Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 23:28

General

  • Target

    733858d5069ac7cc7f457c9987791d5b1825b85f5303e219b7364fe7547712ba.exe

  • Size

    294KB

  • MD5

    bc7fbed19f45347b8467c7253e411158

  • SHA1

    7739ef2b5f8dc5960bb10d8a5e1b2e8dd602c567

  • SHA256

    733858d5069ac7cc7f457c9987791d5b1825b85f5303e219b7364fe7547712ba

  • SHA512

    01ef175bdc01ba99c8b88f166d1721a790fb1043b2580f61b5c06c3127ea5d508fb126e8749342c87d178e2c2c49b06c2c8ed25eab622363566bf12af0515156

  • SSDEEP

    6144:ieSIs0j1vOFnYi7V8QUTmu/cnlLQBV+UdvrEFp7hK2Gpm:mRa1v+nY2VraaKBjvrEH7DG0

Malware Config

Signatures

  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Detects Floxif payload 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\733858d5069ac7cc7f457c9987791d5b1825b85f5303e219b7364fe7547712ba.exe
    "C:\Users\Admin\AppData\Local\Temp\733858d5069ac7cc7f457c9987791d5b1825b85f5303e219b7364fe7547712ba.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Common Files\System\symsrv.dll

    Filesize

    67KB

    MD5

    7574cf2c64f35161ab1292e2f532aabf

    SHA1

    14ba3fa927a06224dfe587014299e834def4644f

    SHA256

    de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

    SHA512

    4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

  • \Users\Admin\AppData\Local\Temp\nsjB952.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsjB952.tmp\UAC.dll

    Filesize

    13KB

    MD5

    bcec2a6095d38abc192a68d094c302d0

    SHA1

    9e88c5b957b45524690513b75d81dee259d5d599

    SHA256

    446000200eff4f9c20761ce1680902daba190c81a57154f4917b1741d7800e3c

    SHA512

    b48e85a17904a104eef573358763a0b1215eec96f72f83ff544d2dab22737bc42411ca505adf3f7e95c6f7e7997ad3e408f258093727105b678d5eee8d8e6278

  • \Users\Admin\AppData\Local\Temp\nsjB952.tmp\time.dll

    Filesize

    10KB

    MD5

    38977533750fe69979b2c2ac801f96e6

    SHA1

    74643c30cda909e649722ed0c7f267903558e92a

    SHA256

    b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35

    SHA512

    e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53

  • memory/2556-0-0x0000000000403000-0x0000000000404000-memory.dmp

    Filesize

    4KB

  • memory/2556-4-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/2556-6-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2556-49-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/2556-48-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB