Overview
overview
7Static
static
3Tftpd64-4....up.exe
windows7-x64
7Tftpd64-4....up.exe
windows10-2004-x64
7EUPL-EN.pdf
windows7-x64
1EUPL-EN.pdf
windows10-2004-x64
1tftpd32.chm
windows7-x64
1tftpd32.chm
windows10-2004-x64
1tftpd64.exe
windows7-x64
1tftpd64.exe
windows10-2004-x64
1uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
131s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
Tftpd64-4.64-setup.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Tftpd64-4.64-setup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
EUPL-EN.pdf
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
EUPL-EN.pdf
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
tftpd32.chm
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
tftpd32.chm
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
tftpd64.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
tftpd64.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
uninstall.exe
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
uninstall.exe
Resource
win10v2004-20240508-en
General
-
Target
Tftpd64-4.64-setup.exe
-
Size
633KB
-
MD5
044cc568b52ce2e65eb82d3d3b7ffa2f
-
SHA1
e53df45b9994f7d02b48b0e002d5e06f00535bc6
-
SHA256
525a2eb43f2a4c702213723541335dc0391b42a01177e1faf5873e0cb7540ce0
-
SHA512
1ee71ba4ba71faf0f1bc4fc4b3f5292ffef6cfa19d08b169534260daaf2bf99960db364382039f45fb17e44295d9c2473a747779a21cb35375666c08af3ed4be
-
SSDEEP
12288:slKyxovP4Jw+ULNC0IVfG5IAeKPOFwTM84qpcy+qtv2tSoTqLQby4q:sMyavP4Jhg7IWWFA4qphN28o+LQe4q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Tftpd64.exepid process 2860 Tftpd64.exe -
Loads dropped DLL 9 IoCs
Processes:
Tftpd64-4.64-setup.exepid process 288 Tftpd64-4.64-setup.exe 288 Tftpd64-4.64-setup.exe 288 Tftpd64-4.64-setup.exe 288 Tftpd64-4.64-setup.exe 1168 1168 1168 1168 1168 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
Processes:
Tftpd64-4.64-setup.exedescription ioc process File created C:\Program Files\Tftpd64\tftpd32.ini Tftpd64-4.64-setup.exe File created C:\Program Files\Tftpd64\uninstall.exe Tftpd64-4.64-setup.exe File created C:\Program Files\Tftpd64\tftpd64.exe Tftpd64-4.64-setup.exe File created C:\Program Files\Tftpd64\tftpd32.chm Tftpd64-4.64-setup.exe File created C:\Program Files\Tftpd64\EUPL-EN.pdf Tftpd64-4.64-setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
Processes:
resource yara_rule \Program Files\Tftpd64\uninstall.exe nsis_installer_1 \Program Files\Tftpd64\uninstall.exe nsis_installer_2 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Tftpd64.exedescription pid process Token: 33 2860 Tftpd64.exe Token: SeIncBasePriorityPrivilege 2860 Tftpd64.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Tftpd64.exepid process 2860 Tftpd64.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
Tftpd64.exepid process 2860 Tftpd64.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Tftpd64-4.64-setup.exedescription pid process target process PID 288 wrote to memory of 2860 288 Tftpd64-4.64-setup.exe Tftpd64.exe PID 288 wrote to memory of 2860 288 Tftpd64-4.64-setup.exe Tftpd64.exe PID 288 wrote to memory of 2860 288 Tftpd64-4.64-setup.exe Tftpd64.exe PID 288 wrote to memory of 2860 288 Tftpd64-4.64-setup.exe Tftpd64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Tftpd64-4.64-setup.exe"C:\Users\Admin\AppData\Local\Temp\Tftpd64-4.64-setup.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Program Files\Tftpd64\Tftpd64.exe"C:\Program Files\Tftpd64\Tftpd64.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
616B
MD5c973075d00b0bf2d5c4cb18155ad92fb
SHA10b1d0a6c40da12b81e6bab942a6631f19e18f1fc
SHA2560c00cbdae4e3f2f430ca803e2e08bb3cbba4e83cf9024dbb64da212b8034e60d
SHA512b987aa69a90fc14d0c4e7ebcd7db6a3c9580f705ce6753104163017975b4e8a1f09c302123c83421943e33a591b509f8edc398a00fe4932132d32c169db34fc9
-
Filesize
383KB
MD53c1e3215acc69f06f044802ed4695333
SHA1ea34a6bad04bc5a1fcb494668347cd302557f327
SHA25634de53b43c32e3ed5231a57683103acad1aebeef08309cf8e770c27acc90e4e7
SHA51282ed2edbb7286aac00b946f7f4c79e59079994fe8385e961abd1291440fdf26e14c724943eaabebb517e921ece4b384b9d50905898d71f2efaa427be7082d2d0
-
Filesize
37KB
MD5078daf9669ef12a368f1aed5a21b1cd1
SHA1fc4d9a58d42089d6e7c42f45b92d87f978958dea
SHA2560a91e2fab1de979c8bd0816c5a709deb7bdb80a198c9163d58a5ce377607fb9d
SHA5127a18dcf41e30278cc1348c51ad904f9024dd431c48faa576484f8b189e53bccffade0a94563d0bf76fb07a0cbdc6033dec95ec8f1ad59c32518967b8d59df30d