Analysis

  • max time kernel
    52s
  • max time network
    82s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    23-04-2022 03:27

General

  • Target

    BD842D2F03FDFBED6725D55BEE22A568C303557945005.exe

  • Size

    5.5MB

  • MD5

    54fc82a9b31afeda471d20272833cdc8

  • SHA1

    db9cc826375b8f05457d94af761c9e59cea5b094

  • SHA256

    bd842d2f03fdfbed6725d55bee22a568c30355794500528fe820b851fa5d5c94

  • SHA512

    72fd2f092216de7984f0631b64eae49a9f364ef392eb0a5a9ac2aa4bfb2ee06ab303062b103177981de86bf8784dc493915169bc72e0a9fbcf18fb0e3534da79

Malware Config

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider Payload 5 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • suricata: ET MALWARE Win32/FFDroider CnC Activity M2

    suricata: ET MALWARE Win32/FFDroider CnC Activity M2

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BD842D2F03FDFBED6725D55BEE22A568C303557945005.exe
    "C:\Users\Admin\AppData\Local\Temp\BD842D2F03FDFBED6725D55BEE22A568C303557945005.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackCleanerSetp53245.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackCleanerSetp53245.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2180
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe" -h
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3200
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\md3_3kvm.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\md3_3kvm.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:4612
  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global
      2⤵
      • Loads dropped DLL
      PID:3412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 600
        3⤵
        • Program crash
        PID:3836
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3412 -ip 3412
    1⤵
      PID:1272

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    4
    T1082

    Collection

    Data from Local System

    1
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackCleanerSetp53245.exe
      Filesize

      185KB

      MD5

      528fde7371e19a6bd5b0e410d579e31b

      SHA1

      0a606a0d872ea6b66ee9029d36a891cae172032e

      SHA256

      bc6a8ebdc6cf5d2d2a511b613f07b963f56aa58b280b82fdd67c7f7c57241021

      SHA512

      f7db40f8c69200c63f0bb5e1a61d27db49ad117a03409435ea8eacdfa2ed1f616dd546fe729044970a0b1ee38d94b27fda65b25ded44f5c163f64eb21832ddda

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackCleanerSetp53245.exe
      Filesize

      185KB

      MD5

      528fde7371e19a6bd5b0e410d579e31b

      SHA1

      0a606a0d872ea6b66ee9029d36a891cae172032e

      SHA256

      bc6a8ebdc6cf5d2d2a511b613f07b963f56aa58b280b82fdd67c7f7c57241021

      SHA512

      f7db40f8c69200c63f0bb5e1a61d27db49ad117a03409435ea8eacdfa2ed1f616dd546fe729044970a0b1ee38d94b27fda65b25ded44f5c163f64eb21832ddda

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe
      Filesize

      372KB

      MD5

      df9ff2bbc0272b74bd1da53ff5220013

      SHA1

      332ab0565cb654689a86366679430566d6e3bb04

      SHA256

      dd20ca2322eac8b4939add4da130ab8e922d2b733a15960cd3bec5e9cd3b70cc

      SHA512

      8b5a9882db2e1394f73e945993d9cdb7eb887224250bd999765c1bb87a9ad8c8192901c0f277d1f57c0ec0fd86e8e6143e56264228f05f0b14a5e45fc54c40e1

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe
      Filesize

      372KB

      MD5

      df9ff2bbc0272b74bd1da53ff5220013

      SHA1

      332ab0565cb654689a86366679430566d6e3bb04

      SHA256

      dd20ca2322eac8b4939add4da130ab8e922d2b733a15960cd3bec5e9cd3b70cc

      SHA512

      8b5a9882db2e1394f73e945993d9cdb7eb887224250bd999765c1bb87a9ad8c8192901c0f277d1f57c0ec0fd86e8e6143e56264228f05f0b14a5e45fc54c40e1

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe
      Filesize

      372KB

      MD5

      df9ff2bbc0272b74bd1da53ff5220013

      SHA1

      332ab0565cb654689a86366679430566d6e3bb04

      SHA256

      dd20ca2322eac8b4939add4da130ab8e922d2b733a15960cd3bec5e9cd3b70cc

      SHA512

      8b5a9882db2e1394f73e945993d9cdb7eb887224250bd999765c1bb87a9ad8c8192901c0f277d1f57c0ec0fd86e8e6143e56264228f05f0b14a5e45fc54c40e1

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\md3_3kvm.exe
      Filesize

      3.6MB

      MD5

      804f53a01f73c24619dd5de92798f4c2

      SHA1

      a7fbf476eb314b286fde760ff44b427d848adcb7

      SHA256

      8b7d5d8d1750c7b358d352c1f438a1084525cc6922bb0b7a2fce5a8861d09c35

      SHA512

      c2c33fad369752113d513bf389d5b999395b0b3589cf9645b0886819ccef6008208539e513db98151a233e48abcf1cec0cbe7c385f2c51f1be9518350723ff85

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\md3_3kvm.exe
      Filesize

      3.6MB

      MD5

      804f53a01f73c24619dd5de92798f4c2

      SHA1

      a7fbf476eb314b286fde760ff44b427d848adcb7

      SHA256

      8b7d5d8d1750c7b358d352c1f438a1084525cc6922bb0b7a2fce5a8861d09c35

      SHA512

      c2c33fad369752113d513bf389d5b999395b0b3589cf9645b0886819ccef6008208539e513db98151a233e48abcf1cec0cbe7c385f2c51f1be9518350723ff85

    • C:\Users\Admin\AppData\Local\Temp\db.dat
      Filesize

      557KB

      MD5

      4296e09b9240ba716102c1ab805466e6

      SHA1

      b4d6c0c58fcd876cf16f5457141f2526c4b60f9b

      SHA256

      accf4b4b1be2e197dfaced7ec3d4bffb5c31f5d5c72ab3b395b5adc244b2be4b

      SHA512

      cd962e7a6e2443b152c8a6d29c3c2781587338dd6e3a013eb5349dc92716e262ec6111e75f023251dae57e46e6ed4bd789fa5188746ae41d3cf1f8f0c5d05593

    • C:\Users\Admin\AppData\Local\Temp\db.dll
      Filesize

      52KB

      MD5

      bdbd4096939e9072429ccfb446043270

      SHA1

      ce5984398fb9b6a238d74055ef7fae9779c0b579

      SHA256

      fbb2fce3724c542e1b985be9a7d118a566b1c8e87fa4e329da63e90c73bc38e4

      SHA512

      ec0b7061a67d8f35532b8ecf17832baa44d69f26e65c6d5d15a690c380c4d3ce15467f5753595206c4ae070a77772566e01a4b50f755baa7d11d986bd27e4c44

    • C:\Users\Admin\AppData\Local\Temp\db.dll
      Filesize

      52KB

      MD5

      bdbd4096939e9072429ccfb446043270

      SHA1

      ce5984398fb9b6a238d74055ef7fae9779c0b579

      SHA256

      fbb2fce3724c542e1b985be9a7d118a566b1c8e87fa4e329da63e90c73bc38e4

      SHA512

      ec0b7061a67d8f35532b8ecf17832baa44d69f26e65c6d5d15a690c380c4d3ce15467f5753595206c4ae070a77772566e01a4b50f755baa7d11d986bd27e4c44

    • memory/2180-134-0x0000000002B40000-0x0000000002B90000-memory.dmp
      Filesize

      320KB

    • memory/2180-130-0x0000000000000000-mapping.dmp
    • memory/2180-136-0x000000001CDB0000-0x000000001CDB2000-memory.dmp
      Filesize

      8KB

    • memory/2180-135-0x00007FFDDB840000-0x00007FFDDC301000-memory.dmp
      Filesize

      10.8MB

    • memory/2180-133-0x0000000000A70000-0x0000000000AA4000-memory.dmp
      Filesize

      208KB

    • memory/3200-140-0x0000000000000000-mapping.dmp
    • memory/3412-152-0x0000000000000000-mapping.dmp
    • memory/4108-137-0x0000000000000000-mapping.dmp
    • memory/4612-142-0x0000000000000000-mapping.dmp
    • memory/4612-150-0x0000000000400000-0x000000000098F000-memory.dmp
      Filesize

      5.6MB

    • memory/4612-148-0x0000000000400000-0x000000000098F000-memory.dmp
      Filesize

      5.6MB

    • memory/4612-147-0x0000000000400000-0x000000000098F000-memory.dmp
      Filesize

      5.6MB

    • memory/4612-146-0x0000000000400000-0x000000000098F000-memory.dmp
      Filesize

      5.6MB

    • memory/4612-145-0x0000000000400000-0x000000000098F000-memory.dmp
      Filesize

      5.6MB