Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
FreeCCs.scr
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
FreeCCs.scr
Resource
win10v2004-20240802-en
General
-
Target
FreeCCs.scr
-
Size
11.5MB
-
MD5
b80e343c5eb7f423ba4e1a9c03f202f2
-
SHA1
d423d73a0796240f9dcdcf128f62f89b0431cbab
-
SHA256
0b567424e8497a4c1a3f427f3b397a391596f211f685e2d3cab19221d76564d6
-
SHA512
a13f2f40d95f4b09b9a714ad722deb03260148fc47f01783c46b1c6483ed5ea4c95414d226337449a8174c551fc82199c823d1e7b20d1fdcbe455bd5135ea9ca
-
SSDEEP
196608:fqwEg/oJJ3FEsI3kXJeV1UhbL9sSC+GQw0RCBNukSjnvl59VroGGReov:wgmJVEsXXJMGdLg0GuhhoFt
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1580 Exelav.exe 2572 Exelav.exe 1184 Process not Found -
Loads dropped DLL 4 IoCs
pid Process 2652 FreeCCs.scr 1580 Exelav.exe 2572 Exelav.exe 1184 Process not Found -
resource yara_rule behavioral1/files/0x000500000001a4fc-59.dat upx behavioral1/memory/2572-61-0x000007FEF5660000-0x000007FEF5C48000-memory.dmp upx -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x00070000000194a4-6.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1580 2652 FreeCCs.scr 32 PID 2652 wrote to memory of 1580 2652 FreeCCs.scr 32 PID 2652 wrote to memory of 1580 2652 FreeCCs.scr 32 PID 1580 wrote to memory of 2572 1580 Exelav.exe 33 PID 1580 wrote to memory of 2572 1580 Exelav.exe 33 PID 1580 wrote to memory of 2572 1580 Exelav.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\FreeCCs.scr"C:\Users\Admin\AppData\Local\Temp\FreeCCs.scr" /S1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Exelav.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Exelav.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Exelav.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Exelav.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5db09c9bbec6134db1766d369c339a0a1
SHA1c156d9f2d0e80b4cf41794cd9b8b1e8a352e0a0b
SHA256b1aac1e461174bbae952434e4dac092590d72b9832a04457c94bd9bb7ee8ad79
SHA512653a7fff6a2b6bffb9ea2c0b72ddb83c9c53d555e798eea47101b0d932358180a01af2b9dab9c27723057439c1eaffb8d84b9b41f6f9cd1c3c934f1794104d45
-
Filesize
11.0MB
MD58b4b5aee0c2feeada135b1f8262a8acd
SHA1887a5e298fdaf32587480414ec43e23c028d691e
SHA256e35bddd29b1198caa586a32bddbcc90acccc8df2ea721b81c5252db58f659b21
SHA5123e72d9905a5618c20a073a1e590d0701b8cbd410ef6711291e847a0433469c96a6cec5f3aed95cdb29d987bfef31582ec3b99fa2fa354b1b3db5b74692ff8300