Analysis
-
max time kernel
72s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2023 05:44
Behavioral task
behavioral1
Sample
fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe
-
Size
789KB
-
MD5
b41472d8b0e9c50205e96d39e427de9e
-
SHA1
c16a3a63fd20c22fc8da89ab2896d76ca0e724db
-
SHA256
fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507
-
SHA512
8161e820896be2d6b63291cc4ef74879d2b5cdf87c3a202664eecfd851f279efbe4b624461470672589d082809f00864c029a0a78f2c053ca83c6d1c5e0d3d95
-
SSDEEP
24576:HH5+AShmB2TZ5jD382ae227uU2JNysPdV2PNa:n59amB2TXjz82aeTuDi
Malware Config
Extracted
Family
ffdroider
C2
http://101.36.107.74
Signatures
-
resource yara_rule behavioral2/memory/2796-132-0x0000000000400000-0x0000000000644000-memory.dmp vmprotect behavioral2/memory/2796-133-0x0000000000400000-0x0000000000644000-memory.dmp vmprotect behavioral2/memory/2796-135-0x0000000000400000-0x0000000000644000-memory.dmp vmprotect behavioral2/memory/2796-283-0x0000000000400000-0x0000000000644000-memory.dmp vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeManageVolumePrivilege 2796 fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe Token: SeManageVolumePrivilege 2796 fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe Token: SeManageVolumePrivilege 2796 fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe Token: SeManageVolumePrivilege 2796 fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe Token: SeManageVolumePrivilege 2796 fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507.exe