Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2024, 01:33 UTC

General

  • Target

    9dbf8090bef3225eb8839530793bc595441e4b4c9ef6944756cbb19a375e2948N.exe

  • Size

    2.5MB

  • MD5

    c3bd4545eb50e05ec43597e749e6f940

  • SHA1

    65621231d4289ca3125d6113abab660dabf1e7dd

  • SHA256

    9dbf8090bef3225eb8839530793bc595441e4b4c9ef6944756cbb19a375e2948

  • SHA512

    a7f369b807ec51393f6ffe36ca1dea330c846798e12100b9b77ebefe75c3d680bc4d16774e26ae45ae8c9f702fe5fe21d3d43e66ca80cf07ba7aaa6789e2daa0

  • SSDEEP

    49152:FB1S7nZzOH8s343A/aT9C0DZonjpy5aoSKrBda7xJ1qX:6Ocs34Q/WyuBda7xJUX

Malware Config

Signatures

  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Detects Floxif payload 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • Network Service Discovery 1 TTPs 3 IoCs

    Attempt to gather information on host's network.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9dbf8090bef3225eb8839530793bc595441e4b4c9ef6944756cbb19a375e2948N.exe
    "C:\Users\Admin\AppData\Local\Temp\9dbf8090bef3225eb8839530793bc595441e4b4c9ef6944756cbb19a375e2948N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\arp.exe
      arp -a
      2⤵
      • Network Service Discovery
      • System Location Discovery: System Language Discovery
      PID:2104
    • C:\Windows\SysWOW64\arp.exe
      arp -s 10.127.0.1 6e-1a-08-43-d9-db
      2⤵
      • Network Service Discovery
      • System Location Discovery: System Language Discovery
      PID:2368
    • C:\Windows\SysWOW64\arp.exe
      arp -s 10.127.255.255 47-4b-be-33-f6-c5
      2⤵
      • Network Service Discovery
      PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Common Files\System\symsrv.dll

    Filesize

    71KB

    MD5

    4fcd7574537cebec8e75b4e646996643

    SHA1

    efa59bb9050fb656b90d5d40c942fb2a304f2a8b

    SHA256

    8ea3b17e4b783ffc0bc387b81b823bf87af0d57da74541d88ba85314bb232a5d

    SHA512

    7f1a7ef64d332a735db82506b47d84853af870785066d29ccaf4fdeab114079a9f0db400e01ba574776a0d652a248658fe1e8f9659cdced19ad6eea09644ea3e

  • memory/2696-3-0x0000000010000000-0x0000000010033000-memory.dmp

    Filesize

    204KB

  • memory/2696-5-0x0000000010000000-0x0000000010033000-memory.dmp

    Filesize

    204KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.