Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
2b953a27fe875c8394d05347a5d11d14.exe
Resource
win7-20231129-en
General
-
Target
2b953a27fe875c8394d05347a5d11d14.exe
-
Size
109KB
-
MD5
2b953a27fe875c8394d05347a5d11d14
-
SHA1
c4976290e6ec103671e7709abbed1a92c7c9b0a2
-
SHA256
502d5f5c411a1eeec35a874336b32d35502abb31afd202ad66bd9b2bc341307f
-
SHA512
5e62c4f031a05d4b3d8bc21b65d9d784de8eb759e13fe4ca9069c1c3520a8b0dcca964e1e39a6c38267d488f46a9986beb2161468dc5bc4ad1ff7313485ddf6e
-
SSDEEP
3072:Foiy0nuMAXQF6PIZEDlY+9TXxzQ+HsKWbmFq5:Foinzot84umF
Malware Config
Extracted
asyncrat
0.5.8
Default
0pe3F2LrSSkk
-
delay
3
-
install
true
-
install_file
Fluxus Folder.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/qdzaTTaM
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Fluxus Folder.exeFluxus Folder.exepid process 2180 Fluxus Folder.exe 2772 Fluxus Folder.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2512 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 5 pastebin.com 13 0.tcp.eu.ngrok.io 25 0.tcp.eu.ngrok.io 4 pastebin.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
2b953a27fe875c8394d05347a5d11d14.exeFluxus Folder.exedescription pid process target process PID 2748 set thread context of 2572 2748 2b953a27fe875c8394d05347a5d11d14.exe 2b953a27fe875c8394d05347a5d11d14.exe PID 2180 set thread context of 2772 2180 Fluxus Folder.exe Fluxus Folder.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2500 timeout.exe -
Processes:
Fluxus Folder.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C Fluxus Folder.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 Fluxus Folder.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 190000000100000010000000a823b4a20180beb460cab955c24d7e21030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c1d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b0b000000010000001600000047006c006f00620061006c005300690067006e0000005300000001000000230000003021301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030106082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030806082b06010505070309060a2b0601040182370a030406082b0601050507030606082b0601050507030706082b060105050802020f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 Fluxus Folder.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2b953a27fe875c8394d05347a5d11d14.exepid process 2572 2b953a27fe875c8394d05347a5d11d14.exe 2572 2b953a27fe875c8394d05347a5d11d14.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
2b953a27fe875c8394d05347a5d11d14.exeFluxus Folder.exedescription pid process Token: SeDebugPrivilege 2572 2b953a27fe875c8394d05347a5d11d14.exe Token: SeDebugPrivilege 2772 Fluxus Folder.exe Token: SeDebugPrivilege 2772 Fluxus Folder.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
2b953a27fe875c8394d05347a5d11d14.exe2b953a27fe875c8394d05347a5d11d14.execmd.execmd.exeFluxus Folder.exedescription pid process target process PID 2748 wrote to memory of 2572 2748 2b953a27fe875c8394d05347a5d11d14.exe 2b953a27fe875c8394d05347a5d11d14.exe PID 2748 wrote to memory of 2572 2748 2b953a27fe875c8394d05347a5d11d14.exe 2b953a27fe875c8394d05347a5d11d14.exe PID 2748 wrote to memory of 2572 2748 2b953a27fe875c8394d05347a5d11d14.exe 2b953a27fe875c8394d05347a5d11d14.exe PID 2748 wrote to memory of 2572 2748 2b953a27fe875c8394d05347a5d11d14.exe 2b953a27fe875c8394d05347a5d11d14.exe PID 2748 wrote to memory of 2572 2748 2b953a27fe875c8394d05347a5d11d14.exe 2b953a27fe875c8394d05347a5d11d14.exe PID 2748 wrote to memory of 2572 2748 2b953a27fe875c8394d05347a5d11d14.exe 2b953a27fe875c8394d05347a5d11d14.exe PID 2748 wrote to memory of 2572 2748 2b953a27fe875c8394d05347a5d11d14.exe 2b953a27fe875c8394d05347a5d11d14.exe PID 2748 wrote to memory of 2572 2748 2b953a27fe875c8394d05347a5d11d14.exe 2b953a27fe875c8394d05347a5d11d14.exe PID 2748 wrote to memory of 2572 2748 2b953a27fe875c8394d05347a5d11d14.exe 2b953a27fe875c8394d05347a5d11d14.exe PID 2572 wrote to memory of 2736 2572 2b953a27fe875c8394d05347a5d11d14.exe cmd.exe PID 2572 wrote to memory of 2736 2572 2b953a27fe875c8394d05347a5d11d14.exe cmd.exe PID 2572 wrote to memory of 2736 2572 2b953a27fe875c8394d05347a5d11d14.exe cmd.exe PID 2572 wrote to memory of 2736 2572 2b953a27fe875c8394d05347a5d11d14.exe cmd.exe PID 2572 wrote to memory of 2512 2572 2b953a27fe875c8394d05347a5d11d14.exe cmd.exe PID 2572 wrote to memory of 2512 2572 2b953a27fe875c8394d05347a5d11d14.exe cmd.exe PID 2572 wrote to memory of 2512 2572 2b953a27fe875c8394d05347a5d11d14.exe cmd.exe PID 2572 wrote to memory of 2512 2572 2b953a27fe875c8394d05347a5d11d14.exe cmd.exe PID 2736 wrote to memory of 2464 2736 cmd.exe schtasks.exe PID 2736 wrote to memory of 2464 2736 cmd.exe schtasks.exe PID 2736 wrote to memory of 2464 2736 cmd.exe schtasks.exe PID 2736 wrote to memory of 2464 2736 cmd.exe schtasks.exe PID 2512 wrote to memory of 2500 2512 cmd.exe timeout.exe PID 2512 wrote to memory of 2500 2512 cmd.exe timeout.exe PID 2512 wrote to memory of 2500 2512 cmd.exe timeout.exe PID 2512 wrote to memory of 2500 2512 cmd.exe timeout.exe PID 2512 wrote to memory of 2180 2512 cmd.exe Fluxus Folder.exe PID 2512 wrote to memory of 2180 2512 cmd.exe Fluxus Folder.exe PID 2512 wrote to memory of 2180 2512 cmd.exe Fluxus Folder.exe PID 2512 wrote to memory of 2180 2512 cmd.exe Fluxus Folder.exe PID 2180 wrote to memory of 2772 2180 Fluxus Folder.exe Fluxus Folder.exe PID 2180 wrote to memory of 2772 2180 Fluxus Folder.exe Fluxus Folder.exe PID 2180 wrote to memory of 2772 2180 Fluxus Folder.exe Fluxus Folder.exe PID 2180 wrote to memory of 2772 2180 Fluxus Folder.exe Fluxus Folder.exe PID 2180 wrote to memory of 2772 2180 Fluxus Folder.exe Fluxus Folder.exe PID 2180 wrote to memory of 2772 2180 Fluxus Folder.exe Fluxus Folder.exe PID 2180 wrote to memory of 2772 2180 Fluxus Folder.exe Fluxus Folder.exe PID 2180 wrote to memory of 2772 2180 Fluxus Folder.exe Fluxus Folder.exe PID 2180 wrote to memory of 2772 2180 Fluxus Folder.exe Fluxus Folder.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b953a27fe875c8394d05347a5d11d14.exe"C:\Users\Admin\AppData\Local\Temp\2b953a27fe875c8394d05347a5d11d14.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\2b953a27fe875c8394d05347a5d11d14.exe"C:\Users\Admin\AppData\Local\Temp\2b953a27fe875c8394d05347a5d11d14.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Fluxus Folder" /tr '"C:\Users\Admin\AppData\Roaming\Fluxus Folder.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Fluxus Folder" /tr '"C:\Users\Admin\AppData\Roaming\Fluxus Folder.exe"'4⤵
- Creates scheduled task(s)
PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp7974.tmp.bat""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2500
-
-
C:\Users\Admin\AppData\Roaming\Fluxus Folder.exe"C:\Users\Admin\AppData\Roaming\Fluxus Folder.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Roaming\Fluxus Folder.exe"C:\Users\Admin\AppData\Roaming\Fluxus Folder.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a3698a737056a2a0ada33cbe1c6c9c8f
SHA1b8a1ad892188608073b4bf6ce55d0ad3b1b6ece1
SHA256ea0bfb66b15de49ce9d87bd59daf22e042d85f09a38a0038f83e68596b9e715c
SHA512518bf7d4cd8558b31d245fea21a6df07a2c5431bf844a4f2711b96656608dee229606bbff90767aaf40e2c306f4d256ed9549efdd04e160f4bf9220ed4c538ac
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
157B
MD5172b549f9ca092cf667e51c451fba891
SHA12e738d0a729f8b6b525d60b01ed98e7e81dce215
SHA2562144e338489c9ee292dae49dfd5fb9b8e603d99d17544a6e98d8b9e28e1009b5
SHA51248bdaef285cc103489eccbb7b1a572db41dd232d3f72eb8a17f6f2fab19dbee00ca15b541825b53468e7c9b158f780b208b3f0b64cebe297a8be365b8a3a6004
-
Filesize
109KB
MD52b953a27fe875c8394d05347a5d11d14
SHA1c4976290e6ec103671e7709abbed1a92c7c9b0a2
SHA256502d5f5c411a1eeec35a874336b32d35502abb31afd202ad66bd9b2bc341307f
SHA5125e62c4f031a05d4b3d8bc21b65d9d784de8eb759e13fe4ca9069c1c3520a8b0dcca964e1e39a6c38267d488f46a9986beb2161468dc5bc4ad1ff7313485ddf6e