Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 04:42

General

  • Target

    f2cf3d2b0e4c8622e81e81be9df124c33ace3aff287836ac0c3122cff0725e2c.exe

  • Size

    5.0MB

  • MD5

    c106cc4d0f4566fc19919aea7860a0da

  • SHA1

    7a4237e490aade62724015a5c9721d481c603a17

  • SHA256

    f2cf3d2b0e4c8622e81e81be9df124c33ace3aff287836ac0c3122cff0725e2c

  • SHA512

    aca2fc9c8a4bbb33ed97b8cb7a9749a9d458c6bcfbbdc915138dc45fc9a914ecf2efc320efd47208d27d8b699a6a389510115df9c5327fb3146e87dc3ff064fd

  • SSDEEP

    98304:fG5Qz0XB2r24MzK1d6Q+08I2mo6v7aDrKAdj0PeE1QJHlEy3jZ6:fG5Vxm3qWQQb8IBlv7aDHYJcEyzZ6

Malware Config

Signatures

  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Detects Floxif payload 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks for any installed AV software in registry 1 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2cf3d2b0e4c8622e81e81be9df124c33ace3aff287836ac0c3122cff0725e2c.exe
    "C:\Users\Admin\AppData\Local\Temp\f2cf3d2b0e4c8622e81e81be9df124c33ace3aff287836ac0c3122cff0725e2c.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3964
    • C:\Users\Admin\AppData\Local\Temp\7zSC7FC1BC7\GenericSetup.exe
      .\GenericSetup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2960
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,15140928051103392835,1612840580898364401,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:8
    1⤵
      PID:4140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\System\symsrv.dll

      Filesize

      67KB

      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • C:\Program Files\Common Files\System\symsrv.dll.000

      Filesize

      175B

      MD5

      1130c911bf5db4b8f7cf9b6f4b457623

      SHA1

      48e734c4bc1a8b5399bff4954e54b268bde9d54c

      SHA256

      eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1

      SHA512

      94e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0

    • C:\Users\Admin\AppData\Local\Temp\7zSC7FC1BC7\GenericSetup.exe

      Filesize

      9.9MB

      MD5

      6da11d5aea63f1b1ed3f2c566e48de6c

      SHA1

      9cd0401b48837b103aa79ccb5cc04d406a415fc9

      SHA256

      d6e22eab0a67834fa39286c98820c2938e8de4f4f3dab635e578eef37e10b47b

      SHA512

      8f859e93e4d0fa67a5958ca89df0092c1e69c68aba5a8fc204aee1563059edbdf1650742c951ed01db87a9d08c9d77e0d7920d0fb4fdbd46c36f270cc2830bad

    • C:\Users\Admin\AppData\Local\Temp\7zSC7FC1BC7\GenericSetup.exe.config

      Filesize

      814B

      MD5

      fd63ee3928edd99afc5bdf17e4f1e7b6

      SHA1

      1b40433b064215ea6c001332c2ffa093b1177875

      SHA256

      2a2ddbdc4600e829ad756fd5e84a79c0401fa846ad4f2f2fb235b410e82434a9

      SHA512

      1925cde90ee84db1e5c15fa774ee5f10fa368948df7643259b03599ad58cfce9d409fd2cd752ff4cbca60b4bbe92b184ff92a0c6e8b78849c4497d38266bd3b4

    • C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1719981775\Resources\OfferPage.html

      Filesize

      1KB

      MD5

      2b8bd3554f6a6dc03f37c0bbdab769dc

      SHA1

      3592b1edcb43bb32c87b674d9d314aedde334f93

      SHA256

      c74761837d4619c8efea300d129d3c650a844fb4bc2cbba6e9bc98ac6eec0d87

      SHA512

      ddf84a43ec441246f8ebd70a596d03728fe92956d1e50f1d1f757f006ea4d5173b38cbfc0606887201366cdac6ba8365010210b06a29b6c3bab538b5ea335940

    • C:\Users\Admin\AppData\Local\Temp\GenericSetup.exe_1719981775\sciter32.dll

      Filesize

      5.6MB

      MD5

      b431083586e39d018e19880ad1a5ce8f

      SHA1

      3bbf957ab534d845d485a8698accc0a40b63cedd

      SHA256

      b525fdcc32c5a359a7f5738a30eff0c6390734d8a2c987c62e14c619f99d406b

      SHA512

      7805a3464fcc3ac4ea1258e2412180c52f2af40a79b540348486c830a20c2bbed337bbf5f4a8926b3ef98c63c87747014f5b43c35f7ec4e7a3693b9dbd0ae67b

    • memory/2960-58-0x00000000089B0000-0x0000000008F54000-memory.dmp

      Filesize

      5.6MB

    • memory/2960-31-0x00000000746CE000-0x00000000746CF000-memory.dmp

      Filesize

      4KB

    • memory/2960-37-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/2960-40-0x0000000005850000-0x0000000005878000-memory.dmp

      Filesize

      160KB

    • memory/2960-39-0x00000000056E0000-0x00000000056E8000-memory.dmp

      Filesize

      32KB

    • memory/2960-41-0x0000000005FF0000-0x000000000601C000-memory.dmp

      Filesize

      176KB

    • memory/2960-42-0x0000000006390000-0x00000000063F6000-memory.dmp

      Filesize

      408KB

    • memory/2960-43-0x0000000006B30000-0x0000000006B42000-memory.dmp

      Filesize

      72KB

    • memory/2960-55-0x0000000007B50000-0x0000000007BCC000-memory.dmp

      Filesize

      496KB

    • memory/2960-57-0x0000000008080000-0x00000000083D4000-memory.dmp

      Filesize

      3.3MB

    • memory/2960-32-0x0000000000370000-0x0000000000D5C000-memory.dmp

      Filesize

      9.9MB

    • memory/2960-67-0x0000000008660000-0x00000000086F2000-memory.dmp

      Filesize

      584KB

    • memory/2960-115-0x00000000746C0000-0x0000000074E70000-memory.dmp

      Filesize

      7.7MB

    • memory/2960-38-0x00000000058E0000-0x0000000005FBC000-memory.dmp

      Filesize

      6.9MB

    • memory/2960-87-0x0000000009390000-0x00000000093BE000-memory.dmp

      Filesize

      184KB

    • memory/2960-111-0x00000000746CE000-0x00000000746CF000-memory.dmp

      Filesize

      4KB

    • memory/3964-104-0x0000000076840000-0x00000000768A3000-memory.dmp

      Filesize

      396KB

    • memory/3964-107-0x0000000076840000-0x00000000768A3000-memory.dmp

      Filesize

      396KB

    • memory/3964-108-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3964-9-0x000000000040E000-0x0000000000411000-memory.dmp

      Filesize

      12KB

    • memory/3964-112-0x0000000076840000-0x00000000768A3000-memory.dmp

      Filesize

      396KB

    • memory/3964-80-0x0000000076855000-0x0000000076856000-memory.dmp

      Filesize

      4KB

    • memory/3964-116-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3964-3-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3964-121-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3964-127-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/3964-133-0x0000000076840000-0x00000000768A3000-memory.dmp

      Filesize

      396KB

    • memory/3964-135-0x0000000076840000-0x00000000768A3000-memory.dmp

      Filesize

      396KB