Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 09:36
Behavioral task
behavioral1
Sample
9b55bffb97ebd2c51834c415982957b4.exe
Resource
win7-20231215-en
General
-
Target
9b55bffb97ebd2c51834c415982957b4.exe
-
Size
1.2MB
-
MD5
9b55bffb97ebd2c51834c415982957b4
-
SHA1
728262abdfc4f0e8a84eb3b5cd2be9ea9d0acc16
-
SHA256
a62cee3d2610ed0f693179838803e5c60dcd4f68028c60f5761b90c750125e11
-
SHA512
4fa9d641aba15fd07a0711530ab1f1a4e8dbafe03e1ab71845bcdcd0a1efa9e59a05915834c5c717beada659dd5ee459aa7e08b4b0acc8f867ace07430eb11f2
-
SSDEEP
24576:0G9h7lhNYhemeqcCLtbvL8iNJqzM3cITaF3+pJiP8LXloL5113GrfhM59ta:0G93SemeqcCZvL8i/qQ3ccJiPiXOL51C
Malware Config
Extracted
ffdroider
http://186.2.171.3
Signatures
-
FFDroider payload 3 IoCs
resource yara_rule behavioral1/memory/840-1-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider behavioral1/memory/840-20-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider behavioral1/memory/840-38-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/840-1-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral1/memory/840-0-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral1/memory/840-20-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral1/memory/840-38-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 840 9b55bffb97ebd2c51834c415982957b4.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d