Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 02:33

General

  • Target

    7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe

  • Size

    475KB

  • MD5

    2536c715c5bce901c7b29310c08aab30

  • SHA1

    52afd43b9666164f6f399ddf001e926aa8ea73ef

  • SHA256

    7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485

  • SHA512

    a7d30ccb73dbf00ef1f05b3b883dd20999d0d5e3e5b1d342c9fd7a4081d3ea92255239d5fb48f0867feae4f502d33152fec72d3fa86481730b7ded0da31152b9

  • SSDEEP

    12288:mALUNDaj4ooooooooooooooooooooooooooooooooooooooooooooooooooooooJ:mmOajS0ofurEH7h

Malware Config

Signatures

  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Detects Floxif payload 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe
    "C:\Users\Admin\AppData\Local\Temp\7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2396
    • \??\c:\users\admin\appdata\local\temp\7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe 
      c:\users\admin\appdata\local\temp\7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe 
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 708
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:592
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2072
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2828
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2968
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2736
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2624
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:35 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2000
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:36 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:3060
        • C:\Windows\Explorer.exe
          C:\Windows\Explorer.exe
          4⤵
            PID:2352

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\Themes\explorer.exe

      Filesize

      215KB

      MD5

      a0dd184179ec74029ecf6a55c784259b

      SHA1

      67223ffc79c6fdcf1a6c255bc1d58d36d5d062a9

      SHA256

      dcecdd76f4378ee43bfe9fc36d143a3b3d664cf82c5706fe3a95e63c7b48f267

      SHA512

      3a651eae21169b9e79fda685ab6c1b0f4934a76ba5de1179c9af2670c8b60947d5430764df323271afbeec45bf9919bf9e9fcb25a70c7b3c77208dd8551a1849

    • C:\Windows\Resources\Themes\icsys.icn.exe

      Filesize

      215KB

      MD5

      d0dbefb40d7b07c657b7b374fa4c3e90

      SHA1

      6d8ef98f3a95a88d08306c5a628450c1242988d9

      SHA256

      88bf593e36d8a815d1d20f384f3bab1bf4cf04dd09918156786b084e1daab929

      SHA512

      22fbb15245d8f9b5674afa2d981c6e70041552126d8152c3890794066156106c969560404151c4cbe0ce022bb99247b5a6429aed8d0a7c13cc2938115756942d

    • \Program Files\Common Files\System\symsrv.dll

      Filesize

      67KB

      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • \Users\Admin\AppData\Local\Temp\7cb7d107f4d0e6a3fd73c406f8cb7e1bb6c5ac57d74c0f874a3e960a93936485n.exe 

      Filesize

      183KB

      MD5

      0e4c1931b02936d86ff533634834acec

      SHA1

      8d89f276b37c124c3e8cab2d6dd87ad3506ccee0

      SHA256

      3a58e84183e9c254abffad46823fc8894f81d0a53fc435c3dfa47109a8cc8bee

      SHA512

      99b1a251ac4ea1249760898ca492cb29996e75043c4d9b0f26e1f79c2dd2c3f7f0673732bcf635bee818cf667daf94b0a8b02894bb7c77f0718c405a953c581d

    • \Windows\Resources\spoolsv.exe

      Filesize

      215KB

      MD5

      e25340cbc107a82d0b665b0356e7855c

      SHA1

      ea7db08b5d97fd2d25ee2563542159bc411b23d5

      SHA256

      e9c923ab011bae8e429809e3868cd6e6f412423711fdf2980ecd1c3fce208e6e

      SHA512

      e0582d9ef2fda2cdfcc521e2ebb1cb1c62d89b1bd8f4411b8ddfbb8691c28686e2987786fcd2aa82e36b0889604909a2adc47ae3f0a751c00640d860883519d1

    • \Windows\Resources\svchost.exe

      Filesize

      215KB

      MD5

      204d5fbec64100e8a34eb2a01e2a69e7

      SHA1

      63e489cdae2147aec391e3e9711acf0d7b60725d

      SHA256

      a1b9b5fe03e616d45cb74930e59dc450f059ba62b4d201b894d26e37301ffa73

      SHA512

      7bcc7218b3d401943fa7e35d507056feed801521cda149b4198a0410b9fe436f1dafe7b38fa260d32d1135d62436bf52703612708e226f0f6f96872b9cc9187c

    • memory/2072-37-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2072-97-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2396-84-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/2396-99-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2396-32-0x0000000000440000-0x0000000000471000-memory.dmp

      Filesize

      196KB

    • memory/2396-0-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2396-4-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/2396-100-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/2396-101-0x000000000040A000-0x000000000040D000-memory.dmp

      Filesize

      12KB

    • memory/2400-79-0x0000000074020000-0x000000007470E000-memory.dmp

      Filesize

      6.9MB

    • memory/2400-86-0x000000007402E000-0x000000007402F000-memory.dmp

      Filesize

      4KB

    • memory/2400-107-0x0000000074020000-0x000000007470E000-memory.dmp

      Filesize

      6.9MB

    • memory/2400-22-0x000000007402E000-0x000000007402F000-memory.dmp

      Filesize

      4KB

    • memory/2400-23-0x0000000001320000-0x0000000001354000-memory.dmp

      Filesize

      208KB

    • memory/2400-30-0x0000000074020000-0x000000007470E000-memory.dmp

      Filesize

      6.9MB

    • memory/2624-95-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2736-93-0x00000000024B0000-0x00000000024E1000-memory.dmp

      Filesize

      196KB

    • memory/2736-81-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2736-110-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2736-111-0x00000000024B0000-0x00000000024E1000-memory.dmp

      Filesize

      196KB

    • memory/2828-47-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2828-56-0x00000000003C0000-0x00000000003F1000-memory.dmp

      Filesize

      196KB

    • memory/2828-108-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB

    • memory/2828-109-0x00000000003C0000-0x00000000003F1000-memory.dmp

      Filesize

      196KB

    • memory/2968-80-0x0000000001E70000-0x0000000001EA1000-memory.dmp

      Filesize

      196KB

    • memory/2968-96-0x0000000000400000-0x0000000000431000-memory.dmp

      Filesize

      196KB