Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2025, 17:13

General

  • Target

    2025-04-03_eaef5986a692fa510f7bc441dad5a58e_black-basta_cobalt-strike_floxif_luca-stealer_swisyn.exe

  • Size

    666KB

  • MD5

    eaef5986a692fa510f7bc441dad5a58e

  • SHA1

    3990c67fd8939f390537e3b211dd872a9976599d

  • SHA256

    33ca6aee42bacf329a112eb334fa98244815bf85f8559543730f1cf77241e4e3

  • SHA512

    b655b9d91f5dbf61da26c48e135b1116a81af40f2e8c9bf5a7616fdf0f68762207aed1c89312fe8ea3a088486dff3b247515defda86f4c07c2ac6f1ffb5967ec

  • SSDEEP

    12288:cFUNDa4FURDatkDOymC2+9Ddjm7uBjvrEH7cuBjvrEH7+y:cFOa4FYatkqiFdjm7IrEH7hrEH7+y

Malware Config

Signatures

  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Detects Floxif payload 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 34 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-03_eaef5986a692fa510f7bc441dad5a58e_black-basta_cobalt-strike_floxif_luca-stealer_swisyn.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-03_eaef5986a692fa510f7bc441dad5a58e_black-basta_cobalt-strike_floxif_luca-stealer_swisyn.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5056
    • \??\c:\users\admin\appdata\local\temp\2025-04-03_eaef5986a692fa510f7bc441dad5a58e_black-basta_cobalt-strike_floxif_luca-stealer_swisyn.exe 
      c:\users\admin\appdata\local\temp\2025-04-03_eaef5986a692fa510f7bc441dad5a58e_black-basta_cobalt-strike_floxif_luca-stealer_swisyn.exe 
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4524
      • \??\c:\users\admin\appdata\local\temp\2025-04-03_eaef5986a692fa510f7bc441dad5a58e_black-basta_cobalt-strike_floxif_luca-stealer_swisyn.exe 
        c:\users\admin\appdata\local\temp\2025-04-03_eaef5986a692fa510f7bc441dad5a58e_black-basta_cobalt-strike_floxif_luca-stealer_swisyn.exe 
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4440
      • C:\Windows\Resources\Themes\icsys.icn.exe
        C:\Windows\Resources\Themes\icsys.icn.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4448
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1288
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2652
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2260
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:376
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:1812
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:872
    • \??\c:\windows\resources\svchost.exe
      c:\windows\resources\svchost.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4616
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2832
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1112
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4580
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4768
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3720
    • \??\c:\windows\resources\svchost.exe
      c:\windows\resources\svchost.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1316
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4128
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4804
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1920
    • \??\c:\windows\resources\svchost.exe
      c:\windows\resources\svchost.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4788
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\themes\explorer.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2076
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4908
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c c:\windows\resources\svchost.exe RO
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1476
    • \??\c:\windows\resources\svchost.exe
      c:\windows\resources\svchost.exe RO
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\System\symsrv.dll

    Filesize

    67KB

    MD5

    7574cf2c64f35161ab1292e2f532aabf

    SHA1

    14ba3fa927a06224dfe587014299e834def4644f

    SHA256

    de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085

    SHA512

    4db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab

  • C:\Users\Admin\AppData\Local\Temp\2025-04-03_eaef5986a692fa510f7bc441dad5a58e_black-basta_cobalt-strike_floxif_luca-stealer_swisyn.exe 

    Filesize

    531KB

    MD5

    4c55a2b82bff2f97ce7761e8b4489da5

    SHA1

    06dfa204750aada606f483923ed2d2e127650b4a

    SHA256

    252bf15d608e93e2f8adf3ee2e666aa685804483d28a23bc099a25c81e3ae846

    SHA512

    023ae6090ca722b0af76f9800b4f54a9aa70f6af7247310e895a4328ec29a43f89bbc7d8de0fb89afe3635d0a36819f8c0bb109cc30f877668e852eb36cf7a34

  • C:\Users\Admin\AppData\Local\Temp\A1D26E2\5DFE10AC11AC.tmp

    Filesize

    454KB

    MD5

    a25de8a4e3e870ac9c473a8813eac770

    SHA1

    ec924af32ba60d45e325097306009c49de580edf

    SHA256

    8490465d86308025775aff3f2cc93bc96665f40c7bcca1479a03471bb875eec6

    SHA512

    a16d31ae767c05072e5354c172bc96129871743f6fc135c958b69d30821b18fffae3947aa6f2d718068afb66ab4ffd49246f81ba138380c4c1459f3a2f48b811

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    25fb3bfea68a3c7475f6faae12dfefc4

    SHA1

    dba30a14fcc16bce9110769f3f8dfdbb854322d5

    SHA256

    ba2f90e298c10e5f7a9852aa41c8ae04004606191701391c965186c84489b3c9

    SHA512

    3d13d8e57caecaad7261bdd07df675f7ba77a71f9eccd23629968746f259e80dd354873fffa9e7a47145c10c9e484bd5e4e350a27683573396be8d916c5124e9

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    d212b0e0e25b29f03a1fe2f566bb3e5a

    SHA1

    ad0e64d58941a1dcca5d364c5aae56bd5bae5f4f

    SHA256

    ee615756d2622c8034942d159cf3e9e0ef1159c3a9deee9863afe904f0d3eb5e

    SHA512

    64dfe524ecb649ab158707c99e38cdd0f3300967f985545c2fcfd022ebe9246a8c8e27a56f3c49214358c0a67e6a42c15d41750f1af28777cb5067c117d02e70

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    cee3477f8c1121c3862c7ccd00948819

    SHA1

    4e7c709d44b9f00fc7e1289ce31e2b2244b8fa90

    SHA256

    2a292d1f3d71f29c9d52a883e8a4338303ffc8ec6abb2fda3255696310faa900

    SHA512

    667aa39e369a8988f6c8c85713b6e271a3e18c709b558e00c6dfd684535e0327df08b8e4ca9674ed40f69eb75704b32d17c8c8a93ebdcea4b7eb3403f6f641e3

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    b920e009cd5adee79290ff662dbb6e52

    SHA1

    2167b25503059a2061ddd2ece3b9ddc5c64489cf

    SHA256

    9eace4aab0b79f6a1b42ad825973239986b2a8aa654d667c51a3159b4ba9f951

    SHA512

    65542e29dc9b8d55ff86fb51d568fb4360851265893c40c1636f837db5e0b7d376d49c9a43d6ef732307ec8e4a3905f3198b428f754dd4a659b0f1e58ed75509

  • memory/376-110-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1112-90-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1288-77-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1288-27-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1316-95-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1812-75-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2260-76-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2652-109-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4160-119-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4440-32-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/4440-45-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4440-46-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/4448-56-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4524-57-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4524-19-0x000000000040F000-0x0000000000412000-memory.dmp

    Filesize

    12KB

  • memory/4524-54-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/4524-14-0x0000000010000000-0x0000000010030000-memory.dmp

    Filesize

    192KB

  • memory/4524-8-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4616-86-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4768-98-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4788-108-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4804-107-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4908-120-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5056-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5056-78-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB