Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 06:41
Static task
static1
Behavioral task
behavioral1
Sample
d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe
Resource
win10v2004-20241007-en
General
-
Target
d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe
-
Size
4.7MB
-
MD5
70c12d165447f87ff61df4e53a99664c
-
SHA1
28ac1a4b6bce3d701a225e18ac55a1453b1a4587
-
SHA256
d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78
-
SHA512
c4e121e9b6e7639eccb1c7d6a6c7678596a5b5f678bffd6e21e406970d2776d25ba02980bd4e3a58155b585c7cd58777410411ef7c8cce98d07caf3282c6066e
-
SSDEEP
98304:iS/AJyfIt/NvRJOJu4OGt9XY9iY9GoBNmuJApVxHXhLYjbsDx99C:tAj6ROgJY9iY95Y5HxLYvsn9C
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000120f9-1.dat floxif -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00080000000120f9-1.dat acprotect -
Loads dropped DLL 11 IoCs
pid Process 2168 d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe -
resource yara_rule behavioral1/memory/2168-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/files/0x00080000000120f9-1.dat upx behavioral1/memory/2168-13-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2168-36-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe File created \??\c:\program files\common files\system\symsrv.dll.000 d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2168 d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2168 d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe"C:\Users\Admin\AppData\Local\Temp\d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
1.1MB
MD53d6ac1e398cdee76825bf1495d7ffc43
SHA1ad767244154ed542b70b8864a340a179627aa9a1
SHA2567d33e9386e46bbf5c2ead8164b3a3d92e58aeff283ce917b9e3a4859d8d8014e
SHA512b4c6a2fbf99160da5a19e32f743cc8d63c184d2b2fe30d8717a9e979aeaa428e2f86a15722f27c55d3b1ab3358729fd101b4d7813942a50430f268449c3b83e5
-
Filesize
388KB
MD5c64c2477c1d9f09df7615622d414e579
SHA1e1e1639a49f9bd425cbde1725f03600b733336eb
SHA256b9ac5de939078ffaa867c95651a897d68bade1f3690f596c538f3f0746ef1df6
SHA51279bcfe4f3328899aee18de8ea88f73a17eb30ec86602d27485f12db1087fe651aa5ed6f8491163054de08467606f830b048ac7617253f53c2df0e21d2274de41
-
Filesize
1.2MB
MD5b84dad86cc8126490634fe7ea6bd7718
SHA13c100853daac5a755eac67d66941ba7155218820
SHA2563b846d2c9f3ed4c1957c2e207541ca589c7e6862587ca9308bc2c0b2e41ffc6f
SHA512fff56066437e4989f5cf13b6e90dfff89479fbe75d016b21157c3e12e7f3e66bab6570acdc686cb7f14a63e37b53ec78482abbd92c50b94c231c7790e77c67c6
-
Filesize
641KB
MD52b5c46b60fa7c217eb368d7c7b274919
SHA19ea21699d98b7f7b1527c11d891dc76135aaee17
SHA256272066c297a8f6e31e68e64360dd18fe3a7cf2774700b2bea1f4d6d3c1970b1f
SHA5120974e161403c2d6365bac5e4ba26d843895205e098e3a5f4962669d7a11c4c1be38d7a4f5ff155b8db4506f151ee96b4763761df7057bae4a2864de7a5a6aa99