Analysis

  • max time kernel
    1s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 00:25

General

  • Target

    087f267a177c35b5d313efa4b9013c14.exe

  • Size

    3.8MB

  • MD5

    087f267a177c35b5d313efa4b9013c14

  • SHA1

    052ac70eb05ae560a882a3f97e73c80be01734e6

  • SHA256

    b8338eda2c7390860da3bd4a37104b409235131406d9b4d30a78b5d4189cf317

  • SHA512

    f13a98b4b2a3cc9e146ec6b58ba844d192962ea443a93f0f0237204818c7de3d4f6538fd40be7a72a53c7efc59c91a80a89539a6b92f4a448358c823b87393a1

  • SSDEEP

    98304:Ub/fEIQBU9HIJ08yFximXbXVdJw1mLPUZ4ygx2EjufjKWtK:UbfEIvdIJ0/xHXDHJwSsZ3rEAjKx

Malware Config

Extracted

Family

ffdroider

C2

http://128.1.32.84

Extracted

Family

smokeloader

Botnet

pub2

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider payload 2 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\087f267a177c35b5d313efa4b9013c14.exe
    "C:\Users\Admin\AppData\Local\Temp\087f267a177c35b5d313efa4b9013c14.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Users\Admin\AppData\Local\Temp\Fille.exe
      "C:\Users\Admin\AppData\Local\Temp\Fille.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < Crescente.ini
        3⤵
          PID:628
      • C:\Users\Admin\AppData\Local\Temp\Folder.exe
        "C:\Users\Admin\AppData\Local\Temp\Folder.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Users\Admin\AppData\Local\Temp\Folder.exe
          "C:\Users\Admin\AppData\Local\Temp\Folder.exe" -a
          3⤵
          • Executes dropped EXE
          PID:3264
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1wNij7
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4212
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,15844300303806620280,13195519144767569481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3
          3⤵
            PID:4752
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15844300303806620280,13195519144767569481,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
            3⤵
              PID:2288
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15844300303806620280,13195519144767569481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
              3⤵
                PID:3636
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15844300303806620280,13195519144767569481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                3⤵
                  PID:1640
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,15844300303806620280,13195519144767569481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2152 /prefetch:8
                  3⤵
                    PID:2940
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffebde946f8,0x7ffebde94708,0x7ffebde94718
                    3⤵
                      PID:1748
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15844300303806620280,13195519144767569481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:8
                      3⤵
                        PID:5968
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15844300303806620280,13195519144767569481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:8
                        3⤵
                          PID:5952
                      • C:\Users\Admin\AppData\Local\Temp\Files.exe
                        "C:\Users\Admin\AppData\Local\Temp\Files.exe"
                        2⤵
                        • Executes dropped EXE
                        PID:4760
                      • C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe
                        "C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"
                        2⤵
                        • Executes dropped EXE
                        PID:4944
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 1400
                          3⤵
                          • Program crash
                          PID:5460
                      • C:\Users\Admin\AppData\Local\Temp\pub2.exe
                        "C:\Users\Admin\AppData\Local\Temp\pub2.exe"
                        2⤵
                          PID:2652
                        • C:\Users\Admin\AppData\Local\Temp\xtect20.exe
                          "C:\Users\Admin\AppData\Local\Temp\xtect20.exe"
                          2⤵
                            PID:4240
                          • C:\Users\Admin\AppData\Local\Temp\Install.exe
                            "C:\Users\Admin\AppData\Local\Temp\Install.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5040
                          • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe
                            "C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:3656
                          • C:\Users\Admin\AppData\Local\Temp\BearVpn_3.exe
                            "C:\Users\Admin\AppData\Local\Temp\BearVpn_3.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4876
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd
                          1⤵
                            PID:956
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /V /R "^lmesxrORijUjeOjnoLtleIpFEzCCKScCJihKoesqpDBLYVUYVpGiCQFBdvNwBjigQsDUABfuxtqninHJmDGAjhqSBLxMfdnXvjUGsqbxTANbPixRPrCXGGeDdLaPiD$" Piramide.ini
                              2⤵
                                PID:2860
                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Mantenere.exe.com
                                Mantenere.exe.com k
                                2⤵
                                  PID:5400
                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Mantenere.exe.com
                                    C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Mantenere.exe.com k
                                    3⤵
                                      PID:5580
                                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                                        C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                                        4⤵
                                          PID:3192
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping 127.0.0.1 -n 30
                                      2⤵
                                      • Runs ping.exe
                                      PID:5440
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4200
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:5192
                                      • C:\Windows\system32\rUNdlL32.eXe
                                        rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                        1⤵
                                        • Process spawned unexpected child process
                                        PID:5252
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                          2⤵
                                            PID:5276
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5276 -ip 5276
                                          1⤵
                                            PID:5372
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 604
                                            1⤵
                                            • Program crash
                                            PID:5448
                                          • C:\Windows\system32\dwm.exe
                                            "dwm.exe"
                                            1⤵
                                              PID:2980

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Temp\BearVpn_3.exe

                                              Filesize

                                              8KB

                                              MD5

                                              60fda22bdeacf110bd17e573d4755179

                                              SHA1

                                              9ec652c1adfdd612ff94d5405b37d6ce2cdeee58

                                              SHA256

                                              75c08d47e30fb238396887e7dfe14468e8f55563fd157ff27620e91e37a9a9a0

                                              SHA512

                                              29b5a77bbf9ab7dfd6914fdb7ca516c329aa6dcd23958276f2373566ce94b294add0ecd241f83ff77456a558b2089d7d2cee0867b1b5de7630f62b3b73848afb

                                            • C:\Users\Admin\AppData\Local\Temp\Files.exe

                                              Filesize

                                              239KB

                                              MD5

                                              9d8cf8de9b97800927728c11c3ea1a05

                                              SHA1

                                              0f22a1883ee171c6dd3ca2a7989e3585852fb3e7

                                              SHA256

                                              684be08639023e02b2940bea89373e8657bf7b4fb826d22455058ae40f3b57f3

                                              SHA512

                                              021834c482a20e7d998ffd8af980f0b73a16c13967966d9ec211d269ec2df990d8f5313b9567e5daaa590dfa91abe2ec57a7a9693197e110b75f035b6f404887

                                            • C:\Users\Admin\AppData\Local\Temp\Fille.exe

                                              Filesize

                                              109KB

                                              MD5

                                              5bf6fe82f1ebb35797c6ed0f2d436196

                                              SHA1

                                              66a4230de9fabb7fdd05f6bed96a66943e001675

                                              SHA256

                                              8aede60244b9708609f9ee2061de969a8e7e4a3bef450993d49a63cf97f7d696

                                              SHA512

                                              c35a6ce90033057ad2dfe339c903ad2feb319d2b793be04697b8d494eff3a15588093e52ed96e11c06b1cd2cfc940fd4e2c93b928f8a2db6748b137b10133d84

                                            • C:\Users\Admin\AppData\Local\Temp\Fille.exe

                                              Filesize

                                              1024KB

                                              MD5

                                              05bbcad2bf03d73b09f7a3690b0da171

                                              SHA1

                                              73867be1daf0ada50d198d2e1f4c493515d24c38

                                              SHA256

                                              b586b8d4e59ee76fc2eb6cd8c0dee0b0f4323906e88da666551f7d8eb0d5752f

                                              SHA512

                                              fe62ffcfd545af3a04df78c863aa44fcd56bc4a096183351bd23ac4d89b9d85d78e6749be6735451124258df1331a181d2e93afcad5bd874aa52926472925155

                                            • C:\Users\Admin\AppData\Local\Temp\Fille.exe

                                              Filesize

                                              93KB

                                              MD5

                                              5b466500d453b3c5e1d40eb6727b3c6f

                                              SHA1

                                              779dea12b0cf2e0a7ca370124dd4397c6ec41d31

                                              SHA256

                                              b81b1ebecfb078db3ce195a2d87c734c92145c9986f89a041539af3bfa0fec77

                                              SHA512

                                              aa4816a693e83d13483e41ae29361c1a08776fa9168bd545160099e5c731f9eaef59d751bac3e6b4a6c031ad0f139f7d13ab6616713e7dad16702c8bd7f70f4b

                                            • C:\Users\Admin\AppData\Local\Temp\Folder.exe

                                              Filesize

                                              712KB

                                              MD5

                                              b89068659ca07ab9b39f1c580a6f9d39

                                              SHA1

                                              7e3e246fcf920d1ada06900889d099784fe06aa5

                                              SHA256

                                              9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

                                              SHA512

                                              940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

                                            • C:\Users\Admin\AppData\Local\Temp\Folder.exe

                                              Filesize

                                              93KB

                                              MD5

                                              d2b3c5899a84579049b3f5bb203e37b4

                                              SHA1

                                              766c179c3e69954a8e812c41596c23954c591f61

                                              SHA256

                                              7076f2937e754bc3a86c725a23c9a970a064ebc74d05d69c5d5a16ecc03dd0f1

                                              SHA512

                                              f27dcc626d42307b8d70f7f3d869e906bf899ff048046e952544481a79dc67653e112b2fd8e4c9e270b9e0c8e7199ec537c70ce031553fd5895614f0edcf01c7

                                            • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe

                                              Filesize

                                              92KB

                                              MD5

                                              709affa23369fc387727be5ab12d631f

                                              SHA1

                                              e3f39bf8c4fcd17874babdeba6fff6eb57ac3a48

                                              SHA256

                                              9731c8cfb1d06adc0ab6a791d0e340b13f7f1cfab385b3ddf1d57f374af0968b

                                              SHA512

                                              1e7acb5dd96c9a697dcc60225213afe219a3a4345a76cdca28997491208ef6e2303e7cb8cabd14552da40b32f4ba966ddae2b6d125b15a5925f134bb814692d4

                                            • memory/2652-199-0x0000000001F60000-0x0000000001F69000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2652-200-0x0000000000400000-0x0000000000455000-memory.dmp

                                              Filesize

                                              340KB

                                            • memory/2652-194-0x00000000005C0000-0x00000000006C0000-memory.dmp

                                              Filesize

                                              1024KB

                                            • memory/3656-139-0x000000001BBF0000-0x000000001BC00000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3656-187-0x00007FFEBD170000-0x00007FFEBDC31000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/3656-137-0x0000000001720000-0x0000000001726000-memory.dmp

                                              Filesize

                                              24KB

                                            • memory/3656-134-0x0000000001740000-0x0000000001766000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/3656-120-0x00007FFEBD170000-0x00007FFEBDC31000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/3656-108-0x0000000000F30000-0x0000000000F62000-memory.dmp

                                              Filesize

                                              200KB

                                            • memory/3656-123-0x0000000001710000-0x0000000001716000-memory.dmp

                                              Filesize

                                              24KB

                                            • memory/4876-97-0x00007FFEBD170000-0x00007FFEBDC31000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4876-69-0x00000000000B0000-0x00000000000B8000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/4876-126-0x000000001ADB0000-0x000000001ADC0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4876-216-0x000000001ADB0000-0x000000001ADC0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4944-106-0x0000000000400000-0x000000000063B000-memory.dmp

                                              Filesize

                                              2.2MB

                                            • memory/4944-119-0x0000000000400000-0x000000000063B000-memory.dmp

                                              Filesize

                                              2.2MB

                                            • memory/4944-215-0x0000000000400000-0x000000000063B000-memory.dmp

                                              Filesize

                                              2.2MB

                                            • memory/5580-219-0x00000000009E0000-0x00000000009E1000-memory.dmp

                                              Filesize

                                              4KB