Overview
overview
8Static
static
1base/DAutils.dll
windows7-x64
1base/DAutils.dll
windows10-2004-x64
1base/FCUI.exe
windows7-x64
6base/FCUI.exe
windows10-2004-x64
6base/FCUI.exe.xml
windows7-x64
1base/FCUI.exe.xml
windows10-2004-x64
1base/Insta...ls.bat
windows7-x64
1base/Insta...ls.bat
windows10-2004-x64
1base/Insta...xp.bat
windows7-x64
1base/Insta...xp.bat
windows10-2004-x64
1base/Inter...Vw.dll
windows7-x64
1base/Inter...Vw.dll
windows10-2004-x64
1base/Loader.exe
windows7-x64
1base/Loader.exe
windows10-2004-x64
1base/Newto...on.dll
windows7-x64
1base/Newto...on.dll
windows10-2004-x64
1base/Regis...rt.exe
windows7-x64
3base/Regis...rt.exe
windows10-2004-x64
3base/Regis...ll.exe
windows7-x64
6base/Regis...ll.exe
windows10-2004-x64
6base/Regis...xe.xml
windows7-x64
1base/Regis...xe.xml
windows10-2004-x64
1base/RunAp...or.bat
windows7-x64
6base/RunAp...or.bat
windows10-2004-x64
6base/openThankYou.bat
windows7-x64
1base/openThankYou.bat
windows10-2004-x64
6base/runApp.bat
windows7-x64
6base/runApp.bat
windows10-2004-x64
6base/uninst.exe
windows7-x64
8base/uninst.exe
windows10-2004-x64
8base/verif...ll.bat
windows7-x64
1base/verif...ll.bat
windows10-2004-x64
1Analysis
-
max time kernel
221s -
max time network
285s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 22:04
Static task
static1
Behavioral task
behavioral1
Sample
base/DAutils.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
base/DAutils.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
base/FCUI.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
base/FCUI.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
base/FCUI.exe.xml
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
base/FCUI.exe.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
base/InstallAddiotionals.bat
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
base/InstallAddiotionals.bat
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
base/InstallNet35xp.bat
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
base/InstallNet35xp.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
base/Interop.SHDocVw.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
base/Interop.SHDocVw.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
base/Loader.exe
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
base/Loader.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
base/Newtonsoft.Json.dll
Resource
win7-20220901-en
Behavioral task
behavioral16
Sample
base/Newtonsoft.Json.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
base/RegisterInstallStart.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
base/RegisterInstallStart.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral19
Sample
base/RegisterUninstall.exe
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
base/RegisterUninstall.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
base/RegisterUninstall.exe.xml
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
base/RegisterUninstall.exe.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
base/RunAppMonitor.bat
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
base/RunAppMonitor.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
base/openThankYou.bat
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
base/openThankYou.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
base/runApp.bat
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
base/runApp.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
base/uninst.exe
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
base/uninst.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral31
Sample
base/verifyUninstall.bat
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
base/verifyUninstall.bat
Resource
win10v2004-20221111-en
General
-
Target
base/FCUI.exe
-
Size
365KB
-
MD5
376167b2e31a2af37f27cba5fd66467d
-
SHA1
e7812d3631dbe9d68e86151705a21c0f845a31b5
-
SHA256
735d089135087ee6b9bbac999eace92939dd4c33a60b5d72049df15bc01854bb
-
SHA512
fef3a6d708e13e548dce554b1aee224ff7f851970e3eae01805ec0e856c797e8ef25db853a1ce2c6098f68148c2c2c233768dc3db650b034582bed335e700fd5
-
SSDEEP
6144:8WpaPLItYxGc8G5zD2yFtqLItYxGc8G5z/2yF/d+o5JVHT0xAd3TpDS16UHXrOwN:6PLIWGw5zD2yCLIWGw5z/2yD+mXzgG3k
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
FCUI.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\FreeCoinsUpdater = "C:\\Users\\Admin\\AppData\\Local\\FCU\\OSUpdater.exe" FCUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\FreeCoinsStartup = "C:\\Users\\Admin\\AppData\\Local\\FCM\\DBStack.exe" FCUI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
FCUI.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main FCUI.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch FCUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" FCUI.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
FCUI.exedescription pid process Token: SeDebugPrivilege 1500 FCUI.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
FCUI.exepid process 1500 FCUI.exe 1500 FCUI.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
FCUI.exepid process 1500 FCUI.exe 1500 FCUI.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
FCUI.exepid process 1500 FCUI.exe 1500 FCUI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\base\FCUI.exe"C:\Users\Admin\AppData\Local\Temp\base\FCUI.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1500