Analysis
-
max time kernel
153s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
28-05-2022 04:12
Static task
static1
Behavioral task
behavioral1
Sample
0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe
-
Size
3.8MB
-
MD5
2fae1bd2d77f021a0b327b5356c4d2c7
-
SHA1
cd0bb537e1aec361a8abe141795718ab2f37bf79
-
SHA256
0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d
-
SHA512
0582506405d6fb6c6c94a0d6dbd2067dd7c3fd9f54a8a92ed1248b89fd216b28e2b3489fdfb7ce8dd5888eb021eefd9159864b5aa4cc5a5408847828eb123d6b
Malware Config
Signatures
-
FFDroider Payload 8 IoCs
resource yara_rule behavioral2/memory/1928-131-0x0000000000400000-0x00000000009F1000-memory.dmp family_ffdroider behavioral2/memory/1928-132-0x0000000000400000-0x00000000009F1000-memory.dmp family_ffdroider behavioral2/memory/1928-133-0x0000000000400000-0x00000000009F1000-memory.dmp family_ffdroider behavioral2/memory/1928-134-0x0000000000400000-0x00000000009F1000-memory.dmp family_ffdroider behavioral2/memory/1928-136-0x0000000000400000-0x00000000009F1000-memory.dmp family_ffdroider behavioral2/memory/1928-137-0x0000000000400000-0x00000000009F1000-memory.dmp family_ffdroider behavioral2/memory/1928-582-0x0000000000400000-0x00000000009F1000-memory.dmp family_ffdroider behavioral2/memory/1928-946-0x0000000000400000-0x00000000009F1000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe Token: SeManageVolumePrivilege 1928 0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe"C:\Users\Admin\AppData\Local\Temp\0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1928