Analysis

  • max time kernel
    155s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 23:14

General

  • Target

    42909ef96fc66ee4ad2b1182f06ecbe6.exe

  • Size

    3.8MB

  • MD5

    42909ef96fc66ee4ad2b1182f06ecbe6

  • SHA1

    9ccde9b068c6dca4172df09853e8b9aa9dcded94

  • SHA256

    4cafb22334d394a75bf299e8b582791b939af7d462c79b4423948a34f364481b

  • SHA512

    e54ef137f1a12fa1c77090ade5e6fd5c404f84a5c3d0b9227fe95eb72d30e6d03fd0431c265569f7b08dc5f416973081264aa3d634399f30ad273da8f4559f9a

  • SSDEEP

    98304:Ub9fEIQBU9HIJ0tyFximjgX7dJw1mLPKZ4ygx2EjufaWte:UpfEIvdIJ0WxHjm5JwSiZ3rEAaH

Malware Config

Extracted

Family

ffdroider

C2

http://128.1.32.84

Extracted

Family

smokeloader

Botnet

pub2

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider payload 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars payload 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42909ef96fc66ee4ad2b1182f06ecbe6.exe
    "C:\Users\Admin\AppData\Local\Temp\42909ef96fc66ee4ad2b1182f06ecbe6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\Fille.exe
      "C:\Users\Admin\AppData\Local\Temp\Fille.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < Crescente.ini
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4776
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^lmesxrORijUjeOjnoLtleIpFEzCCKScCJihKoesqpDBLYVUYVpGiCQFBdvNwBjigQsDUABfuxtqninHJmDGAjhqSBLxMfdnXvjUGsqbxTANbPixRPrCXGGeDdLaPiD$" Piramide.ini
            5⤵
              PID:4848
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Mantenere.exe.com
              Mantenere.exe.com k
              5⤵
              • Executes dropped EXE
              PID:1384
      • C:\Users\Admin\AppData\Local\Temp\Folder.exe
        "C:\Users\Admin\AppData\Local\Temp\Folder.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4548
        • C:\Users\Admin\AppData\Local\Temp\Folder.exe
          "C:\Users\Admin\AppData\Local\Temp\Folder.exe" -a
          3⤵
          • Executes dropped EXE
          PID:1612
      • C:\Users\Admin\AppData\Local\Temp\BearVpn_3.exe
        "C:\Users\Admin\AppData\Local\Temp\BearVpn_3.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3672
      • C:\Users\Admin\AppData\Local\Temp\Files.exe
        "C:\Users\Admin\AppData\Local\Temp\Files.exe"
        2⤵
        • Executes dropped EXE
        PID:400
      • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe
        "C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1732
      • C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe
        "C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"
        2⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:1688
      • C:\Users\Admin\AppData\Local\Temp\Install.exe
        "C:\Users\Admin\AppData\Local\Temp\Install.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4696
      • C:\Users\Admin\AppData\Local\Temp\pub2.exe
        "C:\Users\Admin\AppData\Local\Temp\pub2.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:512
      • C:\Users\Admin\AppData\Local\Temp\xtect20.exe
        "C:\Users\Admin\AppData\Local\Temp\xtect20.exe"
        2⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4632
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1rPS67
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3968
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe526346f8,0x7ffe52634708,0x7ffe52634718
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3624
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 3624 -s 1112
            4⤵
              PID:4472
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:4692

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

          Filesize

          152B

          MD5

          fa070c9c9ab8d902ee4f3342d217275f

          SHA1

          ac69818312a7eba53586295c5b04eefeb5c73903

          SHA256

          245b396ed1accfae337f770d3757c932bc30a8fc8dd133b5cefe82242760c2c7

          SHA512

          df92ca6d405d603ef5f07dbf9516d9e11e1fdc13610bb59e6d4712e55dd661f756c8515fc2c359c1db6b8b126e7f5a15886e643d93c012ef34a11041e02cc0dc

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Avevo.ini

          Filesize

          991KB

          MD5

          7d49c70c023bab6e70b201d07d97d1cb

          SHA1

          040cf9c91d27585202b0aeae37da8816a1dd2f73

          SHA256

          aa11a7d285c5d867a166c11e56800b8268019e81e7382a018844d0599198a56d

          SHA512

          7f4273565fedb52ef52051b57e102ee77fe79c2a505a7e8ef81c410702c451e602fff81cc80172b08de3ccc9143d9d4711827c505b3754d4c208e5d139d5d8f1

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Crescente.ini

          Filesize

          463B

          MD5

          9d3a12e8863b385b573eded66476feb9

          SHA1

          59114f6b53aa925e56d84a459fd17cf58fb04d55

          SHA256

          298eb3d340179a5da1a08b564ecd91a5995a203dc32c49dc8338bfff2e76594a

          SHA512

          a2a2aaa71e06372233ef51c24353bd728d79117aa69ba9edc1418a0c7a7b06025232f1a1872210b118b502877633ae0ce69a3fc14d649ac94a3924736af39d4b

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Mantenere.exe.com

          Filesize

          872KB

          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Piramide.ini

          Filesize

          872KB

          MD5

          77698c25ead4efde6976ccc1c7e786ae

          SHA1

          325e9adf2177b887d902e39eea0d7828b82f57f1

          SHA256

          6a1db995f4229d211e85c4e3640d69356a30454d97b0f68f0261eda164afcb37

          SHA512

          44ae9dbb6c8803b6bc0107f094dc9538a7775431fa577aa475a313219a9c0070611a7549ad4558c2343a74c0a57f282a6ebcae0107e5dc7d52ceccb0cafd783e

        • C:\Users\Admin\AppData\Local\Temp\BearVpn_3.exe

          Filesize

          8KB

          MD5

          60fda22bdeacf110bd17e573d4755179

          SHA1

          9ec652c1adfdd612ff94d5405b37d6ce2cdeee58

          SHA256

          75c08d47e30fb238396887e7dfe14468e8f55563fd157ff27620e91e37a9a9a0

          SHA512

          29b5a77bbf9ab7dfd6914fdb7ca516c329aa6dcd23958276f2373566ce94b294add0ecd241f83ff77456a558b2089d7d2cee0867b1b5de7630f62b3b73848afb

        • C:\Users\Admin\AppData\Local\Temp\CC4F.tmp

          Filesize

          1.6MB

          MD5

          4f3387277ccbd6d1f21ac5c07fe4ca68

          SHA1

          e16506f662dc92023bf82def1d621497c8ab5890

          SHA256

          767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

          SHA512

          9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

        • C:\Users\Admin\AppData\Local\Temp\Files.exe

          Filesize

          239KB

          MD5

          9d8cf8de9b97800927728c11c3ea1a05

          SHA1

          0f22a1883ee171c6dd3ca2a7989e3585852fb3e7

          SHA256

          684be08639023e02b2940bea89373e8657bf7b4fb826d22455058ae40f3b57f3

          SHA512

          021834c482a20e7d998ffd8af980f0b73a16c13967966d9ec211d269ec2df990d8f5313b9567e5daaa590dfa91abe2ec57a7a9693197e110b75f035b6f404887

        • C:\Users\Admin\AppData\Local\Temp\Fille.exe

          Filesize

          1.1MB

          MD5

          e35987fd2d4cd3ff879d467319e43709

          SHA1

          f55a7b78b464043abfb153e7f6d2d0688b78b261

          SHA256

          4ca6fef9e1702bbe7f84460fb9bb7cbd2085553b7fa489936e145291846175c8

          SHA512

          fee1fd18f42956b48f033cbcc8183c5893b9ec1a458165d585ef32e3c258f13739f74ddd3e6cf58ac200cbc1fca3fded71bf97692b9179396b2aab51a14f7b63

        • C:\Users\Admin\AppData\Local\Temp\Folder.exe

          Filesize

          712KB

          MD5

          b89068659ca07ab9b39f1c580a6f9d39

          SHA1

          7e3e246fcf920d1ada06900889d099784fe06aa5

          SHA256

          9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

          SHA512

          940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

        • C:\Users\Admin\AppData\Local\Temp\Install.exe

          Filesize

          1.4MB

          MD5

          9babfe6a0d95863173d74b747f4e1208

          SHA1

          aa0d975adaa73d8bed5b95fe51131c23773b3fb9

          SHA256

          94734f3e7f584785eee7894e221172840da71d892383e36cf2756d75f53f48aa

          SHA512

          59b5907f241e20cfa2048714cd57fbf8a70575fc59a8b2955619c18a7af415a51b80ce5373caa34eed6de02d4785bb02ba0ae3eb980ea482d612b696095e4e58

        • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe

          Filesize

          166KB

          MD5

          63ead911676a9c9431f185fa3b415dc7

          SHA1

          bf86775b8713f8461fd7cc81104e7abedabd2885

          SHA256

          9e90ed11bd37b8004921c0b5c1668d2a3780b223055d6f4a31ce2ede411a3dfd

          SHA512

          e78d110b96404c63b86b7c5c91eff18221be0a846a4e11bca633ac0e7a2c5b40be2d5e1bc5645f9d3144a9c3d38a05809f3fe21a129333344cbd4de9e39d3c9c

        • C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe

          Filesize

          758KB

          MD5

          d7eb620404874d7f77870f1b1ecaeee3

          SHA1

          e281d765ee3facac0140732427c291f1a31d90b4

          SHA256

          1dce5d2a9682c811f7c4dd7e4f4c8f26ba35bba8803efe316aabddafb41c1708

          SHA512

          5042740a5f8d650cdce19b07eb45896dac5b76c853a60158b4c09ddbf83f3463ba6789dc93357aad18343add3a84e1e518c9511e0bc1af16ff16966007ad4bb8

        • C:\Users\Admin\AppData\Local\Temp\pub2.exe

          Filesize

          330KB

          MD5

          efc4a99e2e08a0ee43f05a0035014dd0

          SHA1

          02425eb096c5662a17281074e7369b19bac9602c

          SHA256

          5606d6363b9d8dec0cf41209c6327223e2bb7ce9ab54d8dfa7f61c105ffe68cf

          SHA512

          740aa4a0dd4668275e8c88efcb251f10a6a15ce0bcb364dc08ed293ecbdd79a89e6eb07259d51f83357a2dc7c47bc95014686805cd5b695d7872793a4abf7f9b

        • C:\Users\Admin\AppData\Local\Temp\xtect20.exe

          Filesize

          804KB

          MD5

          92acb4017f38a7ee6c5d2f6ef0d32af2

          SHA1

          1b932faf564f18ccc63e5dabff5c705ac30a61b8

          SHA256

          2459694049abfe227ddcf5b4d813fe3ae8e1e9066de5228acf20c958d425c2e1

          SHA512

          d385b2857d934628e1df3ef493b3a33e2a042c5974d9c153c126a86a28fc61bcc02db0a0791c225378994737a16cd35b74f217600d4b837cda779200c9faeb73

        • memory/512-153-0x0000000000600000-0x0000000000700000-memory.dmp

          Filesize

          1024KB

        • memory/512-154-0x00000000004F0000-0x00000000004F9000-memory.dmp

          Filesize

          36KB

        • memory/512-155-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/512-160-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1688-106-0x0000000000400000-0x000000000063B000-memory.dmp

          Filesize

          2.2MB

        • memory/1688-100-0x0000000000400000-0x000000000063B000-memory.dmp

          Filesize

          2.2MB

        • memory/1732-132-0x0000000001FD0000-0x0000000001FE0000-memory.dmp

          Filesize

          64KB

        • memory/1732-131-0x0000000001FC0000-0x0000000001FC6000-memory.dmp

          Filesize

          24KB

        • memory/1732-123-0x0000000001FF0000-0x0000000002016000-memory.dmp

          Filesize

          152KB

        • memory/1732-113-0x0000000001FB0000-0x0000000001FB6000-memory.dmp

          Filesize

          24KB

        • memory/1732-96-0x00007FFE566A0000-0x00007FFE57161000-memory.dmp

          Filesize

          10.8MB

        • memory/1732-95-0x0000000000010000-0x0000000000042000-memory.dmp

          Filesize

          200KB

        • memory/3672-80-0x000000001B2E0000-0x000000001B2F0000-memory.dmp

          Filesize

          64KB

        • memory/3672-76-0x00007FFE566A0000-0x00007FFE57161000-memory.dmp

          Filesize

          10.8MB

        • memory/3672-56-0x00000000007E0000-0x00000000007E8000-memory.dmp

          Filesize

          32KB

        • memory/3672-161-0x000000001B2E0000-0x000000001B2F0000-memory.dmp

          Filesize

          64KB