Analysis
-
max time kernel
157s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 12:05
Static task
static1
General
-
Target
d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe
-
Size
3.3MB
-
MD5
dfb6e366186969c7265e5602a4b85335
-
SHA1
f20c75e427ef43b853b4a053e98cd301cae331c1
-
SHA256
d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835
-
SHA512
5420980743bb7772ffd1cda00acbbe921ec3746c20db17b653fc8cd4c795db33d516ea82604f43b61dc94ca6a949d21338f3d3528b3ac0f168bdae4676af9019
Malware Config
Signatures
-
FFDroider Payload 1 IoCs
resource yara_rule behavioral1/memory/4832-130-0x0000000000400000-0x00000000008D3000-memory.dmp family_ffdroider -
suricata: ET MALWARE Win32/FFDroider CnC Activity
suricata: ET MALWARE Win32/FFDroider CnC Activity
-
suricata: ET MALWARE Win32/FFDroider CnC Activity M2
suricata: ET MALWARE Win32/FFDroider CnC Activity M2
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe Token: SeManageVolumePrivilege 4832 d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe"C:\Users\Admin\AppData\Local\Temp\d77bea86bd4c36acae410d6dec8e012439e36d6226d99f1fd7de29827fca3835.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4832