Overview
overview
7Static
static
3BloxFlip-P...in.zip
windows7-x64
1BloxFlip-P...in.zip
windows10-2004-x64
1BloxFlip-P...or.exe
windows7-x64
7BloxFlip-P...or.exe
windows10-2004-x64
7BloxFlip.pyc
windows7-x64
3BloxFlip.pyc
windows10-2004-x64
3BloxFlip-P...DME.md
windows7-x64
3BloxFlip-P...DME.md
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 02:22
Behavioral task
behavioral1
Sample
BloxFlip-Predicator-V2--main.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
BloxFlip-Predicator-V2--main.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
BloxFlip-Predicator-V2--main/BloxFlip Predicator.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
BloxFlip-Predicator-V2--main/BloxFlip Predicator.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
BloxFlip.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
BloxFlip.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
BloxFlip-Predicator-V2--main/README.md
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
BloxFlip-Predicator-V2--main/README.md
Resource
win10v2004-20240226-en
General
-
Target
BloxFlip.pyc
-
Size
43KB
-
MD5
5e739b16270d51970f69aa1fb6cbeb5a
-
SHA1
a2bd18e275f05f3922c709e3b1a76f9b3a7c5fb1
-
SHA256
ab2344456538b37c1533f8b248f20018986b3d256a1cdfcf4387138bb1336c04
-
SHA512
814ba7a00f53fb9482f8d73d7800c732c1562c8c0196eca1c384421b39207075aaa00d3c999be4a126774a9490c329cb1a70bf92f129969fc04b26ddcf9e8561
-
SSDEEP
768:fI9I7ewk6QQjWL0Deakv1DBpy1WFdyw7LYNVgqcFPDPNTHAFrTGjEaG3Z+nZZTA:g9GBj6ug1W1kywXIuPahTGjEaGp+n0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2740 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2740 AcroRd32.exe 2740 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2968 wrote to memory of 2632 2968 cmd.exe rundll32.exe PID 2968 wrote to memory of 2632 2968 cmd.exe rundll32.exe PID 2968 wrote to memory of 2632 2968 cmd.exe rundll32.exe PID 2632 wrote to memory of 2740 2632 rundll32.exe AcroRd32.exe PID 2632 wrote to memory of 2740 2632 rundll32.exe AcroRd32.exe PID 2632 wrote to memory of 2740 2632 rundll32.exe AcroRd32.exe PID 2632 wrote to memory of 2740 2632 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\BloxFlip.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\BloxFlip.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BloxFlip.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5baf3ce1cb463635e4ab3819a4506cf4f
SHA1999c111f02b8710d448ca62de5110bac1e8e7d30
SHA256244bcbcba107620cd06dc495b20a7ebd8fa2e91b077e5cd88611d0678dbb7840
SHA51269cf9aed765b54a96085fd3865c4fd9643559ebcc64d54a9ffdcb6ca397fc8db34cc32d6a099e32a1eaa8c0c408a3281a0980f3b0455f9e86714cd233244c30e