Analysis

  • max time kernel
    52s
  • max time network
    82s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    23/04/2022, 03:27 UTC

General

  • Target

    BD842D2F03FDFBED6725D55BEE22A568C303557945005.exe

  • Size

    5.5MB

  • MD5

    54fc82a9b31afeda471d20272833cdc8

  • SHA1

    db9cc826375b8f05457d94af761c9e59cea5b094

  • SHA256

    bd842d2f03fdfbed6725d55bee22a568c30355794500528fe820b851fa5d5c94

  • SHA512

    72fd2f092216de7984f0631b64eae49a9f364ef392eb0a5a9ac2aa4bfb2ee06ab303062b103177981de86bf8784dc493915169bc72e0a9fbcf18fb0e3534da79

Malware Config

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider Payload 5 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • suricata: ET MALWARE Win32/FFDroider CnC Activity M2

    suricata: ET MALWARE Win32/FFDroider CnC Activity M2

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BD842D2F03FDFBED6725D55BEE22A568C303557945005.exe
    "C:\Users\Admin\AppData\Local\Temp\BD842D2F03FDFBED6725D55BEE22A568C303557945005.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackCleanerSetp53245.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackCleanerSetp53245.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2180
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe" -h
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3200
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\md3_3kvm.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\md3_3kvm.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:4612
  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global
      2⤵
      • Loads dropped DLL
      PID:3412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 600
        3⤵
        • Program crash
        PID:3836
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3412 -ip 3412
    1⤵
      PID:1272

    Network

    • flag-us
      DNS
      real-enter-solutions.xyz
      BlackCleanerSetp53245.exe
      Remote address:
      8.8.8.8:53
      Request
      real-enter-solutions.xyz
      IN A
      Response
      real-enter-solutions.xyz
      IN A
      188.114.97.0
      real-enter-solutions.xyz
      IN A
      188.114.96.0
    • flag-us
      POST
      http://real-enter-solutions.xyz/
      BlackCleanerSetp53245.exe
      Remote address:
      188.114.97.0:80
      Request
      POST / HTTP/1.1
      Host: real-enter-solutions.xyz
      Content-Length: 1875
      Expect: 100-continue
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Sat, 23 Apr 2022 03:27:20 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: keep-alive
      Vary: Accept-Encoding
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ftpwuMsRRUh1EY%2BKer6vI8%2BkZT%2F8lRhyYpH9uAPBSgjA5IiEapxHgOEnWR1dy1hyaVvIJLGDb5iSUqOXNgFd%2BpCsEj4xQFikF93EqJGVglfJp3cfq9%2BrQ%2F%2Fkdc4IBtBYM0HECGJC71W7vkE%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 700380b71e4e0c09-AMS
      alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
    • flag-us
      DNS
      iplogger.org
      BlackCleanerSetp53245.exe
      Remote address:
      8.8.8.8:53
      Request
      iplogger.org
      IN A
      Response
      iplogger.org
      IN A
      148.251.234.83
    • flag-de
      GET
      https://iplogger.org/16fXQ7
      BlackCleanerSetp53245.exe
      Remote address:
      148.251.234.83:443
      Request
      GET /16fXQ7 HTTP/1.1
      User-Agent: f22022
      Host: iplogger.org
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Server: nginx
      Date: Sat, 23 Apr 2022 03:27:24 GMT
      Content-Type: image/png
      Transfer-Encoding: chunked
      Connection: keep-alive
      Set-Cookie: clhf03028ja=154.61.71.50; expires=Sun, 23-Apr-2023 03:27:25 GMT; Max-Age=31536000; path=/; secure; HttpOnly; SameSite=Strict
      Set-Cookie: timezone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0; path=/
      Set-Cookie: 344458342587707186=3; expires=Sun, 23-Apr-2023 03:27:25 GMT; Max-Age=31536000; path=/; secure; HttpOnly; SameSite=Strict
      Cache-Control: no-store, no-cache, must-revalidate
      Expires: Sat, 23 Apr 2022 03:27:25 +0000
      Answers:
      whoami: 3432df9415f8214ecae4a3c25a2b3d778b6ea36c57e4bdf6ab3689af0b7af175
      Strict-Transport-Security: max-age=31536000; preload
      X-Frame-Options: DENY
    • flag-us
      DNS
      v.xyzgamev.com
      License Keys.exe
      Remote address:
      8.8.8.8:53
      Request
      v.xyzgamev.com
      IN A
      Response
      v.xyzgamev.com
      IN A
      172.67.188.70
      v.xyzgamev.com
      IN A
      104.21.40.196
    • flag-us
      GET
      https://v.xyzgamev.com/2205.html
      License Keys.exe
      Remote address:
      172.67.188.70:443
      Request
      GET /2205.html HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
      Host: v.xyzgamev.com
      Response
      HTTP/1.1 200 OK
      Date: Sat, 23 Apr 2022 03:27:26 GMT
      Content-Length: 571238
      Connection: keep-alive
      Last-Modified: Sun, 23 Jan 2022 08:08:46 GMT
      ETag: "8b766-5d63b5c76a397"
      Accept-Ranges: bytes
      CF-Cache-Status: DYNAMIC
      Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=gDF46XIIvRYBrWNNkauml2LtbkKglC7XdaBBQBA5eMcxFeDqoKEhAFpuoQ8C3koyPyUO9SGiBYJq6lrGeL7H8MmL8tnfKKYSjO5BnPNTQ1nyj0fx7QDDkqEaZPKGl6wojQ%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 700380dddbb9fa38-AMS
      alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
    • flag-us
      GET
      https://v.xyzgamev.com/login.html
      License Keys.exe
      Remote address:
      172.67.188.70:443
      Request
      GET /login.html HTTP/1.1
      Connection: Keep-Alive
      Accept: */*
      User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
      Host: v.xyzgamev.com
      Response
      HTTP/1.1 200 OK
      Date: Sat, 23 Apr 2022 03:27:28 GMT
      Content-Type: text/html
      Transfer-Encoding: chunked
      Connection: keep-alive
      Last-Modified: Thu, 31 Mar 2022 03:38:11 GMT
      Vary: Accept-Encoding
      CF-Cache-Status: DYNAMIC
      Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=3Lvek1wczhmoGVrlj03FtbfFKlxZQJ%2FuuE%2FbuvePuSRmupdbe3XmnjK6ZIWg6Ure9xHTMTP3zWM90GoQdAtfEzWCvaqF9SWXLVGqWYQYEepOOVy63jwvGfLKD1kd6ws%2FvA%3D%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 700380e86f77fa38-AMS
      alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
    • flag-bz
      GET
      http://186.2.171.17/seemorebty/il.php?e=md3_3kvm
      md3_3kvm.exe
      Remote address:
      186.2.171.17:80
      Request
      GET /seemorebty/il.php?e=md3_3kvm HTTP/1.1
      Connection: Keep-Alive
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image webp,image apng, q=0.8,application signed-exchange v=b3
      Accept-Language: en-US,en;q=0.9
      Referer: https://www.facebook.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit 537.36 (KHTML, like Gecko) Chrome 70.0.3538.110 Safari 537.36
      Host: 186.2.171.17
      Response
      HTTP/1.1 301 Moved Permanently
      Server: ddos-guard
      Date: Sat, 23 Apr 2022 03:27:28 GMT
      Connection: keep-alive
      Keep-Alive: timeout=60
      Location: https://186.2.171.17/seemorebty/il.php?e=md3_3kvm
      Content-Type: text/html; charset=utf8
      Content-Length: 568
    • flag-bz
      GET
      https://186.2.171.17/seemorebty/il.php?e=md3_3kvm
      md3_3kvm.exe
      Remote address:
      186.2.171.17:443
      Request
      GET /seemorebty/il.php?e=md3_3kvm HTTP/1.1
      Connection: Keep-Alive
      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image webp,image apng, q=0.8,application signed-exchange v=b3
      Accept-Language: en-US,en;q=0.9
      Referer: https://www.facebook.com
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit 537.36 (KHTML, like Gecko) Chrome 70.0.3538.110 Safari 537.36
      Host: 186.2.171.17
      Response
      HTTP/1.1 502 Bad Gateway
      Server: ddos-guard
      Date: Sat, 23 Apr 2022 03:27:29 GMT
      Connection: keep-alive
      Keep-Alive: timeout=60
      Content-Type: text/html; charset=utf8
      Content-Length: 585
    • 188.114.97.0:80
      http://real-enter-solutions.xyz/
      http
      BlackCleanerSetp53245.exe
      2.3kB
      1.2kB
      7
      7

      HTTP Request

      POST http://real-enter-solutions.xyz/

      HTTP Response

      200
    • 148.251.234.83:443
      https://iplogger.org/16fXQ7
      tls, http
      BlackCleanerSetp53245.exe
      805 B
      6.0kB
      8
      11

      HTTP Request

      GET https://iplogger.org/16fXQ7

      HTTP Response

      200
    • 172.67.188.70:443
      https://v.xyzgamev.com/login.html
      tls, http
      License Keys.exe
      16.8kB
      661.0kB
      345
      619

      HTTP Request

      GET https://v.xyzgamev.com/2205.html

      HTTP Response

      200

      HTTP Request

      GET https://v.xyzgamev.com/login.html

      HTTP Response

      200
    • 186.2.171.17:80
      http://186.2.171.17/seemorebty/il.php?e=md3_3kvm
      http
      md3_3kvm.exe
      597 B
      1.2kB
      4
      8

      HTTP Request

      GET http://186.2.171.17/seemorebty/il.php?e=md3_3kvm

      HTTP Response

      301
    • 186.2.171.17:443
      https://186.2.171.17/seemorebty/il.php?e=md3_3kvm
      tls, http
      md3_3kvm.exe
      1.0kB
      2.6kB
      7
      11

      HTTP Request

      GET https://186.2.171.17/seemorebty/il.php?e=md3_3kvm

      HTTP Response

      502
    • 104.97.14.81:80
      276 B
      6
    • 8.8.8.8:53
      real-enter-solutions.xyz
      dns
      BlackCleanerSetp53245.exe
      70 B
      102 B
      1
      1

      DNS Request

      real-enter-solutions.xyz

      DNS Response

      188.114.97.0
      188.114.96.0

    • 8.8.8.8:53
      iplogger.org
      dns
      BlackCleanerSetp53245.exe
      58 B
      74 B
      1
      1

      DNS Request

      iplogger.org

      DNS Response

      148.251.234.83

    • 8.8.8.8:53
      v.xyzgamev.com
      dns
      License Keys.exe
      60 B
      92 B
      1
      1

      DNS Request

      v.xyzgamev.com

      DNS Response

      172.67.188.70
      104.21.40.196

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackCleanerSetp53245.exe

      Filesize

      185KB

      MD5

      528fde7371e19a6bd5b0e410d579e31b

      SHA1

      0a606a0d872ea6b66ee9029d36a891cae172032e

      SHA256

      bc6a8ebdc6cf5d2d2a511b613f07b963f56aa58b280b82fdd67c7f7c57241021

      SHA512

      f7db40f8c69200c63f0bb5e1a61d27db49ad117a03409435ea8eacdfa2ed1f616dd546fe729044970a0b1ee38d94b27fda65b25ded44f5c163f64eb21832ddda

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\BlackCleanerSetp53245.exe

      Filesize

      185KB

      MD5

      528fde7371e19a6bd5b0e410d579e31b

      SHA1

      0a606a0d872ea6b66ee9029d36a891cae172032e

      SHA256

      bc6a8ebdc6cf5d2d2a511b613f07b963f56aa58b280b82fdd67c7f7c57241021

      SHA512

      f7db40f8c69200c63f0bb5e1a61d27db49ad117a03409435ea8eacdfa2ed1f616dd546fe729044970a0b1ee38d94b27fda65b25ded44f5c163f64eb21832ddda

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe

      Filesize

      372KB

      MD5

      df9ff2bbc0272b74bd1da53ff5220013

      SHA1

      332ab0565cb654689a86366679430566d6e3bb04

      SHA256

      dd20ca2322eac8b4939add4da130ab8e922d2b733a15960cd3bec5e9cd3b70cc

      SHA512

      8b5a9882db2e1394f73e945993d9cdb7eb887224250bd999765c1bb87a9ad8c8192901c0f277d1f57c0ec0fd86e8e6143e56264228f05f0b14a5e45fc54c40e1

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe

      Filesize

      372KB

      MD5

      df9ff2bbc0272b74bd1da53ff5220013

      SHA1

      332ab0565cb654689a86366679430566d6e3bb04

      SHA256

      dd20ca2322eac8b4939add4da130ab8e922d2b733a15960cd3bec5e9cd3b70cc

      SHA512

      8b5a9882db2e1394f73e945993d9cdb7eb887224250bd999765c1bb87a9ad8c8192901c0f277d1f57c0ec0fd86e8e6143e56264228f05f0b14a5e45fc54c40e1

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\License Keys.exe

      Filesize

      372KB

      MD5

      df9ff2bbc0272b74bd1da53ff5220013

      SHA1

      332ab0565cb654689a86366679430566d6e3bb04

      SHA256

      dd20ca2322eac8b4939add4da130ab8e922d2b733a15960cd3bec5e9cd3b70cc

      SHA512

      8b5a9882db2e1394f73e945993d9cdb7eb887224250bd999765c1bb87a9ad8c8192901c0f277d1f57c0ec0fd86e8e6143e56264228f05f0b14a5e45fc54c40e1

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\md3_3kvm.exe

      Filesize

      3.6MB

      MD5

      804f53a01f73c24619dd5de92798f4c2

      SHA1

      a7fbf476eb314b286fde760ff44b427d848adcb7

      SHA256

      8b7d5d8d1750c7b358d352c1f438a1084525cc6922bb0b7a2fce5a8861d09c35

      SHA512

      c2c33fad369752113d513bf389d5b999395b0b3589cf9645b0886819ccef6008208539e513db98151a233e48abcf1cec0cbe7c385f2c51f1be9518350723ff85

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\md3_3kvm.exe

      Filesize

      3.6MB

      MD5

      804f53a01f73c24619dd5de92798f4c2

      SHA1

      a7fbf476eb314b286fde760ff44b427d848adcb7

      SHA256

      8b7d5d8d1750c7b358d352c1f438a1084525cc6922bb0b7a2fce5a8861d09c35

      SHA512

      c2c33fad369752113d513bf389d5b999395b0b3589cf9645b0886819ccef6008208539e513db98151a233e48abcf1cec0cbe7c385f2c51f1be9518350723ff85

    • C:\Users\Admin\AppData\Local\Temp\db.dat

      Filesize

      557KB

      MD5

      4296e09b9240ba716102c1ab805466e6

      SHA1

      b4d6c0c58fcd876cf16f5457141f2526c4b60f9b

      SHA256

      accf4b4b1be2e197dfaced7ec3d4bffb5c31f5d5c72ab3b395b5adc244b2be4b

      SHA512

      cd962e7a6e2443b152c8a6d29c3c2781587338dd6e3a013eb5349dc92716e262ec6111e75f023251dae57e46e6ed4bd789fa5188746ae41d3cf1f8f0c5d05593

    • C:\Users\Admin\AppData\Local\Temp\db.dll

      Filesize

      52KB

      MD5

      bdbd4096939e9072429ccfb446043270

      SHA1

      ce5984398fb9b6a238d74055ef7fae9779c0b579

      SHA256

      fbb2fce3724c542e1b985be9a7d118a566b1c8e87fa4e329da63e90c73bc38e4

      SHA512

      ec0b7061a67d8f35532b8ecf17832baa44d69f26e65c6d5d15a690c380c4d3ce15467f5753595206c4ae070a77772566e01a4b50f755baa7d11d986bd27e4c44

    • C:\Users\Admin\AppData\Local\Temp\db.dll

      Filesize

      52KB

      MD5

      bdbd4096939e9072429ccfb446043270

      SHA1

      ce5984398fb9b6a238d74055ef7fae9779c0b579

      SHA256

      fbb2fce3724c542e1b985be9a7d118a566b1c8e87fa4e329da63e90c73bc38e4

      SHA512

      ec0b7061a67d8f35532b8ecf17832baa44d69f26e65c6d5d15a690c380c4d3ce15467f5753595206c4ae070a77772566e01a4b50f755baa7d11d986bd27e4c44

    • memory/2180-134-0x0000000002B40000-0x0000000002B90000-memory.dmp

      Filesize

      320KB

    • memory/2180-136-0x000000001CDB0000-0x000000001CDB2000-memory.dmp

      Filesize

      8KB

    • memory/2180-135-0x00007FFDDB840000-0x00007FFDDC301000-memory.dmp

      Filesize

      10.8MB

    • memory/2180-133-0x0000000000A70000-0x0000000000AA4000-memory.dmp

      Filesize

      208KB

    • memory/4612-150-0x0000000000400000-0x000000000098F000-memory.dmp

      Filesize

      5.6MB

    • memory/4612-148-0x0000000000400000-0x000000000098F000-memory.dmp

      Filesize

      5.6MB

    • memory/4612-147-0x0000000000400000-0x000000000098F000-memory.dmp

      Filesize

      5.6MB

    • memory/4612-146-0x0000000000400000-0x000000000098F000-memory.dmp

      Filesize

      5.6MB

    • memory/4612-145-0x0000000000400000-0x000000000098F000-memory.dmp

      Filesize

      5.6MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.