Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2023 14:04
Static task
static1
Behavioral task
behavioral1
Sample
8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe
Resource
win7-20231023-en
General
-
Target
8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe
-
Size
1.7MB
-
MD5
7e2ccd4dc2823dd85c12a5f85724f2cd
-
SHA1
c0be781d4f6b537ba955395bf2240d90ef9759a1
-
SHA256
8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5
-
SHA512
92ad3e178c3eef1772c5dc92a65908f6db2aaa602080153c0e5272391a5ebfbbe4608374c5196fa674fe1b60c287f2217a8907e9a23aa2629b26fc9963093851
-
SSDEEP
24576:dYianUR2jR97bUyvK3H1S0vfs2tPwHtnKCKKITko7kGuap0D93MwjBiUNDI4rL:XaXR97bEVSsfsfHtnKCKJz7vRkXjBv
Malware Config
Extracted
ffdroider
http://45.43.62.216
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral2/memory/4392-3-0x0000000000400000-0x000000000086D000-memory.dmp family_ffdroider behavioral2/memory/4392-101-0x0000000000400000-0x000000000086D000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MyStart = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe" 8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4392 8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe"C:\Users\Admin\AppData\Local\Temp\8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5e6334c4b2f8728ccf1a3893ca69f4180
SHA1a4f46c69dd3ee60280ce7cd451be992e71006e4f
SHA25660d6b5afbc3f9d1c578ba7e0ac19be0765b3abcdd52b35e4837a9804c52a2374
SHA512c7d17776dffbe436befba3ebd368b84e3822cfc776bb154df1ea86623b84e2f2e0dcff17477cfac63e1087cd35f71e7f5407dd65b4665100abce6bdcba272e1e
-
Filesize
16KB
MD528fdfc7a744faec2403bab04364b5b42
SHA1d05b03d04857c5bd280f7b3994733663c156e248
SHA256f02e1429849189348c66b209464f364c95546f499bff2683c2320bad35fa4665
SHA512ef5c5a9146c9aa16781c81bf56e65c9def2f50fe2913c49ae60c611d2c0ded890def512813c314f3284230880d40ff77decf591d58cc9201e0c8471b56f0a8c3
-
Filesize
16KB
MD5b72ac30f152819d145e31b8c11c864a3
SHA1ccdb1c4c3ed26c90df51345ad2c8d0053c5bd62e
SHA2569617d7b943de38a5f87f678c9668750a113dd53d08e7183a6009e52684f382b5
SHA5125b928a7102a15dc9adc4b861c7774d676b58b0f8988200273d1b3e08719170ac8b5cb3753fd66188265dae1ac39dd4887d94738bd8cd3b546603b027f1e2d7e3
-
Filesize
16KB
MD5349681ad66684bdf89db945bb6b72cd4
SHA1538ce6f259c770e1ea030d1187a8b3375d1c52b4
SHA25664b1271ce6587af2108f0e04d37b1da5cb39fce476632c09389d024ec103ff6b
SHA51235a048811e70a66aa3fb1da6865b47fc6b2c54834f687e23ef31a4e2cb2ac8987db6e1963122b626a4e7875a168301398f3b36a8686bbc0853733988fb59479a
-
Filesize
16KB
MD5151e088ea1b2f1af6ff4e171e01107dc
SHA10beea9ca7cff10c5b0fe236ce1d36187f23c392c
SHA2560c2ed965b7e68c88ecf1960b97990beb043b30633a49ead0409d2986e1585b6f
SHA512fb3fd6d6fa101dd6c689d9f8021d0eab3f5a34a1abad5f06a071a3361cec0d81376b224b2ef018b33e22f4ede7471ba42c64d346018b05dcb8fbafb8f40d27a8