Analysis
-
max time kernel
144s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 15:21
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
925bd0fe97f5dfd06ba90e824edcc312
-
SHA1
ff4cbb0d01cade27d26a67f4cfe7c46a9e554b87
-
SHA256
a4c1df15712b32ba96bfd375ee306f67fa29751007774d06b08cd092e7feeb9a
-
SHA512
75a6f215c398cd3be4562397baa64e8bb631c52c9d3608aad051390f4cfdef43795ff102a9b7718a4b1450137521dc59699145c8b87e92e85fa748aea41fbc5b
-
SSDEEP
24576:KvkGHxBMzQo3rsiKYO42mx/RHsG9/DKELiGNNx/D1aR3ugA+IChSAD/v1Xu6rnI4:KvlRGEohleo/RMUrBWwx/5U3uPKSqA
Score
10/10
Malware Config
Extracted
Family
ffdroider
C2
http://103.106.202.174
Signatures
-
FFDroider payload 4 IoCs
resource yara_rule behavioral1/memory/1980-56-0x0000000001270000-0x00000000016EA000-memory.dmp family_ffdroider behavioral1/memory/1980-57-0x0000000001270000-0x00000000016EA000-memory.dmp family_ffdroider behavioral1/memory/1980-58-0x0000000001270000-0x00000000016EA000-memory.dmp family_ffdroider behavioral1/memory/1980-71-0x0000000001270000-0x00000000016EA000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MyStart = "C:\\Users\\Admin\\AppData\\Local\\Temp\\file.exe" file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1980 file.exe