Analysis
-
max time kernel
91s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 06:07
Behavioral task
behavioral1
Sample
Trojan.Win32.Floxif.dll
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
Trojan.Win32.Floxif.dll
-
Size
76KB
-
MD5
3fdff378bebdb8b218acfcc535c5b4d0
-
SHA1
be166d5dec2a8c4a306f7c1dae0d922a9d08cae7
-
SHA256
d1a3b29d4b57253635bd048c7d60bcdc602227096d7055abeee103e72d11686e
-
SHA512
56c5652357171cbc2f4d4ef168b4703419ee492fd1bc32a5f10bd72461d95c8ef127644d8ad99f7cd9e53fea410027afddbfd970381edfef0f471049850a76fc
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZKs14qb:c8y93KQjy7G55riF1cMo03r4e
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2364-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2364-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1944 2364 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2364 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 2364 4240 rundll32.exe 84 PID 4240 wrote to memory of 2364 4240 rundll32.exe 84 PID 4240 wrote to memory of 2364 4240 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Floxif.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Floxif.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 7123⤵
- Program crash
PID:1944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2364 -ip 23641⤵PID:1868