Analysis
-
max time kernel
103s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2025, 06:16
General
-
Target
c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe
-
Size
1.6MB
-
MD5
58b9e8f3a550dbffe1a25baa5baf27b3
-
SHA1
36b90f851318a90c2ad881a1c2529ff4dfcb99a1
-
SHA256
c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2
-
SHA512
b500981c548c766b5507d4ca8fdca9e88dfc01389e289e2860ff29dc30458184ac00f19dab2c781e744218cd315cb7101e5be214f42fe325ddf3989ddca608b6
-
SSDEEP
24576:oEl3CiZjrmmDzA+uWtcqa4J1Fy529Esn9bsO4nTb3sAnhr2vA:3D2mQWcqnbsjf3Hhr2vA
Malware Config
Signatures
-
Ffdroider family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe -
resource yara_rule behavioral1/memory/3304-0-0x0000000000400000-0x00000000005A7000-memory.dmp upx behavioral1/memory/3304-2-0x0000000000400000-0x00000000005A7000-memory.dmp upx behavioral1/memory/3304-300-0x0000000000400000-0x00000000005A7000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeManageVolumePrivilege 3304 c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe Token: SeManageVolumePrivilege 3304 c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe Token: SeManageVolumePrivilege 3304 c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe"C:\Users\Admin\AppData\Local\Temp\c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3304
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.0MB
MD569fb830c7103d35b43f3773dcfdf0fc7
SHA15d105265d7070b9b0a7fb32e84f5b5c5a14454a7
SHA256f615c34d03bca09b2cefe785544b5a4331c69fd0fa81952212d2175c9983639a
SHA5128f7223bd053519f1beac92ef736d3672a68767212f14517e0e89df5f95a38d7d1b183af723510d569776da0b63311246568bc9e5ce3b9912edd6cabff8b56a2f
-
Filesize
16KB
MD54024231e5e6c8e4f58e7c7f5fe47eb1a
SHA1b9cca577b24ef88bd0a5808b5f8b9475ae8adadf
SHA2563ea63c47f3170fc2e4ec79ce0f633cf5da92c3e3f62b30fd368f167e05c88b49
SHA5123a861a7f8f8a2f4078a638b07226f61cbef06f39850d74c04b780ee9de58a1cb3873ccde0d50a808790ff65c894ba5aed3189aa6eec47f8ab640f2ea8714c19b
-
Filesize
16KB
MD58642bc1e0729f708f7c1284dfc1924ae
SHA10ef0eefb364742f8f4814dab7f18e7ab62493d3e
SHA256c4aaa45e8c9bec85a1d4551b2196f3a8cb2d15c885baadfafa5e7ad79767ab0e
SHA512bbc4331e9a48b6de7823c11c874e8e6f14ae52fe9bbf50f2ad83e1eb45291e2b25cbbe082052870a0079b7d60e231e27f79b3924be27b006bc71fbed6a1c822b
-
Filesize
16KB
MD5817cac161fb379f859b4e88c0ac5fcab
SHA1adf0d133f7d5b7c9af0603383c0b1b33eb63bbd5
SHA256db87a591b677b0f7806fa21c01ee1cb3e72593a4e0c966a0b49718f07a9be100
SHA51270371735190bbd677a0f201d7ccbf807eb2b277c860d3eea7039de9ef553f98359bb6e2aaab0b247e5cae09014530affa9a1a3c988de37007370bab61aa9e736
-
Filesize
16KB
MD56653bb55451f35803e69327164c0e283
SHA13f23f86ab3bb11e929a3059e1841a6f9313b2e88
SHA256fe578ee3b95eabc2a3feb1186071cc3f32023650a2ff452a01ad12c359d73f0f
SHA5123b1d630f6d8d764cdaa147384100eb197b1107327da4516334d75de94df70d41cc59ff8a485ddf7aeec283a174ffc5987b0ceb072ff134ff1f0bb5cc5b9423d7
-
Filesize
16KB
MD52095d4a5c036483f307e358860a390f2
SHA10b15dd89c75b026e92c014f7ff44c3f51cbb0fc9
SHA25668cc42b6ec8a6e11e3261a139737ed0eb6e147a26794d2c2119022d90b0dd71a
SHA512302e84312b8f7ebe7aa4f4e274c3117a30d8c8295c4566d5e07e0dbbdee7a470d53d66850d6307fa336d3c7c5e16c963b209a83c7a2d783693d002c4cb4b1183
-
Filesize
16KB
MD58d04ea4b02514cd994692573a0186330
SHA127ec794a5fc8bfdb14c8eb4e2f29323d5ea5d3d4
SHA256fc854b0270a9bcdef98cb35f99ad49f924d1270212e79eba708b1a739133693c
SHA5129d79851dd407f968379bc729a4f2f3c7b429ae2f43eefdc1d7bd37ed545d4dfc12c6e8a3399d0646b5d6467a7ab13d759b0498f9b8e1f404d6776d90fa62d392
-
Filesize
16KB
MD5aac8c06ab2533caafc32f37313bc57ad
SHA1a5392413940de9969fe3131ff7f6416b019cf18a
SHA256387918900f8d6e43ed3f0ba3d5bcd7ae8725c8489274a9e82e1a1a31f57b1db1
SHA512250f50ad67995fe4fcb805915c20d3dd53d48dc5d0c503fd1be6f568e923df5dedabfbda6294e2ffb2a99a71b564c428a2176972f312d856ed7d41abc4098745
-
Filesize
16KB
MD5dcb312708a899d383a4af057878d8fc1
SHA1c4d4b782b40aa5cc2ac8e9d19fcae5911c4dbcce
SHA256a65cda106f9064b2aea897f2fbec2dd7ff303b438875cb7951de48011832119b
SHA512fc5db5773d58e82cdec0c098e5f7f1569a7b4702105198bea7b2e1a467e9ae3ce124b24985a61d578d194f0294beeea230184bcafc4d4376cd9993ab9061cb58
-
Filesize
16KB
MD57a66aa01fe817623aba678b7ef62bb67
SHA1db67ef76d1b388688771b3ed03003502d5e275d3
SHA25620f4a5ee5744c256b0a8c4e84ec085eb53adb1dc30be186d2dca909a6cfa99a8
SHA51241f62da7decc73e2333ddee4ef63611b86a85d6baafbe12f1094b14ce280efeafc76162bd95252196dc4d38e250e511d9d93f7e7d220f728dc13bce8c7d552b4
-
Filesize
16KB
MD5a999f626ccb23eaf5417245f0c7ff27e
SHA130f6b96f025986129c7380136e2f4c8e72ade47d
SHA256812065c2794ab06b044975fc22d65f394f1a5eb26005ddd0ca68d833de358e47
SHA51297539420255b656671488ecf4b49e6360048229b65802714f683f092eed92cf43143161827a82a06c800048a5dfb440539a5789ed3da02711e8836980749f188
-
Filesize
16KB
MD537aeb133ad946ac47c800da73e1dcb4a
SHA177785fe519fab68c6d7e429656b5c9c5446a3988
SHA256da51b154e3d1cf5d88b4f54e299e6a6f9fd4e254b0debe5261eb23d2999eccad
SHA512eb61e141687be44d34b93d6cae4a5789cfe03a4f194640c856084631a382ab8a7cda832570ec2b414c4bd771250e4909524f336e0b9eaae0031af0174e9805db
-
Filesize
16KB
MD5fb160d4bc066fc6f6d63cca206928b7b
SHA1b86a5b136b8ef31da8322a1e5a69a74612a0e531
SHA256c448f5aa423fd76a21264e1798eb7d903e515b733210ed3368892325046a8883
SHA51260afff0499be20f43227dcc8414b2c3b407d57d55ed8c49c5710648fb94c3b86e187fb07e6e4d652bfbf062a932ae776e1e52a6d47dcf43f066e2266115c1d8c
-
Filesize
16KB
MD5cc5f80b4bb3c3884bcffccfb2848604c
SHA1ca9110daa8335799ba141cdfab88692a53b2cbfe
SHA25645e92316bc9ba136d032bc4e0418cae5eb9c8a3b4c357b8383b028dafb14e915
SHA5129273de197d430cd97ad58e4121dc129f01dae3183ee30d707f1717320c2f2db8517d717b0b5716b90f17d10b9cc12275ffc43a7c155c657ebc7b0928df719a7e