Analysis
-
max time kernel
192s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:55
Behavioral task
behavioral1
Sample
063f675afa71cad1702c4629693904fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
063f675afa71cad1702c4629693904fa.exe
Resource
win10v2004-20231215-en
General
-
Target
063f675afa71cad1702c4629693904fa.exe
-
Size
15KB
-
MD5
063f675afa71cad1702c4629693904fa
-
SHA1
1b5e9869af970f619a9d0ccdbe914e4b079ff84c
-
SHA256
34da48ccb02257cffb25281ff8433bae1b94dbfaa95afe0a3a94c419fd4214c7
-
SHA512
7837406f686461aa96c59f08ee446162444f8f50869cfa9ae4564019533fd70632b558dc143755f12c819e0f02fc6e13137b3cb96036d9e518bed5a30d1a3f40
-
SSDEEP
192:dYVl8TAAMfhPTnmPIkglNe0LsEkLrLZxWUevQtDpcuajBcxaoVF6B7y:d1qhLYHgfXOrfsQtt9rVF6y
Malware Config
Signatures
-
Blocklisted process makes network request 7 IoCs
flow pid Process 75 1208 rundll32.exe 81 1208 rundll32.exe 83 1208 rundll32.exe 84 1208 rundll32.exe 88 1208 rundll32.exe 92 1208 rundll32.exe 83 1208 rundll32.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 1568 netsh.exe 2276 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000022c06-9.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1208 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2104-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/2104-4-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1208-10-0x0000000010000000-0x000000001000A000-memory.dmp upx behavioral2/files/0x0007000000022c06-9.dat upx behavioral2/memory/1208-11-0x0000000010000000-0x000000001000A000-memory.dmp upx behavioral2/memory/1208-15-0x0000000010000000-0x000000001000A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nfr = "rundll32.exe nfr.dll,ServiceMain /pid=6007" reg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\nfr.dll cmd.exe File created C:\Windows\SysWOW64\nfr.assembly rundll32.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1392 2104 063f675afa71cad1702c4629693904fa.exe 86 PID 2104 wrote to memory of 1392 2104 063f675afa71cad1702c4629693904fa.exe 86 PID 2104 wrote to memory of 1392 2104 063f675afa71cad1702c4629693904fa.exe 86 PID 1392 wrote to memory of 400 1392 cmd.exe 88 PID 1392 wrote to memory of 400 1392 cmd.exe 88 PID 1392 wrote to memory of 400 1392 cmd.exe 88 PID 1392 wrote to memory of 1548 1392 cmd.exe 90 PID 1392 wrote to memory of 1548 1392 cmd.exe 90 PID 1392 wrote to memory of 1548 1392 cmd.exe 90 PID 1392 wrote to memory of 1568 1392 cmd.exe 96 PID 1392 wrote to memory of 1568 1392 cmd.exe 96 PID 1392 wrote to memory of 1568 1392 cmd.exe 96 PID 1392 wrote to memory of 2276 1392 cmd.exe 97 PID 1392 wrote to memory of 2276 1392 cmd.exe 97 PID 1392 wrote to memory of 2276 1392 cmd.exe 97 PID 1392 wrote to memory of 492 1392 cmd.exe 98 PID 1392 wrote to memory of 492 1392 cmd.exe 98 PID 1392 wrote to memory of 492 1392 cmd.exe 98 PID 1392 wrote to memory of 1028 1392 cmd.exe 100 PID 1392 wrote to memory of 1028 1392 cmd.exe 100 PID 1392 wrote to memory of 1028 1392 cmd.exe 100 PID 1392 wrote to memory of 3544 1392 cmd.exe 101 PID 1392 wrote to memory of 3544 1392 cmd.exe 101 PID 1392 wrote to memory of 3544 1392 cmd.exe 101 PID 1392 wrote to memory of 3692 1392 cmd.exe 102 PID 1392 wrote to memory of 3692 1392 cmd.exe 102 PID 1392 wrote to memory of 3692 1392 cmd.exe 102 PID 1392 wrote to memory of 3936 1392 cmd.exe 103 PID 1392 wrote to memory of 3936 1392 cmd.exe 103 PID 1392 wrote to memory of 3936 1392 cmd.exe 103 PID 1392 wrote to memory of 1400 1392 cmd.exe 104 PID 1392 wrote to memory of 1400 1392 cmd.exe 104 PID 1392 wrote to memory of 1400 1392 cmd.exe 104 PID 1392 wrote to memory of 3800 1392 cmd.exe 105 PID 1392 wrote to memory of 3800 1392 cmd.exe 105 PID 1392 wrote to memory of 3800 1392 cmd.exe 105 PID 1392 wrote to memory of 1208 1392 cmd.exe 106 PID 1392 wrote to memory of 1208 1392 cmd.exe 106 PID 1392 wrote to memory of 1208 1392 cmd.exe 106 PID 1208 wrote to memory of 2348 1208 rundll32.exe 108 PID 1208 wrote to memory of 2348 1208 rundll32.exe 108 PID 1208 wrote to memory of 2348 1208 rundll32.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\063f675afa71cad1702c4629693904fa.exe"C:\Users\Admin\AppData\Local\Temp\063f675afa71cad1702c4629693904fa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\nfr.bat2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\063f675afa71cad1702c4629693904fa.exe"C:\Users\Admin\AppData\Local\Temp\063f675afa71cad1702c4629693904fa.exe" /13⤵PID:400
-
-
C:\Windows\SysWOW64\netsh.exenetsh add allowedprogram "C:\Windows\System32\rundll32.exe" nfr ENABLE3⤵PID:1548
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening TCP 80 nfr ENABLE3⤵
- Modifies Windows Firewall
PID:1568
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add portopening TCP 7070 nfr ENABLE3⤵
- Modifies Windows Firewall
PID:2276
-
-
C:\Windows\SysWOW64\netsh.exenetsh winhttp set proxy proxy-server="http=localhost:7070"3⤵PID:492
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /d "http=localhost:7070" /f3⤵PID:1028
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /d "http=localhost:7070" /f3⤵PID:3544
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyOverride /d "*.local;<local>" /f3⤵PID:3692
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyOverride /d "*.local;<local>" /f3⤵PID:3936
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 01 /f3⤵PID:1400
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d 01 /f3⤵PID:3800
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe nfr.dll,ServiceMain /pid=60073⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v nfr /d "rundll32.exe nfr.dll,ServiceMain /pid=6007" /f4⤵
- Adds Run key to start application
PID:2348
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD55329c63e5756ea2189ef8054a2d21397
SHA1a0e2df28e41ed189ebe9d1f934d4123ee1f42693
SHA2563abd88eb4b0a9abc4a9a07f6bc36c9ed851ad9627a24e33421a877cf2abfbaa5
SHA512f0858050a8951838a4f384e0986b3489341882456a7772b18a427e2bf341dcd623785ec403404de5f5800f7b559d05a52044689cc02cafcd43ecc39019514875
-
Filesize
1KB
MD5b858fe451631cfee4fe6455c2d442911
SHA1952ade0f4312a7b7c4d290d5494fdcc9fa60f3b9
SHA256db365ffc15d95ad0cedb44c2a17914642eec34af017e4a0b94aefd9051101956
SHA512e6a98b356cd399bba9440e9255c93b46d9bf7324ae68c109e3708292b4b26730ff744b3ccae8f397837e4055f3e182a822bf3fe03c74dc5af681fbf36cee9635