Analysis
-
max time kernel
147s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:36
Static task
static1
Behavioral task
behavioral1
Sample
a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe
Resource
win10v2004-20221111-en
General
-
Target
a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe
-
Size
5.0MB
-
MD5
8a5ff64f553c62c6536de7f7b6787bf6
-
SHA1
51d664c006f63f559e0bec33256c7fdf6d39964c
-
SHA256
a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af
-
SHA512
fa024feba3c76d640814068173479a7b9b77abaacfe8eb0939d796fe22ecbf84745f9dbb04f1508a96be36e78b4696945451db5f7d4e084deb04f64dcc7d6cad
-
SSDEEP
98304:Omp6wcCuEctakxM31CX2YcFXMEgniXKKP1zMj9ghi1RebMo89ub0bVzFgwtOOTa/:ncCuika88MiXKKP1zMjDo89ub0bVzFj2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
SFInstaller_SFFZ_filezilla_8979715_.exeSFInstaller_SFFZ_filezilla_8979715_.exepid process 1520 SFInstaller_SFFZ_filezilla_8979715_.exe 1828 SFInstaller_SFFZ_filezilla_8979715_.exe -
Loads dropped DLL 5 IoCs
Processes:
a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exeSFInstaller_SFFZ_filezilla_8979715_.exepid process 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe 1520 SFInstaller_SFFZ_filezilla_8979715_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
SFInstaller_SFFZ_filezilla_8979715_.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main SFInstaller_SFFZ_filezilla_8979715_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exeSFInstaller_SFFZ_filezilla_8979715_.exepid process 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe 1520 SFInstaller_SFFZ_filezilla_8979715_.exe 1520 SFInstaller_SFFZ_filezilla_8979715_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exeSFInstaller_SFFZ_filezilla_8979715_.exedescription pid process target process PID 1672 wrote to memory of 1520 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1672 wrote to memory of 1520 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1672 wrote to memory of 1520 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1672 wrote to memory of 1520 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1672 wrote to memory of 1520 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1672 wrote to memory of 1520 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1672 wrote to memory of 1520 1672 a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1520 wrote to memory of 1828 1520 SFInstaller_SFFZ_filezilla_8979715_.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1520 wrote to memory of 1828 1520 SFInstaller_SFFZ_filezilla_8979715_.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1520 wrote to memory of 1828 1520 SFInstaller_SFFZ_filezilla_8979715_.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1520 wrote to memory of 1828 1520 SFInstaller_SFFZ_filezilla_8979715_.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1520 wrote to memory of 1828 1520 SFInstaller_SFFZ_filezilla_8979715_.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1520 wrote to memory of 1828 1520 SFInstaller_SFFZ_filezilla_8979715_.exe SFInstaller_SFFZ_filezilla_8979715_.exe PID 1520 wrote to memory of 1828 1520 SFInstaller_SFFZ_filezilla_8979715_.exe SFInstaller_SFFZ_filezilla_8979715_.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe"C:\Users\Admin\AppData\Local\Temp\a8dbf148693abb92145364fb0fad994187e6232e085b34ac9b89094e6c1fb3af.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\00068C21\SFInstaller_SFFZ_filezilla_8979715_.exe"C:\Users\Admin\AppData\Local\Temp\00068C21\SFInstaller_SFFZ_filezilla_8979715_.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\00068C21\SFInstaller_SFFZ_filezilla_8979715_.exe"C:\Users\Admin\AppData\Local\Temp\00068C21\SFInstaller_SFFZ_filezilla_8979715_.exe" -se -ppd 15203⤵
- Executes dropped EXE
PID:1828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD57b6644aaa8fd80e78762e3519a46dfbf
SHA1aaa2470e8d17e2620679d4bd97ab966cc1ce3262
SHA2568d29ac224f4bd9a6671c037ffb1ae0265aaa41581e7bb6f168f301517a16e18a
SHA5125587750beb8a37f00cc9fc616cde4b8862c01275322248136e503c824cf73dd20d6b095e62cfee0272a7f672c54199ad0947bb3eec1012dc8e0ebb688529f372
-
Filesize
1.0MB
MD57b6644aaa8fd80e78762e3519a46dfbf
SHA1aaa2470e8d17e2620679d4bd97ab966cc1ce3262
SHA2568d29ac224f4bd9a6671c037ffb1ae0265aaa41581e7bb6f168f301517a16e18a
SHA5125587750beb8a37f00cc9fc616cde4b8862c01275322248136e503c824cf73dd20d6b095e62cfee0272a7f672c54199ad0947bb3eec1012dc8e0ebb688529f372
-
Filesize
1.0MB
MD57b6644aaa8fd80e78762e3519a46dfbf
SHA1aaa2470e8d17e2620679d4bd97ab966cc1ce3262
SHA2568d29ac224f4bd9a6671c037ffb1ae0265aaa41581e7bb6f168f301517a16e18a
SHA5125587750beb8a37f00cc9fc616cde4b8862c01275322248136e503c824cf73dd20d6b095e62cfee0272a7f672c54199ad0947bb3eec1012dc8e0ebb688529f372
-
Filesize
1.0MB
MD57b6644aaa8fd80e78762e3519a46dfbf
SHA1aaa2470e8d17e2620679d4bd97ab966cc1ce3262
SHA2568d29ac224f4bd9a6671c037ffb1ae0265aaa41581e7bb6f168f301517a16e18a
SHA5125587750beb8a37f00cc9fc616cde4b8862c01275322248136e503c824cf73dd20d6b095e62cfee0272a7f672c54199ad0947bb3eec1012dc8e0ebb688529f372
-
Filesize
1.0MB
MD57b6644aaa8fd80e78762e3519a46dfbf
SHA1aaa2470e8d17e2620679d4bd97ab966cc1ce3262
SHA2568d29ac224f4bd9a6671c037ffb1ae0265aaa41581e7bb6f168f301517a16e18a
SHA5125587750beb8a37f00cc9fc616cde4b8862c01275322248136e503c824cf73dd20d6b095e62cfee0272a7f672c54199ad0947bb3eec1012dc8e0ebb688529f372
-
Filesize
1.0MB
MD57b6644aaa8fd80e78762e3519a46dfbf
SHA1aaa2470e8d17e2620679d4bd97ab966cc1ce3262
SHA2568d29ac224f4bd9a6671c037ffb1ae0265aaa41581e7bb6f168f301517a16e18a
SHA5125587750beb8a37f00cc9fc616cde4b8862c01275322248136e503c824cf73dd20d6b095e62cfee0272a7f672c54199ad0947bb3eec1012dc8e0ebb688529f372
-
Filesize
1.0MB
MD57b6644aaa8fd80e78762e3519a46dfbf
SHA1aaa2470e8d17e2620679d4bd97ab966cc1ce3262
SHA2568d29ac224f4bd9a6671c037ffb1ae0265aaa41581e7bb6f168f301517a16e18a
SHA5125587750beb8a37f00cc9fc616cde4b8862c01275322248136e503c824cf73dd20d6b095e62cfee0272a7f672c54199ad0947bb3eec1012dc8e0ebb688529f372
-
Filesize
1.0MB
MD57b6644aaa8fd80e78762e3519a46dfbf
SHA1aaa2470e8d17e2620679d4bd97ab966cc1ce3262
SHA2568d29ac224f4bd9a6671c037ffb1ae0265aaa41581e7bb6f168f301517a16e18a
SHA5125587750beb8a37f00cc9fc616cde4b8862c01275322248136e503c824cf73dd20d6b095e62cfee0272a7f672c54199ad0947bb3eec1012dc8e0ebb688529f372