Malware Analysis Report

2024-12-08 02:30

Sample ID 230612-nzj3nsbh93
Target 09000799.exe
SHA256 a9e2eb82a9248f900aa399ac902d78778d5391457c95e202f0e4331bf9b22b37
Tags
r77
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a9e2eb82a9248f900aa399ac902d78778d5391457c95e202f0e4331bf9b22b37

Threat Level: Known bad

The file 09000799.exe was found to be: Known bad.

Malicious Activity Summary

r77

R77 family

r77 rootkit payload

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-06-12 11:50

Signatures

R77 family

r77

r77 rootkit payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-06-12 11:50

Reported

2023-06-12 11:52

Platform

win7-20230220-en

Max time kernel

150s

Max time network

106s

Command Line

"C:\Users\Admin\AppData\Local\Temp\09000799.exe"

Signatures

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\09000799.exe

"C:\Users\Admin\AppData\Local\Temp\09000799.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 flingtrainer.com udp
US 104.21.35.160:443 flingtrainer.com tcp
US 104.21.35.160:443 flingtrainer.com tcp

Files

memory/1604-56-0x0000000000290000-0x00000000002C2000-memory.dmp

memory/1604-59-0x000000001B120000-0x000000001B1A0000-memory.dmp

memory/1604-60-0x000000001B120000-0x000000001B1A0000-memory.dmp

memory/1604-61-0x0000000000170000-0x000000000017A000-memory.dmp

memory/1604-62-0x0000000000170000-0x000000000017A000-memory.dmp

memory/1604-63-0x000000001B120000-0x000000001B1A0000-memory.dmp

memory/1604-91-0x000000001B120000-0x000000001B1A0000-memory.dmp

memory/1604-92-0x0000000000170000-0x000000000017A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-06-12 11:50

Reported

2023-06-12 11:52

Platform

win10v2004-20230221-en

Max time kernel

150s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\09000799.exe"

Signatures

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\09000799.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\09000799.exe

"C:\Users\Admin\AppData\Local\Temp\09000799.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 flingtrainer.com udp
US 172.67.177.160:443 flingtrainer.com tcp
US 93.184.220.29:80 tcp
US 93.184.220.29:80 tcp
US 8.8.8.8:53 160.177.67.172.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 172.67.177.160:443 flingtrainer.com tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 172.67.177.160:443 flingtrainer.com tcp
US 8.8.8.8:53 35.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 52.152.110.14:443 tcp
NL 8.238.178.254:80 tcp
NL 8.238.178.254:80 tcp
NL 173.223.113.164:443 tcp
US 52.152.110.14:443 tcp
US 8.8.8.8:53 86.8.109.52.in-addr.arpa udp
NL 8.238.178.254:80 tcp
US 52.152.110.14:443 tcp
NL 104.85.1.163:80 tcp
US 204.79.197.203:80 tcp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp
US 52.152.110.14:443 tcp

Files

memory/2752-135-0x000002DE30E10000-0x000002DE30E42000-memory.dmp

memory/2752-138-0x000002DE31440000-0x000002DE31450000-memory.dmp

memory/2752-139-0x000002DE31440000-0x000002DE31450000-memory.dmp

memory/2752-141-0x000002DE31440000-0x000002DE31450000-memory.dmp

memory/2752-140-0x000002DE31440000-0x000002DE31450000-memory.dmp

memory/2752-142-0x000002DE4E260000-0x000002DE4E268000-memory.dmp

memory/2752-143-0x000002DE4E8E0000-0x000002DE4E918000-memory.dmp

memory/2752-144-0x000002DE4E8A0000-0x000002DE4E8AE000-memory.dmp

memory/2752-148-0x000002DE31440000-0x000002DE31450000-memory.dmp

memory/2752-149-0x000002DE31440000-0x000002DE31450000-memory.dmp

memory/2752-150-0x000002DE31440000-0x000002DE31450000-memory.dmp

memory/2752-151-0x000002DE31440000-0x000002DE31450000-memory.dmp

memory/2752-152-0x000002DE31440000-0x000002DE31450000-memory.dmp

memory/2752-153-0x000002DE31440000-0x000002DE31450000-memory.dmp