Analysis

  • max time kernel
    96s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 19:11

General

  • Target

    Fluxus/Fluxus/Fluxus V7.exe

  • Size

    2.8MB

  • MD5

    bb7859fbcda8f8f264a1de41673510c2

  • SHA1

    089f03f7dfc88c2d14292e76de928e4a9464b3f6

  • SHA256

    47d87a08e3a9cdfe2ef9c462205044ef938d0215e87c518b7627bb367e4faae9

  • SHA512

    61b7e51073559dc2090d280f65f347002e0d354c33b05916871df279fd1d67778e01ffcba1cda41ed01593de0676bbc3fbb048c307b2d0e27bfa228ebed7265c

  • SSDEEP

    49152:7FvJA52joYoYdnZOYoB1bAzOBC5tMqiNHw+W7SCwGpv8H:HXoYoYdnZOYovHTgBk

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fluxus\Fluxus\Fluxus V7.exe
    "C:\Users\Admin\AppData\Local\Temp\Fluxus\Fluxus\Fluxus V7.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    PID:3048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 2912
      2⤵
      • Program crash
      PID:3100
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3048 -ip 3048
    1⤵
      PID:116

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

            Filesize

            9KB

            MD5

            7050d5ae8acfbe560fa11073fef8185d

            SHA1

            5bc38e77ff06785fe0aec5a345c4ccd15752560e

            SHA256

            cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

            SHA512

            a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

          • memory/3048-0-0x000000007450E000-0x000000007450F000-memory.dmp

            Filesize

            4KB

          • memory/3048-1-0x0000000000330000-0x00000000005FC000-memory.dmp

            Filesize

            2.8MB

          • memory/3048-2-0x0000000074500000-0x0000000074CB0000-memory.dmp

            Filesize

            7.7MB

          • memory/3048-3-0x0000000009630000-0x0000000009638000-memory.dmp

            Filesize

            32KB

          • memory/3048-4-0x0000000074500000-0x0000000074CB0000-memory.dmp

            Filesize

            7.7MB

          • memory/3048-5-0x0000000074500000-0x0000000074CB0000-memory.dmp

            Filesize

            7.7MB

          • memory/3048-6-0x00000000096B0000-0x00000000096E8000-memory.dmp

            Filesize

            224KB

          • memory/3048-7-0x0000000009690000-0x000000000969E000-memory.dmp

            Filesize

            56KB

          • memory/3048-18-0x0000000074500000-0x0000000074CB0000-memory.dmp

            Filesize

            7.7MB