2462
-
SHA1
2ff0e1a4c591dfc6182c4f58209ae02210abff86
-
SHA256
09bbc753aa0ac277e42418b81587e1362c5dea6798432b3f589f0dae187d7953
-
SHA512
bf043ddd6c6c4ac363d4f62399be6eb396f6f8ece8310cd4164eaf7109a62c5e44b7f2a3e1eb75f47f8c11942dc7a47f25680f6ffd4314212f563dcea0f46b81
Malware Config
Signatures
-
FFDroider Payload 2 IoCs
resource yara_rule behavioral2/memory/4792-125-0x0000000002A40000-0x0000000002F38000-memory.dmp family_ffdroider behavioral2/memory/4792-126-0x0000000000400000-0x0000000000906000-memory.dmp family_ffdroider -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4932 da_1648136254601.exe -
resource yara_rule behavioral2/files/0x000600000002181e-129.dat upx behavioral2/files/0x000600000002181e-128.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\Control Panel\International\Geo\Nation 0a90fcb89e5c36783d14359dfd0d2462.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0a90fcb89e5c36783d14359dfd0d2462.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA da_1648136254601.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5100 4792 WerFault.exe 80 -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4932 da_1648136254601.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4932 da_1648136254601.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4932 da_1648136254601.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe Token: SeManageVolumePrivilege 4792 0a90fcb89e5c36783d14359dfd0d2462.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4932 4792 0a90fcb89e5c36783d14359dfd0d2462.exe 94 PID 4792 wrote to memory of 4932 4792 0a90fcb89e5c36783d14359dfd0d2462.exe 94 PID 4792 wrote to memory of 4932 4792 0a90fcb89e5c36783d14359dfd0d2462.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a90fcb89e5c36783d14359dfd0d2462.exe"C:\Users\Admin\AppData\Local\Temp\0a90fcb89e5c36783d14359dfd0d2462.exe"1⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe"C:\Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 28322⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4792 -ip 47921⤵PID:3120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5369727c8448874edcbf2ad2db5f5271a
SHA1f962a928e24071d2cf63b3e67abaca1d40b840b7
SHA256fe06db434d5e0cca0d0c72627fc732bfca85d3708649464e5b61d814468ee739
SHA51211cd32a2284f611da89788622414065804aacdebfaba8c07c48d2ffe18b063df6e8f5945f119a4335ce15daa97a455237c578c02bcf85cf4827542a205cb0970
-
Filesize
2.0MB
MD5369727c8448874edcbf2ad2db5f5271a
SHA1f962a928e24071d2cf63b3e67abaca1d40b840b7
SHA256fe06db434d5e0cca0d0c72627fc732bfca85d3708649464e5b61d814468ee739
SHA51211cd32a2284f611da89788622414065804aacdebfaba8c07c48d2ffe18b063df6e8f5945f119a4335ce15daa97a455237c578c02bcf85cf4827542a205cb0970