Analysis

  • max time kernel
    153s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    28-05-2022 04:12

General

  • Target

    0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe

  • Size

    3.8MB

  • MD5

    2fae1bd2d77f021a0b327b5356c4d2c7

  • SHA1

    cd0bb537e1aec361a8abe141795718ab2f37bf79

  • SHA256

    0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d

  • SHA512

    0582506405d6fb6c6c94a0d6dbd2067dd7c3fd9f54a8a92ed1248b89fd216b28e2b3489fdfb7ce8dd5888eb021eefd9159864b5aa4cc5a5408847828eb123d6b

Malware Config

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider Payload 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe
    "C:\Users\Admin\AppData\Local\Temp\0281a3df4c3626c144d04210e776a0f6078244e64eb0713c468bca08d09b7e5d.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1928-130-0x0000000000400000-0x00000000009F1000-memory.dmp

    Filesize

    5.9MB

  • memory/1928-131-0x0000000000400000-0x00000000009F1000-memory.dmp

    Filesize

    5.9MB

  • memory/1928-132-0x0000000000400000-0x00000000009F1000-memory.dmp

    Filesize

    5.9MB

  • memory/1928-133-0x0000000000400000-0x00000000009F1000-memory.dmp

    Filesize

    5.9MB

  • memory/1928-134-0x0000000000400000-0x00000000009F1000-memory.dmp

    Filesize

    5.9MB

  • memory/1928-136-0x0000000000400000-0x00000000009F1000-memory.dmp

    Filesize

    5.9MB

  • memory/1928-137-0x0000000000400000-0x00000000009F1000-memory.dmp

    Filesize

    5.9MB

  • memory/1928-138-0x00000000041C0000-0x00000000041D0000-memory.dmp

    Filesize

    64KB

  • memory/1928-144-0x0000000004360000-0x0000000004370000-memory.dmp

    Filesize

    64KB

  • memory/1928-150-0x0000000004E10000-0x0000000004E18000-memory.dmp

    Filesize

    32KB

  • memory/1928-151-0x0000000004E30000-0x0000000004E38000-memory.dmp

    Filesize

    32KB

  • memory/1928-152-0x0000000004ED0000-0x0000000004ED8000-memory.dmp

    Filesize

    32KB

  • memory/1928-153-0x0000000005020000-0x0000000005028000-memory.dmp

    Filesize

    32KB

  • memory/1928-154-0x0000000005180000-0x0000000005188000-memory.dmp

    Filesize

    32KB

  • memory/1928-155-0x0000000005420000-0x0000000005428000-memory.dmp

    Filesize

    32KB

  • memory/1928-156-0x0000000005320000-0x0000000005328000-memory.dmp

    Filesize

    32KB

  • memory/1928-157-0x0000000005190000-0x0000000005198000-memory.dmp

    Filesize

    32KB

  • memory/1928-158-0x0000000004E30000-0x0000000004E38000-memory.dmp

    Filesize

    32KB

  • memory/1928-159-0x0000000005190000-0x0000000005198000-memory.dmp

    Filesize

    32KB

  • memory/1928-160-0x00000000052C0000-0x00000000052C8000-memory.dmp

    Filesize

    32KB

  • memory/1928-161-0x0000000004E30000-0x0000000004E38000-memory.dmp

    Filesize

    32KB

  • memory/1928-162-0x00000000052C0000-0x00000000052C8000-memory.dmp

    Filesize

    32KB

  • memory/1928-163-0x0000000005190000-0x0000000005198000-memory.dmp

    Filesize

    32KB

  • memory/1928-190-0x0000000004DB0000-0x0000000004DB8000-memory.dmp

    Filesize

    32KB

  • memory/1928-191-0x0000000004DB0000-0x0000000004DB8000-memory.dmp

    Filesize

    32KB

  • memory/1928-192-0x0000000004F30000-0x0000000004F38000-memory.dmp

    Filesize

    32KB

  • memory/1928-582-0x0000000000400000-0x00000000009F1000-memory.dmp

    Filesize

    5.9MB

  • memory/1928-946-0x0000000000400000-0x00000000009F1000-memory.dmp

    Filesize

    5.9MB