Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 02:44
Behavioral task
behavioral1
Sample
d591e67ebd5433c9deeb27066da4bce0N.exe
Resource
win7-20240708-en
General
-
Target
d591e67ebd5433c9deeb27066da4bce0N.exe
-
Size
468KB
-
MD5
d591e67ebd5433c9deeb27066da4bce0
-
SHA1
cd721be82f3d80daf925e9f5d8244c237f3aed95
-
SHA256
442fd96236342f9e061551efecbbed0ab015ffafb750ccb02f98891813b22a60
-
SHA512
5c05ff6567c34fd7159509d1a18db1e68dca501ce4c3a0c8f11a984821bb79738391017b140f57b9c8e052409bf9c500e60cd703c77f4e10a62d8d2aa1135cd7
-
SSDEEP
6144:QR5YGq/6VOAFdljBt4vvB8oQUQ+NCIRlavBe:K0h8BYaRU9CQgv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2824 Fluboa.exe -
resource yara_rule behavioral1/memory/2096-0-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2824-13-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/files/0x0007000000018634-11.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\3ETECE6I8G = "C:\\Windows\\Fluboa.exe" Fluboa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Fluboa.exe d591e67ebd5433c9deeb27066da4bce0N.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d591e67ebd5433c9deeb27066da4bce0N.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d591e67ebd5433c9deeb27066da4bce0N.exe File created C:\Windows\Fluboa.exe d591e67ebd5433c9deeb27066da4bce0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d591e67ebd5433c9deeb27066da4bce0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fluboa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main Fluboa.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main d591e67ebd5433c9deeb27066da4bce0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe 2824 Fluboa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2096 d591e67ebd5433c9deeb27066da4bce0N.exe 2824 Fluboa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2096 d591e67ebd5433c9deeb27066da4bce0N.exe 2824 Fluboa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2824 2096 d591e67ebd5433c9deeb27066da4bce0N.exe 30 PID 2096 wrote to memory of 2824 2096 d591e67ebd5433c9deeb27066da4bce0N.exe 30 PID 2096 wrote to memory of 2824 2096 d591e67ebd5433c9deeb27066da4bce0N.exe 30 PID 2096 wrote to memory of 2824 2096 d591e67ebd5433c9deeb27066da4bce0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d591e67ebd5433c9deeb27066da4bce0N.exe"C:\Users\Admin\AppData\Local\Temp\d591e67ebd5433c9deeb27066da4bce0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\Fluboa.exeC:\Windows\Fluboa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5d591e67ebd5433c9deeb27066da4bce0
SHA1cd721be82f3d80daf925e9f5d8244c237f3aed95
SHA256442fd96236342f9e061551efecbbed0ab015ffafb750ccb02f98891813b22a60
SHA5125c05ff6567c34fd7159509d1a18db1e68dca501ce4c3a0c8f11a984821bb79738391017b140f57b9c8e052409bf9c500e60cd703c77f4e10a62d8d2aa1135cd7
-
Filesize
346B
MD5eccb40c4a7040eade13490043d929fab
SHA101ffc1f5ab5b1fdd48089c8320d8ada12c4d2f6c
SHA2567b55959ecd4ba3eb5bd68f8c40ceb9faae7fa223146612577e2fd34bf99b0889
SHA512554b89b56879ee3ef8f4ee3bf08dcbc011c4c2f62cb4f61aa867908b27c8f47e6d93ce72da24c5a564d15ed1d22fd0786c4e82ed4ccb74c53664ad7e9fbf86d1