Analysis
-
max time kernel
87s -
max time network
176s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
24-04-2022 22:58
Static task
static1
Behavioral task
behavioral1
Sample
94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe
Resource
win10-20220414-en
Behavioral task
behavioral3
Sample
94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral4
Sample
94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe
Resource
win11-20220223-en
General
-
Target
94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe
-
Size
1.9MB
-
MD5
beb93a48eefd9be5e5664754e9c6f175
-
SHA1
d007e52aa93034a54b2f8167e3bcdcff8a65a63d
-
SHA256
94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474
-
SHA512
7b7ca6a538eed77f8a10aa9628466a2d41d3133510663d065594ee83dfec5e432d8a0bd206b7383e014f8bad282c736662d22c9b9e5705436ec235e8c384cb2a
Malware Config
Signatures
-
FFDroider Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2348-118-0x00000000012E0000-0x000000000177A000-memory.dmp family_ffdroider behavioral2/memory/2348-119-0x00000000012E0000-0x000000000177A000-memory.dmp family_ffdroider behavioral2/memory/2348-120-0x00000000012E0000-0x000000000177A000-memory.dmp family_ffdroider behavioral2/memory/2348-1010-0x00000000012E0000-0x000000000177A000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exedescription pid process Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe Token: SeManageVolumePrivilege 2348 94031fe0fbda71abdfa4f51c370d0da17deae7578549a81335dfbb446f75c474.exe