Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 02:33
Static task
static1
Behavioral task
behavioral1
Sample
7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe
Resource
win7-20240903-en
General
-
Target
7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe
-
Size
475KB
-
MD5
2536c715c5bce901c7b29310c08aab30
-
SHA1
52afd43b9666164f6f399ddf001e926aa8ea73ef
-
SHA256
7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485
-
SHA512
a7d30ccb73dbf00ef1f05b3b883dd20999d0d5e3e5b1d342c9fd7a4081d3ea92255239d5fb48f0867feae4f502d33152fec72d3fa86481730b7ded0da31152b9
-
SSDEEP
12288:mALUNDaj4ooooooooooooooooooooooooooooooooooooooooooooooooooooooJ:mmOajS0ofurEH7h
Malware Config
Signatures
-
Floxif family
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Detects Floxif payload 1 IoCs
resource yara_rule behavioral1/files/0x000a00000001202a-2.dat floxif -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a00000001202a-2.dat acprotect -
Executes dropped EXE 6 IoCs
pid Process 2400 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe 2072 icsys.icn.exe 2828 explorer.exe 2968 spoolsv.exe 2736 svchost.exe 2624 spoolsv.exe -
Loads dropped DLL 18 IoCs
pid Process 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2828 explorer.exe 2828 explorer.exe 2968 spoolsv.exe 2968 spoolsv.exe 2736 svchost.exe 2736 svchost.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe 592 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
resource yara_rule behavioral1/files/0x000a00000001202a-2.dat upx behavioral1/memory/2396-4-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2396-100-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2396-84-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 592 2400 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3060 schtasks.exe 2000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe 2736 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2828 explorer.exe 2736 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 2072 icsys.icn.exe 2072 icsys.icn.exe 2828 explorer.exe 2828 explorer.exe 2968 spoolsv.exe 2968 spoolsv.exe 2736 svchost.exe 2736 svchost.exe 2624 spoolsv.exe 2624 spoolsv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2400 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 30 PID 2396 wrote to memory of 2400 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 30 PID 2396 wrote to memory of 2400 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 30 PID 2396 wrote to memory of 2400 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 30 PID 2396 wrote to memory of 2072 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 31 PID 2396 wrote to memory of 2072 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 31 PID 2396 wrote to memory of 2072 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 31 PID 2396 wrote to memory of 2072 2396 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe 31 PID 2072 wrote to memory of 2828 2072 icsys.icn.exe 32 PID 2072 wrote to memory of 2828 2072 icsys.icn.exe 32 PID 2072 wrote to memory of 2828 2072 icsys.icn.exe 32 PID 2072 wrote to memory of 2828 2072 icsys.icn.exe 32 PID 2828 wrote to memory of 2968 2828 explorer.exe 33 PID 2828 wrote to memory of 2968 2828 explorer.exe 33 PID 2828 wrote to memory of 2968 2828 explorer.exe 33 PID 2828 wrote to memory of 2968 2828 explorer.exe 33 PID 2968 wrote to memory of 2736 2968 spoolsv.exe 34 PID 2968 wrote to memory of 2736 2968 spoolsv.exe 34 PID 2968 wrote to memory of 2736 2968 spoolsv.exe 34 PID 2968 wrote to memory of 2736 2968 spoolsv.exe 34 PID 2736 wrote to memory of 2624 2736 svchost.exe 35 PID 2736 wrote to memory of 2624 2736 svchost.exe 35 PID 2736 wrote to memory of 2624 2736 svchost.exe 35 PID 2736 wrote to memory of 2624 2736 svchost.exe 35 PID 2828 wrote to memory of 2352 2828 explorer.exe 36 PID 2828 wrote to memory of 2352 2828 explorer.exe 36 PID 2828 wrote to memory of 2352 2828 explorer.exe 36 PID 2828 wrote to memory of 2352 2828 explorer.exe 36 PID 2736 wrote to memory of 2000 2736 svchost.exe 37 PID 2736 wrote to memory of 2000 2736 svchost.exe 37 PID 2736 wrote to memory of 2000 2736 svchost.exe 37 PID 2736 wrote to memory of 2000 2736 svchost.exe 37 PID 2400 wrote to memory of 592 2400 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe 40 PID 2400 wrote to memory of 592 2400 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe 40 PID 2400 wrote to memory of 592 2400 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe 40 PID 2400 wrote to memory of 592 2400 7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe 40 PID 2736 wrote to memory of 3060 2736 svchost.exe 42 PID 2736 wrote to memory of 3060 2736 svchost.exe 42 PID 2736 wrote to memory of 3060 2736 svchost.exe 42 PID 2736 wrote to memory of 3060 2736 svchost.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe"C:\Users\Admin\AppData\Local\Temp\7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\users\admin\appdata\local\temp\7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exec:\users\admin\appdata\local\temp\7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 7083⤵
- Loads dropped DLL
- Program crash
PID:592
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:35 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:36 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3060
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2352
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD5a0dd184179ec74029ecf6a55c784259b
SHA167223ffc79c6fdcf1a6c255bc1d58d36d5d062a9
SHA256dcecdd76f4378ee43bfe9fc36d143a3b3d664cf82c5706fe3a95e63c7b48f267
SHA5123a651eae21169b9e79fda685ab6c1b0f4934a76ba5de1179c9af2670c8b60947d5430764df323271afbeec45bf9919bf9e9fcb25a70c7b3c77208dd8551a1849
-
Filesize
215KB
MD5d0dbefb40d7b07c657b7b374fa4c3e90
SHA16d8ef98f3a95a88d08306c5a628450c1242988d9
SHA25688bf593e36d8a815d1d20f384f3bab1bf4cf04dd09918156786b084e1daab929
SHA51222fbb15245d8f9b5674afa2d981c6e70041552126d8152c3890794066156106c969560404151c4cbe0ce022bb99247b5a6429aed8d0a7c13cc2938115756942d
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
\Users\Admin\AppData\Local\Temp\7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe
Filesize183KB
MD50e4c1931b02936d86ff533634834acec
SHA18d89f276b37c124c3e8cab2d6dd87ad3506ccee0
SHA2563a58e84183e9c254abffad46823fc8894f81d0a53fc435c3dfa47109a8cc8bee
SHA51299b1a251ac4ea1249760898ca492cb29996e75043c4d9b0f26e1f79c2dd2c3f7f0673732bcf635bee818cf667daf94b0a8b02894bb7c77f0718c405a953c581d
-
Filesize
215KB
MD5e25340cbc107a82d0b665b0356e7855c
SHA1ea7db08b5d97fd2d25ee2563542159bc411b23d5
SHA256e9c923ab011bae8e429809e3868cd6e6f412423711fdf2980ecd1c3fce208e6e
SHA512e0582d9ef2fda2cdfcc521e2ebb1cb1c62d89b1bd8f4411b8ddfbb8691c28686e2987786fcd2aa82e36b0889604909a2adc47ae3f0a751c00640d860883519d1
-
Filesize
215KB
MD5204d5fbec64100e8a34eb2a01e2a69e7
SHA163e489cdae2147aec391e3e9711acf0d7b60725d
SHA256a1b9b5fe03e616d45cb74930e59dc450f059ba62b4d201b894d26e37301ffa73
SHA5127bcc7218b3d401943fa7e35d507056feed801521cda149b4198a0410b9fe436f1dafe7b38fa260d32d1135d62436bf52703612708e226f0f6f96872b9cc9187c