Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2025, 01:55 UTC

General

  • Target

    2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe

  • Size

    1.7MB

  • MD5

    7f3f836972830585056028bef169c382

  • SHA1

    584290384e4128fabfbf42a44c92433879a24b4f

  • SHA256

    796f465d992bf532c7162bdaa31ddd470681bcb0735dfc437c3fced829e9446f

  • SHA512

    76ae4d687433dfa77ec306d277abfc9c053a92483498320d5efc9033a1b924c7b9d66282c406dac9fb804cfe582d0b5b3e1d43160f454bc518a5e5a65f8e3b2e

  • SSDEEP

    49152:dry/+d9KLFmndATsW32TFw3/9htahlYv2H5WA9w1pI1YTST9lYwQTn8gsc+:dnLKLFmqTsW32Tg/9Qls2H5WA9wDlAPb

Malware Config

Signatures

  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Detects Floxif payload 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1608
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 1620
      2⤵
      • Program crash
      PID:3516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1608 -ip 1608
    1⤵
      PID:3880

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      97.17.167.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      97.17.167.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      13.153.16.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      13.153.16.2.in-addr.arpa
      IN PTR
      Response
      13.153.16.2.in-addr.arpa
      IN PTR
      a2-16-153-13deploystaticakamaitechnologiescom
    • flag-us
      DNS
      5isohu.com
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      Remote address:
      8.8.8.8:53
      Request
      5isohu.com
      IN A
      Response
    • flag-us
      DNS
      www.aieov.com
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      Remote address:
      8.8.8.8:53
      Request
      www.aieov.com
      IN A
      Response
      www.aieov.com
      IN A
      72.14.185.43
      www.aieov.com
      IN A
      45.33.18.44
      www.aieov.com
      IN A
      96.126.123.244
      www.aieov.com
      IN A
      45.79.19.196
      www.aieov.com
      IN A
      173.255.194.134
      www.aieov.com
      IN A
      45.33.20.235
      www.aieov.com
      IN A
      45.33.23.183
      www.aieov.com
      IN A
      45.33.30.197
      www.aieov.com
      IN A
      45.56.79.23
      www.aieov.com
      IN A
      72.14.178.174
      www.aieov.com
      IN A
      45.33.2.79
      www.aieov.com
      IN A
      198.58.118.167
    • flag-us
      GET
      http://www.aieov.com/logo.gif
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      Remote address:
      72.14.185.43:80
      Request
      GET /logo.gif HTTP/1.1
      Accept: */*
      Host: www.aieov.com
      Response
      HTTP/1.1 403 Forbidden
      server: openresty/1.13.6.1
      date: Tue, 28 Jan 2025 01:55:39 GMT
      content-type: text/html
      content-length: 175
      x-fail-reason: Bad Actor
      connection: close
    • flag-us
      DNS
      43.185.14.72.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      43.185.14.72.in-addr.arpa
      IN PTR
      Response
      43.185.14.72.in-addr.arpa
      IN PTR
      li51-43memberslinodecom
    • flag-us
      DNS
      73.31.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      73.31.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      188.77.23.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      188.77.23.2.in-addr.arpa
      IN PTR
      Response
      188.77.23.2.in-addr.arpa
      IN PTR
      a2-23-77-188deploystaticakamaitechnologiescom
    • flag-us
      DNS
      5isohu.com
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      Remote address:
      8.8.8.8:53
      Request
      5isohu.com
      IN A
      Response
    • flag-us
      GET
      http://www.aieov.com/logo.gif
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      Remote address:
      72.14.185.43:80
      Request
      GET /logo.gif HTTP/1.1
      Accept: */*
      Host: www.aieov.com
      Response
      HTTP/1.1 403 Forbidden
      server: openresty/1.13.6.1
      date: Tue, 28 Jan 2025 01:55:44 GMT
      content-type: text/html
      content-length: 175
      x-fail-reason: Bad Actor
      connection: close
    • flag-us
      GET
      http://www.aieov.com/logo.gif
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      Remote address:
      72.14.185.43:80
      Request
      GET /logo.gif HTTP/1.1
      Accept: */*
      Host: www.aieov.com
      Response
      HTTP/1.1 403 Forbidden
      server: openresty/1.13.6.1
      date: Tue, 28 Jan 2025 01:55:48 GMT
      content-type: text/html
      content-length: 175
      x-fail-reason: Bad Actor
      connection: close
    • flag-us
      DNS
      5isohu.com
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      Remote address:
      8.8.8.8:53
      Request
      5isohu.com
      IN A
      Response
    • flag-us
      DNS
      13.86.106.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      13.86.106.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      149.220.183.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      149.220.183.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      56.163.245.4.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      56.163.245.4.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      206.23.85.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      206.23.85.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      134.71.91.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      134.71.91.104.in-addr.arpa
      IN PTR
      Response
      134.71.91.104.in-addr.arpa
      IN PTR
      a104-91-71-134deploystaticakamaitechnologiescom
    • flag-us
      DNS
      11.153.16.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      11.153.16.2.in-addr.arpa
      IN PTR
      Response
      11.153.16.2.in-addr.arpa
      IN PTR
      a2-16-153-11deploystaticakamaitechnologiescom
    • flag-us
      DNS
      30.243.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      30.243.111.52.in-addr.arpa
      IN PTR
      Response
    • 72.14.185.43:80
      http://www.aieov.com/logo.gif
      http
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      336 B
      529 B
      6
      4

      HTTP Request

      GET http://www.aieov.com/logo.gif

      HTTP Response

      403
    • 72.14.185.43:80
      http://www.aieov.com/logo.gif
      http
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      336 B
      529 B
      6
      4

      HTTP Request

      GET http://www.aieov.com/logo.gif

      HTTP Response

      403
    • 72.14.185.43:80
      http://www.aieov.com/logo.gif
      http
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      336 B
      529 B
      6
      4

      HTTP Request

      GET http://www.aieov.com/logo.gif

      HTTP Response

      403
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      97.17.167.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      97.17.167.52.in-addr.arpa

    • 8.8.8.8:53
      13.153.16.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      13.153.16.2.in-addr.arpa

    • 8.8.8.8:53
      5isohu.com
      dns
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      56 B
      117 B
      1
      1

      DNS Request

      5isohu.com

    • 8.8.8.8:53
      www.aieov.com
      dns
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      59 B
      251 B
      1
      1

      DNS Request

      www.aieov.com

      DNS Response

      72.14.185.43
      45.33.18.44
      96.126.123.244
      45.79.19.196
      173.255.194.134
      45.33.20.235
      45.33.23.183
      45.33.30.197
      45.56.79.23
      72.14.178.174
      45.33.2.79
      198.58.118.167

    • 8.8.8.8:53
      43.185.14.72.in-addr.arpa
      dns
      71 B
      111 B
      1
      1

      DNS Request

      43.185.14.72.in-addr.arpa

    • 8.8.8.8:53
      73.31.126.40.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      73.31.126.40.in-addr.arpa

    • 8.8.8.8:53
      188.77.23.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      188.77.23.2.in-addr.arpa

    • 8.8.8.8:53
      5isohu.com
      dns
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      56 B
      117 B
      1
      1

      DNS Request

      5isohu.com

    • 8.8.8.8:53
      5isohu.com
      dns
      2025-01-28_7f3f836972830585056028bef169c382_floxif_mafia.exe
      56 B
      117 B
      1
      1

      DNS Request

      5isohu.com

    • 8.8.8.8:53
      13.86.106.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      13.86.106.20.in-addr.arpa

    • 8.8.8.8:53
      149.220.183.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      149.220.183.52.in-addr.arpa

    • 8.8.8.8:53
      56.163.245.4.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      56.163.245.4.in-addr.arpa

    • 8.8.8.8:53
      206.23.85.13.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      206.23.85.13.in-addr.arpa

    • 8.8.8.8:53
      134.71.91.104.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      134.71.91.104.in-addr.arpa

    • 8.8.8.8:53
      11.153.16.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      11.153.16.2.in-addr.arpa

    • 8.8.8.8:53
      30.243.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      30.243.111.52.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\System\symsrv.dll

      Filesize

      67KB

      MD5

      7574cf2c64f35161ab1292e2f532aabf

      SHA1

      14ba3fa927a06224dfe587014299e834def4644f

      SHA256

      de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

      SHA512

      4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

    • memory/1608-4-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/1608-6-0x0000000000391000-0x0000000000392000-memory.dmp

      Filesize

      4KB

    • memory/1608-7-0x0000000000390000-0x0000000000540000-memory.dmp

      Filesize

      1.7MB

    • memory/1608-15-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    • memory/1608-16-0x0000000000390000-0x0000000000540000-memory.dmp

      Filesize

      1.7MB

    • memory/1608-23-0x0000000000390000-0x0000000000540000-memory.dmp

      Filesize

      1.7MB

    • memory/1608-22-0x0000000010000000-0x0000000010030000-memory.dmp

      Filesize

      192KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.