Analysis
-
max time kernel
22s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 10:09
Behavioral task
behavioral1
Sample
d7eb620404874d7f77870f1b1ecaeee3.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
d7eb620404874d7f77870f1b1ecaeee3.exe
-
Size
758KB
-
MD5
d7eb620404874d7f77870f1b1ecaeee3
-
SHA1
e281d765ee3facac0140732427c291f1a31d90b4
-
SHA256
1dce5d2a9682c811f7c4dd7e4f4c8f26ba35bba8803efe316aabddafb41c1708
-
SHA512
5042740a5f8d650cdce19b07eb45896dac5b76c853a60158b4c09ddbf83f3463ba6789dc93357aad18343add3a84e1e518c9511e0bc1af16ff16966007ad4bb8
-
SSDEEP
12288:AfZMnJxs7QUxOwR8s3AYxHHu90MnJ33Px1MKU2GLcOPSv8AQv8JyWOOFPDGMi4:AfZMg7QXw2sQYtuHJHpORncOKv8TTWNM
Malware Config
Extracted
Family
ffdroider
C2
http://128.1.32.84
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral2/memory/3504-1-0x0000000000400000-0x000000000063B000-memory.dmp family_ffdroider behavioral2/memory/3504-503-0x0000000000400000-0x000000000063B000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3504-0-0x0000000000400000-0x000000000063B000-memory.dmp vmprotect behavioral2/memory/3504-1-0x0000000000400000-0x000000000063B000-memory.dmp vmprotect behavioral2/memory/3504-503-0x0000000000400000-0x000000000063B000-memory.dmp vmprotect -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d7eb620404874d7f77870f1b1ecaeee3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 3504 d7eb620404874d7f77870f1b1ecaeee3.exe Token: SeManageVolumePrivilege 3504 d7eb620404874d7f77870f1b1ecaeee3.exe