Analysis
-
max time kernel
148s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/05/2023, 08:47
Behavioral task
behavioral1
Sample
FurMark_v1.26_Chs.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
FurMark_v1.26_Chs.exe
Resource
win10v2004-20230221-en
General
-
Target
FurMark_v1.26_Chs.exe
-
Size
11.8MB
-
MD5
fb404cf31b92a6d99a03842d8f948e7d
-
SHA1
270f4ef6152a157a5a58bbd10431cfe5c01608e8
-
SHA256
3c1c44c6cd0965cb79bf81d588f92b41dc9da0f521e3babd5b239ee619f1f678
-
SHA512
8a67d233abab7edfd102a0ffb0d5cca2a38d7a62b5f275d2d0f4b0ed981d312a9255673a5e7a4f8a416f68a81f35c720e411e11f9323fb9c06f6478582ed67a9
-
SSDEEP
196608:9LwPu7pU71jjDcznCxF113QUEq6iFpDIiPdbxZ4VLIZ+nC9CpPgaA1tWEP7Uzx6A:NwUU71zcznm1gl8F1LPrsIjWw7UN6H4J
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000013110-101.dat acprotect behavioral1/files/0x0008000000013110-102.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1804 FurMark.exe -
Loads dropped DLL 4 IoCs
pid Process 1724 FurMark_v1.26_Chs.exe 1724 FurMark_v1.26_Chs.exe 1804 FurMark.exe 1804 FurMark.exe -
resource yara_rule behavioral1/memory/1724-54-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x0008000000013110-101.dat upx behavioral1/files/0x0008000000013110-102.dat upx behavioral1/memory/1804-104-0x0000000010000000-0x00000000102A8000-memory.dmp upx behavioral1/memory/1804-113-0x0000000010000000-0x00000000102A8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 FurMark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString FurMark.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1804 FurMark.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1804 1724 FurMark_v1.26_Chs.exe 28 PID 1724 wrote to memory of 1804 1724 FurMark_v1.26_Chs.exe 28 PID 1724 wrote to memory of 1804 1724 FurMark_v1.26_Chs.exe 28 PID 1724 wrote to memory of 1804 1724 FurMark_v1.26_Chs.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\FurMark_v1.26_Chs.exe"C:\Users\Admin\AppData\Local\Temp\FurMark_v1.26_Chs.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\FurMark\FurMark.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\FurMark\FurMark.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
PID:1804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
889KB
MD5cb1c50b16863e835371a2a8fcea3a653
SHA19b98f2aefe5a2d7f7b27d0cf3422746a54635cec
SHA256a2ed0dd0a52847645a05a2c61f64284cb5cbefa9cd8e168af5e8c6138ef7fe4b
SHA512df619f4f85cd9bd464e9216f7b6a9414898cf7f5e293a741f033b5a7259da94e0b65860b8b3ca244afdb8eee93a9cfbe56af88d742760aa00353332897fe06de
-
Filesize
2.7MB
MD5f9be437b31cf667e5a89d18a361d0ac3
SHA13754639846565bc877f9cd523d602ec322d584f5
SHA256ac6ad928e316e30ee627dbf2b7ac6905e3cda9d554612602ac658e33f73783bb
SHA512465c56ff5596475923549216eec17873ae2f1d3db029986c47cc61ebdefe8ac7d868d0cb89e031a434f29fc076e9731796d3e9a69edb23996ce0a22eb891996d
-
Filesize
2.7MB
MD5f9be437b31cf667e5a89d18a361d0ac3
SHA13754639846565bc877f9cd523d602ec322d584f5
SHA256ac6ad928e316e30ee627dbf2b7ac6905e3cda9d554612602ac658e33f73783bb
SHA512465c56ff5596475923549216eec17873ae2f1d3db029986c47cc61ebdefe8ac7d868d0cb89e031a434f29fc076e9731796d3e9a69edb23996ce0a22eb891996d
-
Filesize
1.9MB
MD5731e1551b27ffc9f4d242c27f8cad4c4
SHA141c14a1e9a2f5467b744d26939a508276e857dd4
SHA256cecd2302535847b9857e6c1e8284647430f2aea9b936f94b7f834ad07429b2a0
SHA512f5fc2055885fcfa2ad470e61f64d8f6df5fbed43bf2efe6a9da3ea08a52773860469a617121225c0269b101acad69dfb01177f4440de9a8965e535e58cc043f6
-
Filesize
49KB
MD528d3e9aa800818547c5d236b8a000a86
SHA1cafb88d7a98d0dfcbebcc81d05ebcec0c15fd4b2
SHA2565fdd290452fbfeb8c2c97ecf729036386991f1bb24105e928d660a094fad08df
SHA51229e9867a5d4bc0558d96ec7ab7653c678e15d0aec5cc4ff5b0c5cb2299bbde839d9c9f49f7732d22d9c5cb1867a1c7668d06e238668e9867856a40a5fac1a410
-
Filesize
49KB
MD5b8865eca9952d9440859248f1e2ca842
SHA15b48324821e20685d4f57ee645c721ff02101df4
SHA256f92765402ba506d78578019665d8bf8c185e3593195f41e630030e7d09c946f6
SHA51259ef5f14a6850d6a6d6505cdfdbf6a22774b38be64c82b1ce8821be3414694034af5d68d17fffe0bc6cad09a4448c0cf0eed932ff82f5dd4c1106ea72478ec08
-
Filesize
1008B
MD52421f4ff10a30fb442fb03934246722b
SHA105b53a8e7ef8ff461cbabb989339297ef726e15e
SHA256e745d1bbe09e1c6643fa693deffa66c8a36516fb4ab9cb70d3661824298713d0
SHA512a191e3266305edced0e860a100af311d3b30ee068a20e7ddc782391aeca44c6ca591a3acf3d559c593ff77d588f4c90b2fc8678ba32c0239dc6c981a8113a80e
-
Filesize
889KB
MD5cb1c50b16863e835371a2a8fcea3a653
SHA19b98f2aefe5a2d7f7b27d0cf3422746a54635cec
SHA256a2ed0dd0a52847645a05a2c61f64284cb5cbefa9cd8e168af5e8c6138ef7fe4b
SHA512df619f4f85cd9bd464e9216f7b6a9414898cf7f5e293a741f033b5a7259da94e0b65860b8b3ca244afdb8eee93a9cfbe56af88d742760aa00353332897fe06de
-
Filesize
2.7MB
MD5f9be437b31cf667e5a89d18a361d0ac3
SHA13754639846565bc877f9cd523d602ec322d584f5
SHA256ac6ad928e316e30ee627dbf2b7ac6905e3cda9d554612602ac658e33f73783bb
SHA512465c56ff5596475923549216eec17873ae2f1d3db029986c47cc61ebdefe8ac7d868d0cb89e031a434f29fc076e9731796d3e9a69edb23996ce0a22eb891996d
-
Filesize
2.7MB
MD5f9be437b31cf667e5a89d18a361d0ac3
SHA13754639846565bc877f9cd523d602ec322d584f5
SHA256ac6ad928e316e30ee627dbf2b7ac6905e3cda9d554612602ac658e33f73783bb
SHA512465c56ff5596475923549216eec17873ae2f1d3db029986c47cc61ebdefe8ac7d868d0cb89e031a434f29fc076e9731796d3e9a69edb23996ce0a22eb891996d
-
Filesize
1.9MB
MD5731e1551b27ffc9f4d242c27f8cad4c4
SHA141c14a1e9a2f5467b744d26939a508276e857dd4
SHA256cecd2302535847b9857e6c1e8284647430f2aea9b936f94b7f834ad07429b2a0
SHA512f5fc2055885fcfa2ad470e61f64d8f6df5fbed43bf2efe6a9da3ea08a52773860469a617121225c0269b101acad69dfb01177f4440de9a8965e535e58cc043f6