Analysis

  • max time kernel
    72s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2023 05:44

General

  • Target

    fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe

  • Size

    789KB

  • MD5

    b41472d8b0e9c50205e96d39e427de9e

  • SHA1

    c16a3a63fd20c22fc8da89ab2896d76ca0e724db

  • SHA256

    fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507

  • SHA512

    8161e820896be2d6b63291cc4ef74879d2b5cdf87c3a202664eecfd851f279efbe4b624461470672589d082809f00864c029a0a78f2c053ca83c6d1c5e0d3d95

  • SSDEEP

    24576:HH5+AShmB2TZ5jD382ae227uU2JNysPdV2PNa:n59amB2TXjz82aeTuDi

Malware Config

Extracted

Family

ffdroider

C2

http://101.36.107.74

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe
    "C:\Users\Admin\AppData\Local\Temp\fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    PID:2796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2796-132-0x0000000000400000-0x0000000000644000-memory.dmp

    Filesize

    2.3MB

  • memory/2796-133-0x0000000000400000-0x0000000000644000-memory.dmp

    Filesize

    2.3MB

  • memory/2796-135-0x0000000000400000-0x0000000000644000-memory.dmp

    Filesize

    2.3MB

  • memory/2796-136-0x00000000037B0000-0x00000000037C0000-memory.dmp

    Filesize

    64KB

  • memory/2796-142-0x0000000003950000-0x0000000003960000-memory.dmp

    Filesize

    64KB

  • memory/2796-148-0x0000000004400000-0x0000000004408000-memory.dmp

    Filesize

    32KB

  • memory/2796-149-0x0000000004420000-0x0000000004428000-memory.dmp

    Filesize

    32KB

  • memory/2796-150-0x00000000044C0000-0x00000000044C8000-memory.dmp

    Filesize

    32KB

  • memory/2796-151-0x0000000004610000-0x0000000004618000-memory.dmp

    Filesize

    32KB

  • memory/2796-152-0x0000000004630000-0x0000000004638000-memory.dmp

    Filesize

    32KB

  • memory/2796-153-0x0000000004C50000-0x0000000004C58000-memory.dmp

    Filesize

    32KB

  • memory/2796-154-0x0000000004B50000-0x0000000004B58000-memory.dmp

    Filesize

    32KB

  • memory/2796-155-0x00000000049C0000-0x00000000049C8000-memory.dmp

    Filesize

    32KB

  • memory/2796-156-0x0000000004420000-0x0000000004428000-memory.dmp

    Filesize

    32KB

  • memory/2796-157-0x00000000049C0000-0x00000000049C8000-memory.dmp

    Filesize

    32KB

  • memory/2796-158-0x0000000004AF0000-0x0000000004AF8000-memory.dmp

    Filesize

    32KB

  • memory/2796-159-0x0000000004420000-0x0000000004428000-memory.dmp

    Filesize

    32KB

  • memory/2796-160-0x0000000004AF0000-0x0000000004AF8000-memory.dmp

    Filesize

    32KB

  • memory/2796-161-0x00000000049C0000-0x00000000049C8000-memory.dmp

    Filesize

    32KB

  • memory/2796-186-0x00000000042E0000-0x00000000042E8000-memory.dmp

    Filesize

    32KB

  • memory/2796-187-0x0000000004300000-0x0000000004308000-memory.dmp

    Filesize

    32KB

  • memory/2796-188-0x00000000043A0000-0x00000000043A8000-memory.dmp

    Filesize

    32KB

  • memory/2796-189-0x00000000043B0000-0x00000000043B8000-memory.dmp

    Filesize

    32KB

  • memory/2796-190-0x0000000004530000-0x0000000004538000-memory.dmp

    Filesize

    32KB

  • memory/2796-191-0x00000000045E0000-0x00000000045E8000-memory.dmp

    Filesize

    32KB

  • memory/2796-192-0x0000000004300000-0x0000000004308000-memory.dmp

    Filesize

    32KB

  • memory/2796-193-0x0000000004300000-0x0000000004308000-memory.dmp

    Filesize

    32KB

  • memory/2796-218-0x0000000004100000-0x0000000004108000-memory.dmp

    Filesize

    32KB

  • memory/2796-219-0x0000000004100000-0x0000000004108000-memory.dmp

    Filesize

    32KB

  • memory/2796-268-0x0000000004320000-0x0000000004328000-memory.dmp

    Filesize

    32KB

  • memory/2796-269-0x0000000004100000-0x0000000004108000-memory.dmp

    Filesize

    32KB

  • memory/2796-283-0x0000000000400000-0x0000000000644000-memory.dmp

    Filesize

    2.3MB