Overview
overview
10Static
static
10Proxy_Tool...rs.rar
windows7-x64
7Proxy_Tool...rs.rar
windows10-2004-x64
1Proxy Tool...an.txt
windows7-x64
1Proxy Tool...an.txt
windows10-2004-x64
1Proxy Tool...og.txt
windows7-x64
1Proxy Tool...og.txt
windows10-2004-x64
1Proxy Tool...ip.dll
windows7-x64
1Proxy Tool...ip.dll
windows10-2004-x64
1Proxy Tool...CE.zip
windows7-x64
8Proxy Tool...CE.zip
windows10-2004-x64
1Proxy Tool...er.exe
windows7-x64
8Proxy Tool...er.exe
windows10-2004-x64
8Proxy Tool...ME.txt
windows7-x64
1Proxy Tool...ME.txt
windows10-2004-x64
1Proxy Tool...te.dll
windows7-x64
3Proxy Tool...te.dll
windows10-2004-x64
3Proxy Tool...og.txt
windows7-x64
1Proxy Tool...og.txt
windows10-2004-x64
1Proxy Tool...xy.exe
windows7-x64
3Proxy Tool...xy.exe
windows10-2004-x64
3Proxy Tool...xy.exe
windows7-x64
8Proxy Tool...xy.exe
windows10-2004-x64
8Proxy Tool...ce.txt
windows7-x64
1Proxy Tool...ce.txt
windows10-2004-x64
1Proxy Tool...ce.txt
windows7-x64
1Proxy Tool...ce.txt
windows10-2004-x64
1Proxy Tool...op.ini
windows7-x64
1Proxy Tool...op.ini
windows10-2004-x64
1Proxy Tool...an.txt
windows7-x64
1Proxy Tool...an.txt
windows10-2004-x64
1Proxy Tool...ck.ini
windows7-x64
1Proxy Tool...ck.ini
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 16:04
Behavioral task
behavioral1
Sample
Proxy_Tools_and_Grabbers.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Proxy_Tools_and_Grabbers.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/Virus Total/scan.txt
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/Virus Total/scan.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/changelog.txt
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/changelog.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/Ionic.Zip.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/Ionic.Zip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/LICENCE.zip
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/LICENCE.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/Launcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/README.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/README.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/System.Data.SQLite.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/System.Data.SQLite.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/changelog.txt
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/changelog.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/vProxy.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/data/vProxy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/vProxy.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
Proxy Tools and Grabbers/vProxy v1.4 by Yani/vProxy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Proxy Tools and Grabbers/μProxy Tool v1.81/Data/Source/HttpSource.txt
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Proxy Tools and Grabbers/μProxy Tool v1.81/Data/Source/HttpSource.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Proxy Tools and Grabbers/μProxy Tool v1.81/Data/Source/SocksSource.txt
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Proxy Tools and Grabbers/μProxy Tool v1.81/Data/Source/SocksSource.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Proxy Tools and Grabbers/μProxy Tool v1.81/Virus Total/desktop.ini
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Proxy Tools and Grabbers/μProxy Tool v1.81/Virus Total/desktop.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Proxy Tools and Grabbers/μProxy Tool v1.81/Virus Total/scan.txt
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Proxy Tools and Grabbers/μProxy Tool v1.81/Virus Total/scan.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Proxy Tools and Grabbers/μProxy Tool v1.81/check.ini
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
Proxy Tools and Grabbers/μProxy Tool v1.81/check.ini
Resource
win10v2004-20241007-en
General
-
Target
Proxy_Tools_and_Grabbers.rar
-
Size
137.3MB
-
MD5
0325df826cf44b475b70c8244cec2947
-
SHA1
125f6731a9b6f09eb66b4c02095d2090d70df1da
-
SHA256
1ec294c1fb059743f946ed9cdd9949d45a724db845ad8af8ac46f35d13c09e73
-
SHA512
d60acc19f26df90bbf1ba0f91dc24022f7fe73d952a137b9aa07f76a2d45e1498ddeaf3d9f365a201e29aa619247cebadd87c0054e0d288a2ea169e4f6296dac
-
SSDEEP
3145728:pqGX7Lf3D39l2pp9TCW8aZiQ+nc321i0EHTQD8XBD:7T39l24WGi0EHTQiD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2256 HQ Proxy Leecher.exe 2892 ExpressVPN Brute Checker By ACTEAM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HQ Proxy Leecher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExpressVPN Brute Checker By ACTEAM.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2888 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 768 7zFM.exe 768 7zFM.exe 768 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 768 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 768 7zFM.exe Token: 35 768 7zFM.exe Token: SeSecurityPrivilege 768 7zFM.exe Token: SeSecurityPrivilege 768 7zFM.exe Token: SeSecurityPrivilege 768 7zFM.exe Token: SeSecurityPrivilege 768 7zFM.exe Token: SeSecurityPrivilege 768 7zFM.exe Token: SeSecurityPrivilege 768 7zFM.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 768 7zFM.exe 768 7zFM.exe 768 7zFM.exe 768 7zFM.exe 768 7zFM.exe 768 7zFM.exe 768 7zFM.exe 768 7zFM.exe 768 7zFM.exe 768 7zFM.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 768 wrote to memory of 2256 768 7zFM.exe 30 PID 768 wrote to memory of 2256 768 7zFM.exe 30 PID 768 wrote to memory of 2256 768 7zFM.exe 30 PID 768 wrote to memory of 2256 768 7zFM.exe 30 PID 768 wrote to memory of 2888 768 7zFM.exe 32 PID 768 wrote to memory of 2888 768 7zFM.exe 32 PID 768 wrote to memory of 2888 768 7zFM.exe 32 PID 768 wrote to memory of 2892 768 7zFM.exe 33 PID 768 wrote to memory of 2892 768 7zFM.exe 33 PID 768 wrote to memory of 2892 768 7zFM.exe 33 PID 768 wrote to memory of 2892 768 7zFM.exe 33
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Proxy_Tools_and_Grabbers.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\7zO003F17D6\HQ Proxy Leecher.exe"C:\Users\Admin\AppData\Local\Temp\7zO003F17D6\HQ Proxy Leecher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO0038D7F6\version.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\7zO00357327\ExpressVPN Brute Checker By ACTEAM.exe"C:\Users\Admin\AppData\Local\Temp\7zO00357327\ExpressVPN Brute Checker By ACTEAM.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD567c53c8cf5faff4da38063cd7de832b3
SHA10df706d85d02f359752d8ef4ac3cef232f131264
SHA2563b39172bf247c3c298c9f7a675d11faafb5919e18ecab0a6e7a640332baf9f71
SHA5120fc77fa0c2a6fb8507dfb82e1ec5ae80d92e9492395b0b0283b8d9f46f14f464523732b0c35b19f262d40ee466344b5bef7efe737ea66a085575bf62e9abac2a
-
Filesize
1KB
MD5209dca7db9d69e5ee8e06af6d2e37c8f
SHA19bab15b00bf282c5a83960db7f74fe262804a322
SHA256064fd2938925512d0aa2b0b4e1eec6439bb7126ae5689060c43f19da13b756a8
SHA512c099287ea3c285463eff41f2fc79ec5d1e7e4769508321524647162bca643b8a6b0d2a6e16dee2a88974cba016a4b0a3173756f00cba8325f596f842e95a717b
-
Filesize
226KB
MD5a44575beebb1b1b4137f2c98e81c3207
SHA1771192f3b1be573ae54fad098b1ffed055b352e5
SHA256edd0c7c8fc5839792e878098dc5f171ee45b5fa726e50bf612213274f3aa3b21
SHA512d7d3b1d8b36f29a604063a5196c0d7e609db801030e21c69cb1d0a77ff798d99bbac48346a412146877f82c4536bf4cca5185da4bd92de93687346e7d3b8b309