Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe
Resource
win7-20240903-en
General
-
Target
4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe
-
Size
609KB
-
MD5
7a76d6ba50879f3e9a29042505bd5c10
-
SHA1
0d7833ca0e6a4f64c0c5859412dce5b8f03c31e6
-
SHA256
4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391b
-
SHA512
b4159be3a5ab9471af10bfc7f360f48af1b87b5c4b57a191d1118848054dca168f7eccbc9a92587b2ec0c4a4d6078909426c9d9d498bec8714af78a79cfcbb65
-
SSDEEP
6144:gToUc9tn6SsrsrD3SdDwNxHoiv582zwTS+ZTBV+UdvrEFp7hKQi+SzyK:gTo9D6SJDEm9l0TBjvrEH7ti+Oj
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023c0e-2.dat floxif -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000a000000023c0e-2.dat acprotect -
Loads dropped DLL 8 IoCs
pid Process 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe -
resource yara_rule behavioral2/files/0x000a000000023c0e-2.dat upx behavioral2/memory/3840-4-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/3840-70-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe File created \??\c:\program files\common files\system\symsrv.dll.000 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3840 4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe"C:\Users\Admin\AppData\Local\Temp\4c885c9176dadd505eb5f5f7fda688e76149ce044bea3f614ce2164fc8a2391bN.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
13KB
MD5a88baad3461d2e9928a15753b1d93fd7
SHA1bb826e35264968bbc3b981d8430ac55df1e6d4a6
SHA256c5ab2926c268257122d0342739e73573d7eeda34c861bc7a68a02cbc69bd41af
SHA5125edcf46680716930da7fd1a41b8b0426f057cf4becefb3ee84798ec8b449726afb822fb626c4942036a1ae3bb937184d1f71d0e45075abb5bf167f5d833df43a
-
Filesize
29KB
MD52880bf3bbbc8dcaeb4367df8a30f01a8
SHA1cb5c65eae4ae923514a67c95ada2d33b0c3f2118
SHA256acb79c55b3b9c460d032a6f3aaf6c642bf8c1d450e23279d091cc0c6ca510973
SHA512ca978702ce7aa04f8d9781a819a57974f9627e969138e23e81e0792ff8356037c300bb27a37a9b5c756220a7788a583c8e40cc23125bcbe48849561b159c4fa3
-
Filesize
105KB
MD55b2519301e08883558f9ca13b5c7d6ed
SHA1f6f802cf8e0d5e392f96b5beb1bbd2e252da69d5
SHA25683637a099fec16e367b573f9d6cccc6fb4d714d94ed7452d96dc09ad1f98b8cf
SHA5123dc14cadde24fb39e3ba1d1ef22757b16cf9af999e22c11545021a3b86e92ff454c76dd9e48fe10dffd911d870c9b61245aee21364b08e1ec54ba5658f32d9a2