Analysis

  • max time kernel
    147s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-05-2022 06:46

General

  • Target

    5c21cca8d79a5c46f7f1bd78b222c47a.exe

  • Size

    3.9MB

  • MD5

    5c21cca8d79a5c46f7f1bd78b222c47a

  • SHA1

    bd249dea8ceb0a4bde6ee336ed2063696b821767

  • SHA256

    5b60d2cb0b63bcd9c7df5873496d119de3f5364ba6eeea8548f20b2940a73ffa

  • SHA512

    1f63c24f59d5508a81e371e8c4ab8f11ce1c61a31fb78ecefdbe3d59d5e62eb281bda61e507642b92f3a897b11b0a3b0dcee3369cb78686097c91c91b08108d7

Malware Config

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider Payload 4 IoCs
  • suricata: ET MALWARE Win32/FFDroider CnC Activity

    suricata: ET MALWARE Win32/FFDroider CnC Activity

  • suricata: ET MALWARE Win32/FFDroider CnC Activity M2

    suricata: ET MALWARE Win32/FFDroider CnC Activity M2

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c21cca8d79a5c46f7f1bd78b222c47a.exe
    "C:\Users\Admin\AppData\Local\Temp\5c21cca8d79a5c46f7f1bd78b222c47a.exe"
    1⤵
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe
      "C:\Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:2968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe

    Filesize

    3.3MB

    MD5

    dfb6e366186969c7265e5602a4b85335

    SHA1

    f20c75e427ef43b853b4a053e98cd301cae331c1

    SHA256

    d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835

    SHA512

    5420980743bb7772ffd1cda00acbbe921ec3746c20db17b653fc8cd4c795db33d516ea82604f43b61dc94ca6a949d21338f3d3528b3ac0f168bdae4676af9019

  • C:\Users\Admin\Documents\VlcpVideoV1.0.1\da_1648136254601.exe

    Filesize

    3.3MB

    MD5

    dfb6e366186969c7265e5602a4b85335

    SHA1

    f20c75e427ef43b853b4a053e98cd301cae331c1

    SHA256

    d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835

    SHA512

    5420980743bb7772ffd1cda00acbbe921ec3746c20db17b653fc8cd4c795db33d516ea82604f43b61dc94ca6a949d21338f3d3528b3ac0f168bdae4676af9019

  • memory/1296-154-0x0000000004EF0000-0x0000000004EF8000-memory.dmp

    Filesize

    32KB

  • memory/1296-134-0x0000000004280000-0x0000000004290000-memory.dmp

    Filesize

    64KB

  • memory/1296-155-0x0000000005110000-0x0000000005118000-memory.dmp

    Filesize

    32KB

  • memory/1296-156-0x0000000004EF0000-0x0000000004EF8000-memory.dmp

    Filesize

    32KB

  • memory/1296-146-0x0000000004ED0000-0x0000000004ED8000-memory.dmp

    Filesize

    32KB

  • memory/1296-147-0x0000000004EF0000-0x0000000004EF8000-memory.dmp

    Filesize

    32KB

  • memory/1296-148-0x0000000004F90000-0x0000000004F98000-memory.dmp

    Filesize

    32KB

  • memory/1296-149-0x00000000050E0000-0x00000000050E8000-memory.dmp

    Filesize

    32KB

  • memory/1296-150-0x0000000005100000-0x0000000005108000-memory.dmp

    Filesize

    32KB

  • memory/1296-151-0x00000000053A0000-0x00000000053A8000-memory.dmp

    Filesize

    32KB

  • memory/1296-152-0x00000000052A0000-0x00000000052A8000-memory.dmp

    Filesize

    32KB

  • memory/1296-153-0x0000000005110000-0x0000000005118000-memory.dmp

    Filesize

    32KB

  • memory/1296-130-0x0000000000400000-0x00000000009BC000-memory.dmp

    Filesize

    5.7MB

  • memory/1296-190-0x0000000004EF0000-0x0000000004EF8000-memory.dmp

    Filesize

    32KB

  • memory/1296-140-0x0000000004420000-0x0000000004430000-memory.dmp

    Filesize

    64KB

  • memory/1296-157-0x0000000005110000-0x0000000005118000-memory.dmp

    Filesize

    32KB

  • memory/1296-182-0x0000000004ED0000-0x0000000004ED8000-memory.dmp

    Filesize

    32KB

  • memory/1296-183-0x0000000004EF0000-0x0000000004EF8000-memory.dmp

    Filesize

    32KB

  • memory/1296-184-0x0000000004F90000-0x0000000004F98000-memory.dmp

    Filesize

    32KB

  • memory/1296-185-0x00000000050D0000-0x00000000050D8000-memory.dmp

    Filesize

    32KB

  • memory/1296-186-0x00000000050F0000-0x00000000050F8000-memory.dmp

    Filesize

    32KB

  • memory/1296-187-0x00000000053A0000-0x00000000053A8000-memory.dmp

    Filesize

    32KB

  • memory/1296-188-0x00000000052A0000-0x00000000052A8000-memory.dmp

    Filesize

    32KB

  • memory/1296-189-0x0000000004EF0000-0x0000000004EF8000-memory.dmp

    Filesize

    32KB

  • memory/2968-918-0x0000000000400000-0x00000000008D3000-memory.dmp

    Filesize

    4.8MB