Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe
Resource
win7-20240729-en
General
-
Target
af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe
-
Size
4.7MB
-
MD5
6d0391a5f2beda120b73c98cf742b513
-
SHA1
ac19d8f9eddb109b777d9315178f96246787e6fd
-
SHA256
af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c
-
SHA512
746b2be8dee14a4ecafd2c89c0a2aba79f5c87dd9e2ab70a22e532645f41be53b4acfd890c0783569b36839c6a6ac12d91a17ab6d7c498e74f0ab2f00540cf4d
-
SSDEEP
98304:YAgAJyfIt/NvRJOJu4OGt9XY9iY9GoBNmuJApVxHXhLYjbsDx99h:eAj6ROgJY9iY95Y5HxLYvsn9h
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000122cf-1.dat floxif -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b0000000122cf-1.dat acprotect -
Loads dropped DLL 11 IoCs
pid Process 1072 af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found 1260 Process not Found -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe -
resource yara_rule behavioral1/memory/1072-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/files/0x000b0000000122cf-1.dat upx behavioral1/memory/1072-13-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1072-36-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files\common files\system\symsrv.dll.000 af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe File created C:\Program Files\Common Files\System\symsrv.dll af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1072 af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1072 af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe"C:\Users\Admin\AppData\Local\Temp\af85fff922af49e25ff78c49fa5197a2a0e9305c32bfec7ac31e6237f1df130c.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
1.1MB
MD53d6ac1e398cdee76825bf1495d7ffc43
SHA1ad767244154ed542b70b8864a340a179627aa9a1
SHA2567d33e9386e46bbf5c2ead8164b3a3d92e58aeff283ce917b9e3a4859d8d8014e
SHA512b4c6a2fbf99160da5a19e32f743cc8d63c184d2b2fe30d8717a9e979aeaa428e2f86a15722f27c55d3b1ab3358729fd101b4d7813942a50430f268449c3b83e5
-
Filesize
388KB
MD5c64c2477c1d9f09df7615622d414e579
SHA1e1e1639a49f9bd425cbde1725f03600b733336eb
SHA256b9ac5de939078ffaa867c95651a897d68bade1f3690f596c538f3f0746ef1df6
SHA51279bcfe4f3328899aee18de8ea88f73a17eb30ec86602d27485f12db1087fe651aa5ed6f8491163054de08467606f830b048ac7617253f53c2df0e21d2274de41
-
Filesize
1.2MB
MD5b84dad86cc8126490634fe7ea6bd7718
SHA13c100853daac5a755eac67d66941ba7155218820
SHA2563b846d2c9f3ed4c1957c2e207541ca589c7e6862587ca9308bc2c0b2e41ffc6f
SHA512fff56066437e4989f5cf13b6e90dfff89479fbe75d016b21157c3e12e7f3e66bab6570acdc686cb7f14a63e37b53ec78482abbd92c50b94c231c7790e77c67c6
-
Filesize
641KB
MD52b5c46b60fa7c217eb368d7c7b274919
SHA19ea21699d98b7f7b1527c11d891dc76135aaee17
SHA256272066c297a8f6e31e68e64360dd18fe3a7cf2774700b2bea1f4d6d3c1970b1f
SHA5120974e161403c2d6365bac5e4ba26d843895205e098e3a5f4962669d7a11c4c1be38d7a4f5ff155b8db4506f151ee96b4763761df7057bae4a2864de7a5a6aa99