Malware Analysis Report

2025-04-03 18:01

Sample ID 241109-s1fh4azmek
Target eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N
SHA256 eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327
Tags
floxif backdoor discovery trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327

Threat Level: Known bad

The file eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N was found to be: Known bad.

Malicious Activity Summary

floxif backdoor discovery trojan upx

Floxif, Floodfix

Floxif family

Detects Floxif payload

ACProtect 1.3x - 1.4x DLL software

Executes dropped EXE

Loads dropped DLL

Enumerates connected drives

UPX packed file

Drops file in Program Files directory

Drops file in Windows directory

System Location Discovery: System Language Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 15:35

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 15:35

Reported

2024-11-09 15:37

Platform

win7-20241010-en

Max time kernel

14s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe"

Signatures

Floxif family

floxif

Floxif, Floodfix

backdoor trojan floxif

Detects Floxif payload

backdoor
Description Indicator Process Target
N/A N/A N/A N/A

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\e: C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Common Files\System\symsrv.dll C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A
File created \??\c:\program files\common files\system\symsrv.dll.000 C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\setupapi.log \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A
File opened for modification \??\c:\windows\KB923423.log \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A
Token: SeRestorePrivilege N/A \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A
Token: SeRestorePrivilege N/A \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A
Token: SeRestorePrivilege N/A \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A
Token: SeRestorePrivilege N/A \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A
Token: SeRestorePrivilege N/A \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A
Token: SeRestorePrivilege N/A \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A
Token: SeRestorePrivilege N/A \??\c:\c8c6b46cebdfffe06e\update\update.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe

"C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe"

\??\c:\c8c6b46cebdfffe06e\update\update.exe

c:\c8c6b46cebdfffe06e\update\update.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 5isohu.com udp
US 8.8.8.8:53 www.aieov.com udp
US 45.56.79.23:80 www.aieov.com tcp

Files

\Program Files\Common Files\System\symsrv.dll

MD5 7574cf2c64f35161ab1292e2f532aabf
SHA1 14ba3fa927a06224dfe587014299e834def4644f
SHA256 de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA512 4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

memory/2280-3-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2280-5-0x0000000001003000-0x0000000001006000-memory.dmp

\c8c6b46cebdfffe06e\_sfx_.dll

MD5 ee207e35aea4d5df41d90221e1b66efa
SHA1 757469cf9ad2f21f267bbe730560114fdf8a89a5
SHA256 cf64c95e9a2d02967efc22b00efb3736156b913a95231eb63c1df45d43475e64
SHA512 43e9f75725daa4f3428b2d9cee2c2cc8b2f2e991b8e58d72d2f429fbdfb614c86d172f03d3f9da98756bd4e245643d9a57c6efa422d6c60ad364a2322245542d

\c8c6b46cebdfffe06e\update\update.exe

MD5 e265f4549a137e02dd049102ec73f8da
SHA1 9ef4c6208913b66670b19662845024b144511e55
SHA256 c870e6680683cefffb7f7ecad848ab956099095bdf8ae7a68055384407d8d6ee
SHA512 9f2da8efd2677a99e2484e6d2734bb320beceed8a482d95e99fea1fd21b52bc9818526ce4ed90dbc288b2da6ba2accf09af8bb75ed73fece89025727513f9ee4

\c8c6b46cebdfffe06e\update\updspapi.dll

MD5 50166a8cac712edf084573eb0de57a30
SHA1 424cd652fa5db27d789f17c9473448c1e96a38ec
SHA256 c78fb1c4310b660659c749a6f9e04b6a1aca80579d9120ddbff9a909369347a1
SHA512 b5d73d75102ebd420b2a0e640b6b3d44b0d67820ac3e2b1d4941f6bc5e8672e2a179dabe9fc189c605ca236665f1dbb94b033acb8fe25414a534bd3620bbeaf8

\c8c6b46cebdfffe06e\update\UPDSPAPI.dll.tmp

MD5 daa477b22e2c19a9cc11db2392827bc4
SHA1 be3bac2f074f4fad2f363fbf65ef52f9988e230a
SHA256 e47f9a541ffeed772639abbecf4a070ced7f0dcaf8cae54e368633227cc8430c
SHA512 cee274314ace10ed8110397446823f0528b52ea575357687d1b881482be1f0eff3b0e9c1d30dde7b008f0e7e78567e72442d1e46899f8045c63c487900427fed

memory/2280-59-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2280-60-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2744-61-0x0000000000400000-0x0000000000456000-memory.dmp

memory/2744-62-0x0000000000400000-0x0000000000456000-memory.dmp

memory/2280-65-0x0000000010000000-0x0000000010030000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 15:35

Reported

2024-11-09 15:37

Platform

win10v2004-20241007-en

Max time kernel

90s

Max time network

92s

Command Line

"C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe"

Signatures

Floxif family

floxif

Floxif, Floodfix

backdoor trojan floxif

Detects Floxif payload

backdoor
Description Indicator Process Target
N/A N/A N/A N/A

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A \??\c:\21ac5aecb396e72459d6\update\update.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\e: C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Common Files\System\symsrv.dll C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A
File created \??\c:\program files\common files\system\symsrv.dll.000 C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\setupapi.log \??\c:\21ac5aecb396e72459d6\update\update.exe N/A
File opened for modification \??\c:\windows\KB923423.log \??\c:\21ac5aecb396e72459d6\update\update.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language \??\c:\21ac5aecb396e72459d6\update\update.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe

"C:\Users\Admin\AppData\Local\Temp\eb5ec3b7d5e40e7e5ac48e35aa92e95c2cedde328d1363122c72e4b637764327N.exe"

\??\c:\21ac5aecb396e72459d6\update\update.exe

c:\21ac5aecb396e72459d6\update\update.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 5isohu.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 www.aieov.com udp
US 45.56.79.23:80 www.aieov.com tcp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 23.79.56.45.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 5isohu.com udp
US 45.56.79.23:80 www.aieov.com tcp
US 8.8.8.8:53 5isohu.com udp
US 45.56.79.23:80 www.aieov.com tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp

Files

C:\Program Files\Common Files\System\symsrv.dll

MD5 7574cf2c64f35161ab1292e2f532aabf
SHA1 14ba3fa927a06224dfe587014299e834def4644f
SHA256 de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA512 4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

memory/4216-4-0x0000000010000000-0x0000000010030000-memory.dmp

memory/4216-6-0x0000000001005000-0x0000000001006000-memory.dmp

C:\21ac5aecb396e72459d6\_sfx_.dll

MD5 ee207e35aea4d5df41d90221e1b66efa
SHA1 757469cf9ad2f21f267bbe730560114fdf8a89a5
SHA256 cf64c95e9a2d02967efc22b00efb3736156b913a95231eb63c1df45d43475e64
SHA512 43e9f75725daa4f3428b2d9cee2c2cc8b2f2e991b8e58d72d2f429fbdfb614c86d172f03d3f9da98756bd4e245643d9a57c6efa422d6c60ad364a2322245542d

C:\21ac5aecb396e72459d6\update\update.exe

MD5 e265f4549a137e02dd049102ec73f8da
SHA1 9ef4c6208913b66670b19662845024b144511e55
SHA256 c870e6680683cefffb7f7ecad848ab956099095bdf8ae7a68055384407d8d6ee
SHA512 9f2da8efd2677a99e2484e6d2734bb320beceed8a482d95e99fea1fd21b52bc9818526ce4ed90dbc288b2da6ba2accf09af8bb75ed73fece89025727513f9ee4

C:\21ac5aecb396e72459d6\update\updspapi.dll

MD5 50166a8cac712edf084573eb0de57a30
SHA1 424cd652fa5db27d789f17c9473448c1e96a38ec
SHA256 c78fb1c4310b660659c749a6f9e04b6a1aca80579d9120ddbff9a909369347a1
SHA512 b5d73d75102ebd420b2a0e640b6b3d44b0d67820ac3e2b1d4941f6bc5e8672e2a179dabe9fc189c605ca236665f1dbb94b033acb8fe25414a534bd3620bbeaf8

memory/2588-50-0x0000000000A30000-0x0000000000A86000-memory.dmp

C:\21ac5aecb396e72459d6\update\UPDSPAPI.dll.tmp

MD5 89130afce2de7da19fc8239d990baa01
SHA1 e340fa4ba5ac6e4de48a91d66505963370acb3e2
SHA256 62c881860f557fc61bcd2f274558ad41279640209968cdd305225455587e472a
SHA512 c74faa57e46c63b5776b90bc2a2a77e8ebd717ddac75d80031da13b162ad3df40246757363a57ca5f67e97f02ed0d336cd40af3a05c800b9699ce08c229004ce

memory/4216-64-0x0000000010000000-0x0000000010030000-memory.dmp

memory/2588-66-0x0000000000A30000-0x0000000000A86000-memory.dmp

memory/2588-69-0x0000000000A30000-0x0000000000A86000-memory.dmp

memory/4216-74-0x0000000010000000-0x0000000010030000-memory.dmp