Analysis
-
max time kernel
102s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2025, 06:20
General
-
Target
c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe
-
Size
1.6MB
-
MD5
58b9e8f3a550dbffe1a25baa5baf27b3
-
SHA1
36b90f851318a90c2ad881a1c2529ff4dfcb99a1
-
SHA256
c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2
-
SHA512
b500981c548c766b5507d4ca8fdca9e88dfc01389e289e2860ff29dc30458184ac00f19dab2c781e744218cd315cb7101e5be214f42fe325ddf3989ddca608b6
-
SSDEEP
24576:oEl3CiZjrmmDzA+uWtcqa4J1Fy529Esn9bsO4nTb3sAnhr2vA:3D2mQWcqnbsjf3Hhr2vA
Malware Config
Signatures
-
Ffdroider family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe -
resource yara_rule behavioral1/memory/324-0-0x0000000000400000-0x00000000005A7000-memory.dmp upx behavioral1/memory/324-2-0x0000000000400000-0x00000000005A7000-memory.dmp upx behavioral1/memory/324-300-0x0000000000400000-0x00000000005A7000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeManageVolumePrivilege 324 c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe Token: SeManageVolumePrivilege 324 c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe Token: SeManageVolumePrivilege 324 c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe"C:\Users\Admin\AppData\Local\Temp\c8fe613b782feb822e9088b29139deb2002f20169667f85144321c35aaac46f2.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:324
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.0MB
MD59cf2785886ee8c7bacca5eaa6958ebc0
SHA127726e999cfa7cd018838cca9f6b98b316330e7e
SHA256bb5437bfffad25250c7df9360f610e4ddec4de02b4b7a28dd8ef28b3c17899a8
SHA51203cf9eb2060e7141ef7eff32e642555a5570e26ef86bd176ac82c3b5d8189ab38af5f7ff333f725d7ddf1d0720042d67687652dcd1cc48dec0346e47dc32cb29
-
Filesize
16KB
MD56ac4ff3062838e59fccabfc53414b922
SHA189fe9c7a1ee8cb3765ed1b7234d867b68d09fc6f
SHA2567733ae31a565d7d4907fc6f854e96db6346120ed2a6d16c983d9c6c76c26765f
SHA512f80f4e6b57723d9027aac2848a79932ac9b30a13247d6898eab0f5aefe6667329a0bd3b109c020d01057a13c2edc28cf6b3b520fc1f4683b63d5d4fc92802420
-
Filesize
16KB
MD58ac4f60d8b9bd73ac30ac1ff0f2055c6
SHA1e9baa824a6b64fb88bb4c9ce105077da690c5062
SHA256532660e3091a77f6d0b822fd36dae03740d70f4c84375dabbae2cc4160fa85b3
SHA512b7e41bf80b7327ecd76fd76bcfb5eecd6cc6888183949bdd21763384619d00a21ccc5ccebb8cf3ee32fa86c627e91706a7090a50125e6481b8bbe29bdf75781a
-
Filesize
16KB
MD55ebcba5943fbc745b383b1d7a3556007
SHA1daf2444262c320afe95cd77d963570405e6b6955
SHA256a769bc18ec1b814c10d172240e4197773e80bde205340c983bd91067c29a6598
SHA5120060b2f69d7157513d4240ba384ab4813e3f14e40408c717939ae80606dbe6d5b80142e04d653a5d778724489e2c65c57cdeb64ff3e2ec445c68eab7cb57403f
-
Filesize
16KB
MD503588aad3ba612f3c28b29ef51dd5c42
SHA11d01b08fc02c296035b9640ba9f793a1627defa6
SHA256bdad6727cfce2aafca1a3b2303a77691a9f8ef39fd4d691319ed9c3a68fbb727
SHA5122cec311953698d4d06bfdb25bfc71e87b7e6d90339466f30f5193c9c30343b5f50ae322520d0b0884a9e7f1ecbf0785aea2a79ae2661d587d573746db2e0b511
-
Filesize
16KB
MD5a4e48fc3ec8ae0054313868bcf0427d9
SHA1d249ef943fc12adf2e6d308faad398f1119aea20
SHA25611eed81fcc3ca7166ec5742e52ff4557c36a6452ca552e15d68b86ab4c74b9b6
SHA512242e1d6d2481cfeeeb011821ec3e4416f66c4d80b978cf5bcc681582ab8c1a8370428f93acce609fec76018419289d4279d3406d5dc064e28000c9c4995416ef
-
Filesize
16KB
MD5e0b7e064d2453d5af4b7c5fec9f8112d
SHA1b68af6cb8b4482ae708739312723415643e4ee1e
SHA2567731a37860df1a31f2ea837e0b0ddc872c93006f2712a04ccd2ae7f0ce3842a1
SHA5126d70b93f2d9bdec8938df262d35c55e67ebacf2f859cc308b01e1fa44845ecc5c350687a9c3c3b230821db8dea68b2ac92c22b378d788f01bbed6f0c9b4695f0
-
Filesize
16KB
MD5192d566987635eb9f2e4466e71e9da8c
SHA1a41953f9a1264bee4a9def0a9a8dae3d5559a86c
SHA256259294db145d6a1de79801f3ed676d80ee70db7d3e501c647073fda3025e0abb
SHA512572913e8c9e9c8dbf09eea78444f2794e050e07929f5376e5b8bea0a15be083e914f60433f09d5d35a202314f38e56d92dcafa2fd27ff9be1564da19a95e9395
-
Filesize
16KB
MD5c80b0b1380e07d1689b30420a995d994
SHA1cb52d4104cee1ed568a9601f1f10b95d67762657
SHA256022fca06274209a410c8879ac795cb0eaa9625c64b2d896a34e0749d6898e967
SHA512080e69748f4a31186902492d35110de1266d6811f842159f5b9f605fe9f0244ad73057e67748616668282afbafb758d3f362d9e30531350a49a1025bb2f3fb9c
-
Filesize
16KB
MD518c652d59083af8c985b1311922221dc
SHA17470272c7bf936d45ec02b97caad9393c23574e1
SHA25658fcee4f9eec1e8d130e902f68028202901fb33036b79054e1908b2d7298f80d
SHA512e63adf2586e18c0c86563d32d207474423146bc2bf039a2b95ed39e84645be27c430d4b644e2474fc12dca206ebbfe3168be9ed6524cc4abf01a9203cbccab53
-
Filesize
16KB
MD59ebcd6cb28dd2aece279e074d42f180f
SHA16363f260d4b9193a140fbb7f0145b14d509f1783
SHA256087994b48a8f4e5777dfb4604a42e70fb69052bd00568b385d7f11eab9fe649b
SHA51204241829faeb7592aaa6555c6b219bba5983d07ac146d7b2bb43d7980689dd1ba28b8792bced430ee6de8cb140e835bdf3cf02b209ff8ecbafb7d244a5c8a470
-
Filesize
16KB
MD5c0d7cb62eb54af1d4fb64feefc5caeb4
SHA1e194cbc51d5f54d0d551a04b48858a9feff34465
SHA256bc359aea9b98a59a2bfdab1d14c99b55d7b1a9b1f31b94ce98c23d47f95c5fa9
SHA512c56350ac6851c6987e664fc377055453138a5c193196adfd4b800e54aeedd9fa4840434a9685cff9b7ff6ebeeef448a16278bc111f28754ca64dc9a54880510f
-
Filesize
16KB
MD5e31a7172b745320ded653cdee0dbd4bd
SHA134e7e1200e894b9c2cd827a90056d64bbf0ff259
SHA25655223cf4ea5ea106a845014051b711ebff83d86087ee86066a5b9fd430637a87
SHA5123602a29aadbfff66d5955a5595e63d6d1067dd110a8ac5f29e71d3c2ffcfe73023570a5dbb3c38b117abf52c450f67235b7d146ae6c8b18aaac88ea03e129b60
-
Filesize
16KB
MD52f257c87887e0d110a99286873c66341
SHA17ce3c2f9c534ce4a90dd3d9cadb0f6925a90b799
SHA2563c93582ffc883703961d30fc5b3d590dd217fea3e4bfac76e55512f1959ac60e
SHA512dc5600519ecccc62dd4f5bd7a2cf7bc247bd957ccf072d77723aaa68115a2e82b22c9254a9d7440abf4fd40ed3b9ccac31ab6af8ed2f103c2834ebe13b91bef2
-
Filesize
16KB
MD5bdae872f2ccd3ec85206428a6a5a668a
SHA17e19443cf204dce9ad7fd46df81ec14cb14d4288
SHA256aee22d0432d48ca89b0db016e525d8beea848b46b0edd9c5473970875d2ef6a6
SHA5120b98828bfb7f333720de36b54001383f6486145b94f8ec4c09a61ff826ad550d4b8cfaf96df4519be28a16f380689efa902ed1191a3e514e647c5875e4cb8456
-
Filesize
16KB
MD52c6b24719ecacca30bcc6336e8ae2d62
SHA1e2ae2dd10f26ac6893b714a0f3efb25efeac2b57
SHA256ec0295299434e2e7d226be5ff046ff22c4d986da45f82bd80bdbf80c625e95ba
SHA512a1daa903fa407bf4e0130a5581779488a5d89c48157851981ee10a86060535ff90482a6c14e0ca9f0f778bb0bb39dc153f47aaff90f4ec00301a6301aa31486e
-
Filesize
16KB
MD5edfb446a5ec1d5258e70edf7fcb2bbf7
SHA17763c3443750a3b68a02c52661209d74bba788e1
SHA256e12febb6ad9c0fac98304a4bb7d06d906e50a5e98467940a4be5b8f884c3adba
SHA512e666be3f5807d28eced9b7f5362bf73fbbcd781a1db5ad472a9ed0883f0b38220aa13d313f7d5cea8c00b3e38eb3bda2b52876105378249d7d788c580a658ca3