Analysis

  • max time kernel
    131s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2023, 06:55

General

  • Target

    FabFilter_KeyGen.exe

  • Size

    754KB

  • MD5

    e65aadf62d68a0c553e8d03f83b1ffa3

  • SHA1

    7d02ba4357dda1360b1b3682cd544450888b6b8c

  • SHA256

    b7d055d0c041ff3815b649fd766b92e90d566fc52069f40cf7f9f08abc326cb5

  • SHA512

    5c2074e302b8730ee28f565603b876ab9f27d87975f52c60f7863a9820a2efc0af2401b802c15ec5997a4f1e8c48fab97c9e7d3e3d451d4abf97d542975e6948

  • SSDEEP

    12288:4c9t2Sllu12Cd0coupii4Ueb1EDrz7e4pmYJktpwjAS2VtEnrEoqJtk:4cLY3X0i4Ueb1qz7e7txS2VtEnrE6

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FabFilter_KeyGen.exe
    "C:\Users\Admin\AppData\Local\Temp\FabFilter_KeyGen.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\keygen.exe
      C:\Users\Admin\AppData\Local\Temp\keygen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BASSMOD.DLL

    Filesize

    33KB

    MD5

    e4ec57e8508c5c4040383ebe6d367928

    SHA1

    b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06

    SHA256

    8ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f

    SHA512

    77d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822

  • C:\Users\Admin\AppData\Local\Temp\R2RFBFKG.dll

    Filesize

    233KB

    MD5

    098c88aa084267d7e53b3fa4093e20cb

    SHA1

    ef0e6f63c79da0f144431deb972068fbe0e223e7

    SHA256

    638193931a8e47a7a3e595efd25e410aca85de03ebf38b0cd730bcba7e6ee78d

    SHA512

    64512a98987d4a942979c1686ccfd537e1130d656779dba1fd432e55c1e9ec49d811b958f47bd347e9f01b030c87c91b70de3a8124ead3b87598ec2b49451731

  • C:\Users\Admin\AppData\Local\Temp\bgm.it

    Filesize

    80KB

    MD5

    5e3c083251880c635f5ea6a0a6ed8e76

    SHA1

    e7fb44133e223140057243493159bdce01c5f080

    SHA256

    9d460a48d7f7f461967c9065182456871606eef1c27f21767335b7d81384e141

    SHA512

    b4a6a5ad71a13f51989e1fccedb542ab528f6ab9bc3d60a4c93c59e544b8eaa06ca7b9fe79c1d9a5c92b61345c18e38736561cd21426bc9e43ae3a4c59424284

  • C:\Users\Admin\AppData\Local\Temp\keygen.exe

    Filesize

    293KB

    MD5

    a655d4207e5b42e0b0eeb875797bce38

    SHA1

    4d9a325ca6935eb8bdf11587633c6024c4bc9b01

    SHA256

    0af1b4444133af5b5e5ccfb6c3fdfa2ecd5a08cf138e1dd6507b1fc98a568546

    SHA512

    76df239f0a0573fb75a2624b32061b85ee3cccb44a7d8e5bec5da5acdf51cd8045654eaf0b1d694041397fcefc76666d090f51eb859a4fff880fb0910e33e3a0

  • C:\Users\Admin\AppData\Local\Temp\keygen.exe

    Filesize

    293KB

    MD5

    a655d4207e5b42e0b0eeb875797bce38

    SHA1

    4d9a325ca6935eb8bdf11587633c6024c4bc9b01

    SHA256

    0af1b4444133af5b5e5ccfb6c3fdfa2ecd5a08cf138e1dd6507b1fc98a568546

    SHA512

    76df239f0a0573fb75a2624b32061b85ee3cccb44a7d8e5bec5da5acdf51cd8045654eaf0b1d694041397fcefc76666d090f51eb859a4fff880fb0910e33e3a0

  • C:\Users\Admin\AppData\Local\Temp\keygen.exe

    Filesize

    293KB

    MD5

    a655d4207e5b42e0b0eeb875797bce38

    SHA1

    4d9a325ca6935eb8bdf11587633c6024c4bc9b01

    SHA256

    0af1b4444133af5b5e5ccfb6c3fdfa2ecd5a08cf138e1dd6507b1fc98a568546

    SHA512

    76df239f0a0573fb75a2624b32061b85ee3cccb44a7d8e5bec5da5acdf51cd8045654eaf0b1d694041397fcefc76666d090f51eb859a4fff880fb0910e33e3a0

  • \Users\Admin\AppData\Local\Temp\BASSMOD.dll

    Filesize

    33KB

    MD5

    e4ec57e8508c5c4040383ebe6d367928

    SHA1

    b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06

    SHA256

    8ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f

    SHA512

    77d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822

  • \Users\Admin\AppData\Local\Temp\R2RFBFKG.dll

    Filesize

    233KB

    MD5

    098c88aa084267d7e53b3fa4093e20cb

    SHA1

    ef0e6f63c79da0f144431deb972068fbe0e223e7

    SHA256

    638193931a8e47a7a3e595efd25e410aca85de03ebf38b0cd730bcba7e6ee78d

    SHA512

    64512a98987d4a942979c1686ccfd537e1130d656779dba1fd432e55c1e9ec49d811b958f47bd347e9f01b030c87c91b70de3a8124ead3b87598ec2b49451731

  • \Users\Admin\AppData\Local\Temp\keygen.exe

    Filesize

    293KB

    MD5

    a655d4207e5b42e0b0eeb875797bce38

    SHA1

    4d9a325ca6935eb8bdf11587633c6024c4bc9b01

    SHA256

    0af1b4444133af5b5e5ccfb6c3fdfa2ecd5a08cf138e1dd6507b1fc98a568546

    SHA512

    76df239f0a0573fb75a2624b32061b85ee3cccb44a7d8e5bec5da5acdf51cd8045654eaf0b1d694041397fcefc76666d090f51eb859a4fff880fb0910e33e3a0

  • \Users\Admin\AppData\Local\Temp\keygen.exe

    Filesize

    293KB

    MD5

    a655d4207e5b42e0b0eeb875797bce38

    SHA1

    4d9a325ca6935eb8bdf11587633c6024c4bc9b01

    SHA256

    0af1b4444133af5b5e5ccfb6c3fdfa2ecd5a08cf138e1dd6507b1fc98a568546

    SHA512

    76df239f0a0573fb75a2624b32061b85ee3cccb44a7d8e5bec5da5acdf51cd8045654eaf0b1d694041397fcefc76666d090f51eb859a4fff880fb0910e33e3a0

  • \Users\Admin\AppData\Local\Temp\keygen.exe

    Filesize

    293KB

    MD5

    a655d4207e5b42e0b0eeb875797bce38

    SHA1

    4d9a325ca6935eb8bdf11587633c6024c4bc9b01

    SHA256

    0af1b4444133af5b5e5ccfb6c3fdfa2ecd5a08cf138e1dd6507b1fc98a568546

    SHA512

    76df239f0a0573fb75a2624b32061b85ee3cccb44a7d8e5bec5da5acdf51cd8045654eaf0b1d694041397fcefc76666d090f51eb859a4fff880fb0910e33e3a0

  • \Users\Admin\AppData\Local\Temp\keygen.exe

    Filesize

    293KB

    MD5

    a655d4207e5b42e0b0eeb875797bce38

    SHA1

    4d9a325ca6935eb8bdf11587633c6024c4bc9b01

    SHA256

    0af1b4444133af5b5e5ccfb6c3fdfa2ecd5a08cf138e1dd6507b1fc98a568546

    SHA512

    76df239f0a0573fb75a2624b32061b85ee3cccb44a7d8e5bec5da5acdf51cd8045654eaf0b1d694041397fcefc76666d090f51eb859a4fff880fb0910e33e3a0

  • \Users\Admin\AppData\Local\Temp\keygen.exe

    Filesize

    293KB

    MD5

    a655d4207e5b42e0b0eeb875797bce38

    SHA1

    4d9a325ca6935eb8bdf11587633c6024c4bc9b01

    SHA256

    0af1b4444133af5b5e5ccfb6c3fdfa2ecd5a08cf138e1dd6507b1fc98a568546

    SHA512

    76df239f0a0573fb75a2624b32061b85ee3cccb44a7d8e5bec5da5acdf51cd8045654eaf0b1d694041397fcefc76666d090f51eb859a4fff880fb0910e33e3a0

  • memory/2196-18-0x0000000002CF0000-0x0000000002D2C000-memory.dmp

    Filesize

    240KB

  • memory/2196-6-0x0000000002CF0000-0x0000000002D2C000-memory.dmp

    Filesize

    240KB

  • memory/2196-25-0x0000000002CF0000-0x0000000002D2C000-memory.dmp

    Filesize

    240KB

  • memory/2272-27-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-39-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-21-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-26-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2272-12-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2272-28-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2272-30-0x00000000020C0000-0x000000000215D000-memory.dmp

    Filesize

    628KB

  • memory/2272-29-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-31-0x00000000020C0000-0x000000000215D000-memory.dmp

    Filesize

    628KB

  • memory/2272-32-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2272-33-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-34-0x00000000020C0000-0x000000000215D000-memory.dmp

    Filesize

    628KB

  • memory/2272-36-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-23-0x00000000020C0000-0x000000000215D000-memory.dmp

    Filesize

    628KB

  • memory/2272-42-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-47-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-50-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-51-0x00000000020C0000-0x000000000215D000-memory.dmp

    Filesize

    628KB

  • memory/2272-53-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-54-0x00000000020C0000-0x000000000215D000-memory.dmp

    Filesize

    628KB

  • memory/2272-56-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-59-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-62-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-65-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-68-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/2272-69-0x00000000020C0000-0x000000000215D000-memory.dmp

    Filesize

    628KB