Analysis
-
max time kernel
128s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 17:45
Behavioral task
behavioral1
Sample
2428300eaca9fcd5d2170b811a464b4591e9391ea57e95fa217b02d3328e7419.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2428300eaca9fcd5d2170b811a464b4591e9391ea57e95fa217b02d3328e7419.exe
-
Size
474KB
-
MD5
95ce031c5273b6c1f2d813566a7ea9ea
-
SHA1
f47a1a1502de7a0b9cae47037e06f41753d94156
-
SHA256
2428300eaca9fcd5d2170b811a464b4591e9391ea57e95fa217b02d3328e7419
-
SHA512
5a2fa3a7413c672714d38b6d60e5794481c871ba402f92bc97a6e37b7fed466212060a8d7a560a900c8637ab6b39d8c619fc528d5ec8e303fd98efd89db57cdc
-
SSDEEP
12288:pvv0rmiMQTll4pWWUgyOHaW8xAyBhh4YIRRioMZtKOIiVywxGkoS:Bd2ll4XZGxAyBbrCeVIkywx
Malware Config
Extracted
Family
ffdroider
C2
http://101.36.107.74
Signatures
-
resource yara_rule behavioral2/memory/5060-132-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral2/memory/5060-133-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral2/memory/5060-203-0x0000000000400000-0x000000000055C000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2428300eaca9fcd5d2170b811a464b4591e9391ea57e95fa217b02d3328e7419.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 5060 2428300eaca9fcd5d2170b811a464b4591e9391ea57e95fa217b02d3328e7419.exe Token: SeManageVolumePrivilege 5060 2428300eaca9fcd5d2170b811a464b4591e9391ea57e95fa217b02d3328e7419.exe