Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 08:11

General

  • Target

    Original.exe

  • Size

    233KB

  • MD5

    008efd16250ac6f61a05be151092ef2b

  • SHA1

    dade2a89ae3f5cd19ac22b5a2e980a88d9322fcf

  • SHA256

    5da3e0fc6992caaa5b86ce3f0aebf1777e0864ce21883e4607907ac96465b14d

  • SHA512

    1eccf3e082e4a3f2d4cc3cbcbbef22fc67a5a0a2cddd150cd457d36cb0e1d583adb247f26b98f0d45a68db3d85f13504a69d3a73546297e91c11a038cfb9ef17

  • SSDEEP

    6144:wxwfFcVuW5HYWLV/HUBV+UdvrEFp7hKtM:4wf6VuW5H/5/0BjvrEH7l

Malware Config

Signatures

  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Detects Floxif payload 1 IoCs
  • Downloads MZ/PE file
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Original.exe
    "C:\Users\Admin\AppData\Local\Temp\Original.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Local\Temp\pvpxFDoALCAykMp.exe
      "C:\Users\Admin\AppData\Local\Temp\pvpxFDoALCAykMp.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4908
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\HWID.txt
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:1904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\HWID.txt

    Filesize

    271B

    MD5

    b7ea41bbd62720b32663dd3bcd60af0b

    SHA1

    99b1337a9cbb91bdde95b7bda392483986f33ae7

    SHA256

    47301da6b71f73cec8c81e3a2c19a98e94e5db78c5a4e256a7fecd672e1a868a

    SHA512

    8f551c5bbdc58c6133757babddc66c3700c4a8a7da6be9bb35213a258424d205846fe713b0d58a071d7a14b015c21abc2b3b90a586a2a7d9fc70683445f5d952

  • C:\Program Files\Common Files\System\symsrv.dll

    Filesize

    67KB

    MD5

    7574cf2c64f35161ab1292e2f532aabf

    SHA1

    14ba3fa927a06224dfe587014299e834def4644f

    SHA256

    de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

    SHA512

    4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

  • C:\Windows\System\a1.mentah

    Filesize

    191KB

    MD5

    81c43a6d715840acd8d61327deecdd47

    SHA1

    213cd995f6c830647bfe683d5afb120cdc44706c

    SHA256

    ca3e2855001a3859752900c413f699b89a97c1f0f9492c9e7e874a62bce4513f

    SHA512

    55a8c765d5c5f0b3fee5ad5f756576b88c6869e026f49931b82d2ca0ffe5d257794ecc0c6bc518f973be229257201f6197c3dca773815a2819303736690b9fce

  • memory/2884-4-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/2884-6-0x00000000006A1000-0x00000000006A2000-memory.dmp

    Filesize

    4KB

  • memory/2884-37-0x00000000006A0000-0x00000000006CD000-memory.dmp

    Filesize

    180KB

  • memory/2884-39-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB