Analysis

  • max time kernel
    117s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-05-2022 06:46

General

  • Target

    5c21cca8d79a5c46f7f1bd78b222c47a.exe

  • Size

    3.9MB

  • MD5

    5c21cca8d79a5c46f7f1bd78b222c47a

  • SHA1

    bd249dea8ceb0a4bde6ee336ed2063696b821767

  • SHA256

    5b60d2cb0b63bcd9c7df5873496d119de3f5364ba6eeea8548f20b2940a73ffa

  • SHA512

    1f63c24f59d5508a81e371e8c4ab8f11ce1c61a31fb78ecefdbe3d59d5e62eb281bda61e507642b92f3a897b11b0a3b0dcee3369cb78686097c91c91b08108d7

Malware Config

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider Payload 8 IoCs
  • suricata: ET MALWARE Win32/FFDroider CnC Activity

    suricata: ET MALWARE Win32/FFDroider CnC Activity

  • suricata: ET MALWARE Win32/FFDroider CnC Activity M2

    suricata: ET MALWARE Win32/FFDroider CnC Activity M2

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c21cca8d79a5c46f7f1bd78b222c47a.exe
    "C:\Users\Admin\AppData\Local\Temp\5c21cca8d79a5c46f7f1bd78b222c47a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe
      "C:\Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe

    Filesize

    3.3MB

    MD5

    dfb6e366186969c7265e5602a4b85335

    SHA1

    f20c75e427ef43b853b4a053e98cd301cae331c1

    SHA256

    d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835

    SHA512

    5420980743bb7772ffd1cda00acbbe921ec3746c20db17b653fc8cd4c795db33d516ea82604f43b61dc94ca6a949d21338f3d3528b3ac0f168bdae4676af9019

  • C:\Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe

    Filesize

    3.3MB

    MD5

    dfb6e366186969c7265e5602a4b85335

    SHA1

    f20c75e427ef43b853b4a053e98cd301cae331c1

    SHA256

    d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835

    SHA512

    5420980743bb7772ffd1cda00acbbe921ec3746c20db17b653fc8cd4c795db33d516ea82604f43b61dc94ca6a949d21338f3d3528b3ac0f168bdae4676af9019

  • \Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe

    Filesize

    3.3MB

    MD5

    dfb6e366186969c7265e5602a4b85335

    SHA1

    f20c75e427ef43b853b4a053e98cd301cae331c1

    SHA256

    d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835

    SHA512

    5420980743bb7772ffd1cda00acbbe921ec3746c20db17b653fc8cd4c795db33d516ea82604f43b61dc94ca6a949d21338f3d3528b3ac0f168bdae4676af9019

  • \Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe

    Filesize

    3.3MB

    MD5

    dfb6e366186969c7265e5602a4b85335

    SHA1

    f20c75e427ef43b853b4a053e98cd301cae331c1

    SHA256

    d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835

    SHA512

    5420980743bb7772ffd1cda00acbbe921ec3746c20db17b653fc8cd4c795db33d516ea82604f43b61dc94ca6a949d21338f3d3528b3ac0f168bdae4676af9019

  • \Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe

    Filesize

    3.3MB

    MD5

    dfb6e366186969c7265e5602a4b85335

    SHA1

    f20c75e427ef43b853b4a053e98cd301cae331c1

    SHA256

    d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835

    SHA512

    5420980743bb7772ffd1cda00acbbe921ec3746c20db17b653fc8cd4c795db33d516ea82604f43b61dc94ca6a949d21338f3d3528b3ac0f168bdae4676af9019

  • \Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe

    Filesize

    3.3MB

    MD5

    dfb6e366186969c7265e5602a4b85335

    SHA1

    f20c75e427ef43b853b4a053e98cd301cae331c1

    SHA256

    d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835

    SHA512

    5420980743bb7772ffd1cda00acbbe921ec3746c20db17b653fc8cd4c795db33d516ea82604f43b61dc94ca6a949d21338f3d3528b3ac0f168bdae4676af9019

  • memory/1728-54-0x0000000075381000-0x0000000075383000-memory.dmp

    Filesize

    8KB

  • memory/1728-63-0x0000000000400000-0x00000000009BC000-memory.dmp

    Filesize

    5.7MB

  • memory/1908-64-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB