Analysis

  • max time kernel
    23s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 22:54

General

  • Target

    943d47d83fd5241dd08f4dacf05436dd.exe

  • Size

    950KB

  • MD5

    943d47d83fd5241dd08f4dacf05436dd

  • SHA1

    1babac86e0a9f8852849a9bf3f281b85fdd86f84

  • SHA256

    1108d913b6d546b87ce79dc76886a70311e11dd96f9ebf0e71b4e14022e67f0f

  • SHA512

    3e49f4914dbba02bc75818d701202e262917dd29db2ff19c657361a1183ac25d45f864aca4598481e83183a709a124cae72a16d7adab8b24ceb3584ac72f03ac

  • SSDEEP

    12288:Pivo6XvOrZfr+oeVcmx+l55/E6kFEREcyaf9bKRJVZVlDB1rjOeMozBtV/fRo:atXYb4jrKMObMrhLdMozBtRfO

Malware Config

Extracted

Family

ffdroider

C2

http://128.1.32.84

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\943d47d83fd5241dd08f4dacf05436dd.exe
    "C:\Users\Admin\AppData\Local\Temp\943d47d83fd5241dd08f4dacf05436dd.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    PID:4744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4744-0-0x0000000000400000-0x0000000000684000-memory.dmp

    Filesize

    2.5MB

  • memory/4744-1-0x0000000000400000-0x0000000000684000-memory.dmp

    Filesize

    2.5MB

  • memory/4744-11-0x0000000003860000-0x0000000003870000-memory.dmp

    Filesize

    64KB

  • memory/4744-5-0x0000000003700000-0x0000000003710000-memory.dmp

    Filesize

    64KB

  • memory/4744-19-0x0000000004360000-0x0000000004368000-memory.dmp

    Filesize

    32KB

  • memory/4744-25-0x00000000046B0000-0x00000000046B8000-memory.dmp

    Filesize

    32KB

  • memory/4744-24-0x00000000043F0000-0x00000000043F8000-memory.dmp

    Filesize

    32KB

  • memory/4744-27-0x0000000004950000-0x0000000004958000-memory.dmp

    Filesize

    32KB

  • memory/4744-26-0x0000000004A50000-0x0000000004A58000-memory.dmp

    Filesize

    32KB

  • memory/4744-49-0x00000000047C0000-0x00000000047C8000-memory.dmp

    Filesize

    32KB

  • memory/4744-41-0x0000000004360000-0x0000000004368000-memory.dmp

    Filesize

    32KB

  • memory/4744-28-0x00000000047C0000-0x00000000047C8000-memory.dmp

    Filesize

    32KB

  • memory/4744-21-0x0000000004420000-0x0000000004428000-memory.dmp

    Filesize

    32KB

  • memory/4744-74-0x00000000047C0000-0x00000000047C8000-memory.dmp

    Filesize

    32KB

  • memory/4744-72-0x00000000048F0000-0x00000000048F8000-memory.dmp

    Filesize

    32KB

  • memory/4744-64-0x0000000004360000-0x0000000004368000-memory.dmp

    Filesize

    32KB

  • memory/4744-122-0x00000000042E0000-0x00000000042E8000-memory.dmp

    Filesize

    32KB

  • memory/4744-126-0x0000000004460000-0x0000000004468000-memory.dmp

    Filesize

    32KB

  • memory/4744-125-0x00000000042E0000-0x00000000042E8000-memory.dmp

    Filesize

    32KB

  • memory/4744-128-0x0000000004520000-0x0000000004528000-memory.dmp

    Filesize

    32KB

  • memory/4744-150-0x0000000004480000-0x0000000004488000-memory.dmp

    Filesize

    32KB

  • memory/4744-165-0x0000000004240000-0x0000000004248000-memory.dmp

    Filesize

    32KB

  • memory/4744-152-0x00000000044B0000-0x00000000044B8000-memory.dmp

    Filesize

    32KB

  • memory/4744-142-0x0000000004240000-0x0000000004248000-memory.dmp

    Filesize

    32KB

  • memory/4744-129-0x0000000004480000-0x0000000004488000-memory.dmp

    Filesize

    32KB

  • memory/4744-127-0x0000000004510000-0x0000000004518000-memory.dmp

    Filesize

    32KB

  • memory/4744-114-0x0000000004240000-0x0000000004248000-memory.dmp

    Filesize

    32KB

  • memory/4744-113-0x0000000004220000-0x0000000004228000-memory.dmp

    Filesize

    32KB

  • memory/4744-51-0x00000000048F0000-0x00000000048F8000-memory.dmp

    Filesize

    32KB

  • memory/4744-18-0x0000000004340000-0x0000000004348000-memory.dmp

    Filesize

    32KB

  • memory/4744-455-0x0000000000400000-0x0000000000684000-memory.dmp

    Filesize

    2.5MB

  • memory/4744-504-0x0000000000400000-0x0000000000684000-memory.dmp

    Filesize

    2.5MB