Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe
Resource
win7-20240903-en
General
-
Target
f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe
-
Size
5.6MB
-
MD5
9b6787e6f99a57eccf8f398403739cb0
-
SHA1
702d0d70c8dbf1738b6f3ea07ba200f01b9cadbb
-
SHA256
f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bc
-
SHA512
fdd177ea85e0573596ca073dbfd2d1c8b5aa2c7bb2348ae6cdc865ad0f1048921b16cc3472ae555c27b1695b57aec16d4955d748519a11a7fdf31b65c5a6159a
-
SSDEEP
98304:8L3sSBKyVg5fYIq4D6HoYl5fIlPEZszInt4pNFjpJSnGYBzzsEPzdsXxXksFq:88SBBVg1O4D6Hj5idEa6BzwEPzdsXdk5
Malware Config
Signatures
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023431-1.dat floxif -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0009000000023431-1.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1504 Setup.exe -
Loads dropped DLL 6 IoCs
pid Process 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe 1504 Setup.exe 1504 Setup.exe 1504 Setup.exe 1504 Setup.exe 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe -
resource yara_rule behavioral2/memory/400-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/files/0x0009000000023431-1.dat upx behavioral2/memory/400-126-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/400-132-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/400-142-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/400-161-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe File created \??\c:\program files\common files\system\symsrv.dll.000 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe 1504 Setup.exe 1504 Setup.exe 1504 Setup.exe 1504 Setup.exe 1504 Setup.exe 1504 Setup.exe 1504 Setup.exe 1504 Setup.exe 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 400 wrote to memory of 1504 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe 82 PID 400 wrote to memory of 1504 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe 82 PID 400 wrote to memory of 1504 400 f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe"C:\Users\Admin\AppData\Local\Temp\f75dff23fb2b4e4dc14644febe08f028ae59e20c77a8f75646198eadd64070bcN.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\a1c40ca7a3f1fc8e1b0a\Setup.exeC:\a1c40ca7a3f1fc8e1b0a\\Setup.exe /x86 /x64 /lcid 2052 /lpredist2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
175B
MD51130c911bf5db4b8f7cf9b6f4b457623
SHA148e734c4bc1a8b5399bff4954e54b268bde9d54c
SHA256eba08cc8182f379392a97f542b350ea0dbbe5e4009472f35af20e3d857eafdf1
SHA51294e2511ef2c53494c2aff0960266491ffc0e54e75185427d1ccedae27c286992c754ca94cbb0c9ea36e3f04cd4eb7f032c551cf2d4b309f292906303f1a75fa0
-
Filesize
16KB
MD5ef954e2068928584c0024efd661cb1c8
SHA1b88eea8f22e9c72983bdee4937a64c817614aae4
SHA256a748baea0aee7c238d19743113c8daa66ff4aafe704f4c32db9ac1fc455a774f
SHA5124cdfeb0cd481661d17c68a1099bef54422fa7f782f315ab63fc86a7e0868fdae0587417c8810a998bab790348ea2ac74af9dbdb7bcbbe18dcb84bc56f4b34bf6
-
Filesize
80KB
MD5ffd712ff1645648321ed91117f981017
SHA1bf53f8ce3a4750b7fc4b6569fc5ef7ea20494450
SHA256e4ec814ecb215c2f83ab2d6da5ae80d6ebdc015da2ea8f028657f35e632c4540
SHA512f633fe71f63fd8661174636232ad07e387c38a52dd0dcc0f8573376ca411a61e870d11c95cc537eacc5f381ea372c830814b5c5857848672f2b4469eeafa1533
-
Filesize
66KB
MD565c104ef11a43fd9769667eaab40e909
SHA16ec9e9ce3cf09ed5a19b2fdec24e41230e95820b
SHA25672bdde5ab79018cfe9659bf4cd62752ffc5f20fada6b779a2945506331527e98
SHA51237a0f2543d6bb3d57b9ef84b96ae27a9ea3f9f39aac8e3e874540e256140c54dfb65fb62638c1745803f014b752d3099ed8ddcc110c5a7122d9392f70640f100
-
Filesize
26KB
MD52fe3f8d164676b173eebdc3066d70593
SHA16a4e84ab71fe5225ad765804ff12662faa2bb80d
SHA256655d450043f366037dc7e6129a776ad9a11307bb15616d63069aa84a82d52f1e
SHA5129328de7c4cebaf0a2a6d93703f1e25fe54fbc72cc29dcbeb794d7d6cabb883a5758e4af700bab054ae9542ea4d94cf426821e6ee73f7dc5f1f1f013b3dc3ab2a
-
Filesize
15KB
MD5cd131d41791a543cc6f6ed1ea5bd257c
SHA1f42a2708a0b42a13530d26515274d1fcdbfe8490
SHA256e139af8858fe90127095ac1c4685bcd849437ef0df7c416033554703f5d864bb
SHA512a6ee9af8f8c2c7acd58dd3c42b8d70c55202b382ffc5a93772af7bf7d7740c1162bb6d38a4307b1802294a18eb52032d410e128072af7d4f9d54f415be020c9a
-
Filesize
1.2MB
MD53e8a593d7b72df3f88a1b0ff872f3780
SHA1f52ab2ca54f9cd904c48515506f7d1941df91120
SHA2564dbdedfe819c95d2dd902c2a15f11089369f705ce130239449ae18a4d417ed14
SHA51291979bcbcc48f35b02178b9060533dc7c827ebede44799a746f94718c6a0aaa6b0c9a1349946c35635e975064f5658876739f5576946dbb385c0b8f270561422
-
Filesize
125KB
MD5d8bdc90b8d9c47548b0789b33c93b266
SHA1e2287110a405c2988f49a61d859455d41eac7215
SHA256fd54615d479e33197b7a63873e7468f3e2e5467bdd4384d6471b4d8009f13dcf
SHA512687cdd99c2ce3075b9cbc8f4113fa2245b01c93607bb15396ea26406eca53181998aa124452dbb4681492e29e273bd14a1b427953e59ade17aa27bbbaf249b14
-
Filesize
901KB
MD587125d428eb7b400af6822af0c4e72dd
SHA167dc6ef3ae8e32fda9e941d450ae9e0adbcf3982
SHA256d199d038d59d3b6a219258009635699226d835bf9163357e9458352b6578b157
SHA512d4ca91b014557827449426d00689f86599a6d7bdd231c358d1666001dfa73d54e199b695a8cb5c21aab7e191b01bdc7e031d6a9288af27b6b271f736d963ceb6
-
Filesize
978KB
MD53bbafaa8ecd3a6212a063b47e5950e8f
SHA16927876a331545e7c13be7b51107bc397166eca6
SHA256ebe86479304d7a518819545877aab9694c618e9959eb8a45928e3b2dfb14d448
SHA512961aa6d13fc132de8a1c25e03d118170d5514221831e3ff604b830b1588cb35ded819115d773a6d1c38c0dd7fa23809b75e0bcaae9cd65b8dba28a5485d9ba33
-
Filesize
342KB
MD5e31641c114d66ea24d79ed4032269dd0
SHA1911fd6d8e62c61a76a464306f84c9b80e93467aa
SHA2563b9822668816a77b623258f8036120eaa5da5d74b16aadfc601cb0e513a56461
SHA512dc7377cadda1bf63c7df267f3313f916a92363004ab8859e6f3a77aa7938d20de0f6857b8842e6424de2749cf6686f35898002054d8f9c4ed4f5775035cec54c
-
Filesize
31KB
MD5a9f6a028e93f3f6822eb900ec3fda7ad
SHA18ff2e8f36d690a687233dbd2e72d98e16e7ef249
SHA256aaf8cb1a9af89d250cbc0893a172e2c406043b1f81a211cb93604f165b051848
SHA5121c51392c334aea17a25b20390cd4e7e99aa6373e2c2b97e7304cf7ec1a16679051a41e124c7bc890b02b890d4044b576b666ef50d06671f7636e4701970e8ddc
-
Filesize
117KB
MD5bc32088bfaa1c76ba4b56639a2dec592
SHA184b47aa37bda0f4cd196bd5f4bd6926a594c5f82
SHA256b05141dbc71669a7872a8e735e5e43a7f9713d4363b7a97543e1e05dcd7470a7
SHA5124708015aa57f1225d928bfac08ed835d31fd7bdf2c0420979fd7d0311779d78c392412e8353a401c1aa1885568174f6b9a1e02b863095fa491b81780d99d0830
-
Filesize
13KB
MD58a28b474f4849bee7354ba4c74087cea
SHA1c17514dfc33dd14f57ff8660eb7b75af9b2b37b0
SHA2562a7a44fb25476886617a1ec294a20a37552fd0824907f5284fade3e496ed609b
SHA512a7927700d8050623bc5c761b215a97534c2c260fcab68469b7a61c85e2dff22ed9cf57e7cb5a6c8886422abe7ac89b5c71e569741db74daa2dcb4152f14c2369
-
Filesize
35KB
MD58ace169bf65675c089e0327d5b1f7437
SHA143646e29c878f58ac4b5d7c192d11b3becd9e9f6
SHA2568f7847cfc9ec70b6758f6fbe9b98809ca7bf8ecb25bf9b3a8e7e052b83dfa94b
SHA5123e98f8351e96bab4b8cecf93e590c722233d119d7cec76445a0b170f69de647bd65eafeafecc8888573e986b3f80403480728c7a1e014961fbd60dc169ca5db7
-
Filesize
123KB
MD5d39bad9dda7b91613cb29b6bd55f0901
SHA16d079df41e31fbc836922c19c5be1a7fc38ac54e
SHA256d80ffeb020927f047c11fc4d9f34f985e0c7e5dfea9fb23f2bc134874070e4e6
SHA512fad8cb2b9007a7240421fbc5d621c3092d742417c60e8bb248e2baa698dcade7ca54b24452936c99232436d92876e9184eaf79d748c96aa1fe8b29b0e384eb82
-
Filesize
123KB
MD5c66bbe8f84496ef85f7af6bed5212cec
SHA11e4eab9cc728916a8b1c508f5ac8ae38bb4e7bf1
SHA2561372c7f132595ddad210c617e44fedff7a990a9e8974cc534ca80d897dd15abd
SHA5125dabf65ec026d8884e1d80dcdacb848c1043ef62c9ebd919136794b23be0deb3f7f1acdff5a4b25a53424772b32bd6f91ba1bd8c5cf686c41477dd65cb478187
-
Filesize
123KB
MD56125f32aa97772afdff2649bd403419b
SHA1d84da82373b599aed496e0d18901e3affb6cfaca
SHA256a0c7b4b17a69775e1d94123dfceec824744901d55b463ba9dca9301088f12ea5
SHA512c4bdcd72fa4f2571c505fdb0adc69f7911012b6bdeb422dca64f79f7cc1286142e51b8d03b410735cd2bd7bc7c044c231a3a31775c8e971270beb4763247850f
-
Filesize
194KB
MD5c8824ea3ce0a54ff1e89f8a296b4e64b
SHA1333feb78e9bb088650ce90dea0f0ccc57d54a803
SHA2564bb9ea033f4e93dbf42fc74e6faf94fe8b777a34836f7d537436cbe409fd743f
SHA512c40e40e0cb2aaa7cf7cccbe29ca4530ff0e0a4de9a7328996305db6dfd6994cbe085fab7b8f666bbd3d1efd95406ea26b1376aa81908ace60dc131a4e9c32d40
-
Filesize
221KB
MD56404765deb80c2d8986f60dce505915b
SHA1e40e18837c7d3e5f379c4faef19733d81367e98f
SHA256b236253e9ecb1e377643ae5f91c0a429b91c9b30cca1751a7bc4403ea6d94120
SHA512a5ff302f38020b31525111206d2f5db2d6a9828c70ef0b485f660f122a30ce7028b5a160dd5f5fbcccb5b59698c8df7f2e15fdf19619c82f4dec8d901b7548ba