Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2024, 14:14

General

  • Target

    67d367bc9ee39808f43c49bc10a824eb.exe

  • Size

    29KB

  • MD5

    67d367bc9ee39808f43c49bc10a824eb

  • SHA1

    e0f5722eb1f145a6faccd4186fcdb529b6373388

  • SHA256

    0dc1858d8a83eb6cd4fb768d330b3d5872315db5c4a8486983eb64093c3df314

  • SHA512

    b052b179d3a9fd5c7ff9366b9ae7f7e2391c9901299057677e593df20950ac02c107132ec986aeffef0322f0085e9af51dfcd2314dfec2c2ba5bfd2a23095a51

  • SSDEEP

    384:TG7qKuhKZUPX27xYiVY5XUIgNrMBz5aJGOHn1YynPCn+brkOM3kdKG:TGDuiVY5X4rMBz4GOHn1YyPCn+cZkcG

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.webzdarma.cz
  • Port:
    21
  • Username:
    00000004.webzdarma.cz
  • Password:
    44440000

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67d367bc9ee39808f43c49bc10a824eb.exe
    "C:\Users\Admin\AppData\Local\Temp\67d367bc9ee39808f43c49bc10a824eb.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\SysWOW64\ftp.exe
      ftp -v -i -s:C:\Windows\system32\tmp.~
      2⤵
        PID:2796
      • C:\Windows\SysWOW64\ftp.exe
        ftp -v -i -s:C:\Windows\system32\tmp.~
        2⤵
          PID:2928

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\tmp.~

              Filesize

              114B

              MD5

              d459fec952a489a266ceea10fd8f7328

              SHA1

              8401de317b9150f69a489946b29d8dcec0341b7d

              SHA256

              52a944237254944dcddb4d28e853866b896d2ebbfcbe43011a23de7b8f517586

              SHA512

              99786c1b3c9baf90813938e0d8fd49e334df1c0ac7f5def08ecd6079c7569100fcb6637d005aad19eaec9819edc68409b6a25949bf0d44a99d1c3ca171031775

            • C:\Windows\SysWOW64\tmp.~

              Filesize

              118B

              MD5

              996227809eae43e87dedf86046794437

              SHA1

              acdb28d948d34eed4d85089b622a95d44382bb06

              SHA256

              a819d367c9c9d66582afc3a51514c99a88bc0adebfd08cb8ae752b736590427d

              SHA512

              c8ba777dab80d23587e58187aec267cc7e717dded72927c0bfd594684facd868cb50547b560a3419d24c500b72b7377c0f74c16d90768a0fd81a739de48b8789

            • memory/1860-3-0x0000000000400000-0x0000000000405000-memory.dmp

              Filesize

              20KB