Analysis
-
max time kernel
152s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 16:46
Static task
static1
Behavioral task
behavioral1
Sample
0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe
-
Size
2.1MB
-
MD5
011eca360bcae358ca1ebf28d2cfb0cc
-
SHA1
95a9e2b240dfafc760b9c84e20c53d89632761c1
-
SHA256
0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad
-
SHA512
46d6aa457c9a328ce0206348d43244685be06da27ad58c36810417526308a8bb77f608f8c3781018dd8b43e944f65c625166f672e0d3c6a98b2c7356ca3acd80
Malware Config
Signatures
-
FFDroider Payload 1 IoCs
resource yara_rule behavioral2/memory/4280-226-0x0000000000EA0000-0x0000000001450000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeManageVolumePrivilege 4280 0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe Token: SeManageVolumePrivilege 4280 0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe Token: SeManageVolumePrivilege 4280 0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe Token: SeManageVolumePrivilege 4280 0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe Token: SeManageVolumePrivilege 4280 0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe Token: SeManageVolumePrivilege 4280 0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe