Analysis

  • max time kernel
    121s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 10:53

General

  • Target

    FF Logs Uploader.exe

  • Size

    104.7MB

  • MD5

    cf525fe3000d4315a3f2e612b30950b6

  • SHA1

    ed337ff5d78282595c077ded9241236408cbfe43

  • SHA256

    7678c37efb6461b9b33a31593451d0d4ee3b36702c0777ce382e8891aa4b85b1

  • SHA512

    161cb70a9159721f27ffde7049f327ff8337393a68564d49863c4d7b7bf5dee42022a1b39bf3847a29a2c72641b42cc131ae90233ef73a34293277f09de0dc8a

  • SSDEEP

    1572864:UgMS3hWvz1iVquRGZkp2BcshFEe+xQxQ49UD3XMzS/g1Y7cZVLhHzLuu2eSia4Z9:UgM5HOxQxf9UD/o1QhN+wh1n6

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe
    "C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe
      "C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe" --type=gpu-process --field-trial-handle=1604,11986759782746957080,9653866041346916037,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1620 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1240
    • C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe
      "C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1604,11986759782746957080,9653866041346916037,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2212 /prefetch:8
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:640
    • C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe
      "C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe" --type=renderer --disable-background-timer-throttling --field-trial-handle=1604,11986759782746957080,9653866041346916037,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --node-integration --webview-tag --no-sandbox --no-zygote --enable-remote-module --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2472 /prefetch:1
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4004
    • C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe
      "C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe" --type=renderer --disable-background-timer-throttling --field-trial-handle=1604,11986759782746957080,9653866041346916037,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --preload="C:\Users\Admin\AppData\Local\Temp\resources\app.asar\parser-ipc.js" --enable-remote-module --background-color=#fff --guest-instance-id=2 --enable-blink-features --disable-blink-features --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2880 /prefetch:1
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1768
    • C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe
      "C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe" --type=renderer --disable-background-timer-throttling --field-trial-handle=1604,11986759782746957080,9653866041346916037,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --preload="C:\Users\Admin\AppData\Local\Temp\resources\app.asar\parser-ipc.js" --enable-remote-module --background-color=#fff --guest-instance-id=2 --enable-blink-features --disable-blink-features --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2956 /prefetch:1
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1964
    • C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe
      "C:\Users\Admin\AppData\Local\Temp\FF Logs Uploader.exe" --type=gpu-process --field-trial-handle=1604,11986759782746957080,9653866041346916037,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=2204 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2300
  • C:\Windows\System32\CompPkgSrv.exe
    C:\Windows\System32\CompPkgSrv.exe -Embedding
    1⤵
      PID:860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\fflogs\50493f0f-d00a-440f-aa81-870f82e44086.tmp

      Filesize

      57B

      MD5

      58127c59cb9e1da127904c341d15372b

      SHA1

      62445484661d8036ce9788baeaba31d204e9a5fc

      SHA256

      be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

      SHA512

      8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

    • C:\Users\Admin\AppData\Roaming\fflogs\Code Cache\js\index-dir\the-real-index

      Filesize

      48B

      MD5

      116baf453e8c7cb7bff4149713df4f4d

      SHA1

      dfc22265bd23719b882ff8bc2af6220157c4a289

      SHA256

      8061eaa96e3361093466d4d1c7e7fcc9c4e414f16625256a0c709e57979a7fe8

      SHA512

      745b53a8de1837a13141e1ea031bc5d61b8a48d316ba7ec9c17d1d5031bb12d66243826b202b6e64c166616ed47ed1788a6f0a59e6ad5c464ccced6b1464b114

    • C:\Users\Admin\AppData\Roaming\fflogs\Code Cache\js\index-dir\the-real-index

      Filesize

      480B

      MD5

      a879fd3103657a2f283d9d7c078138a2

      SHA1

      9636cb642dcc3e4f5e123d99f07faa4b40286c03

      SHA256

      79f56b99e05b13da9079915cdafa2ae5550d96871286034a02c8f94a5a3c93a2

      SHA512

      c502f765970ca5735e5db1fedb85c0eef690c9cad721b33d675f3182b2253548c203eb613a1cbd41809f5c54b0d4537de3524ac9c2f07e852e73cdb1987e3b8f

    • C:\Users\Admin\AppData\Roaming\fflogs\Network Persistent State

      Filesize

      575B

      MD5

      de48b7584fbc7f1d86993cd8edb5e754

      SHA1

      9b47a38d8ee05f020f62a15e2ca9246ed4ec0d0e

      SHA256

      e14650c3743e3a45c3c960bd27fdc8ab838adf19a85cc752173a9987188dbc42

      SHA512

      befacf9a4b09f3b11c9dde4f04f7ec361bf96b4514e7b69d5e47c62ccc85fc930e0e807fe7caec17d97b0c07abdbb3a63fec906fd9a0221bd4f1d3242a0eeeff

    • C:\Users\Admin\AppData\Roaming\fflogs\Network Persistent State~RFe589304.TMP

      Filesize

      59B

      MD5

      2800881c775077e1c4b6e06bf4676de4

      SHA1

      2873631068c8b3b9495638c865915be822442c8b

      SHA256

      226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

      SHA512

      e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

    • C:\Users\Admin\AppData\Roaming\fflogs\settings.json

      Filesize

      2B

      MD5

      99914b932bd37a50b983c5e7c90ae93b

      SHA1

      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

      SHA256

      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

      SHA512

      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd