Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
26-11-2023 14:04
Static task
static1
Behavioral task
behavioral1
Sample
8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe
Resource
win7-20231023-en
General
-
Target
8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe
-
Size
1.7MB
-
MD5
7e2ccd4dc2823dd85c12a5f85724f2cd
-
SHA1
c0be781d4f6b537ba955395bf2240d90ef9759a1
-
SHA256
8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5
-
SHA512
92ad3e178c3eef1772c5dc92a65908f6db2aaa602080153c0e5272391a5ebfbbe4608374c5196fa674fe1b60c287f2217a8907e9a23aa2629b26fc9963093851
-
SSDEEP
24576:dYianUR2jR97bUyvK3H1S0vfs2tPwHtnKCKKITko7kGuap0D93MwjBiUNDI4rL:XaXR97bEVSsfsfHtnKCKJz7vRkXjBv
Malware Config
Extracted
ffdroider
http://45.43.62.216
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral1/memory/304-3-0x0000000000400000-0x000000000086D000-memory.dmp family_ffdroider behavioral1/memory/304-23-0x0000000000400000-0x000000000086D000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\MyStart = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe" 8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 304 8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe