Analysis
-
max time kernel
140s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
freshftp1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
freshftp1.exe
Resource
win10v2004-20240802-en
General
-
Target
freshftp1.exe
-
Size
847KB
-
MD5
4d3a067fe762ba4eaa25e4978afd5bfb
-
SHA1
6aa9599fd4d69db9ee686c255a0a6684fd8d34d2
-
SHA256
5da3501f92ef2c87a00a191b5ff90fdfd72d9a6920cea1a7f232df679f2dc159
-
SHA512
5aa925bdc8bb3598d5a7a49feb0ffb5286a9119d814472dce1c00de1c0c8cbb5b82a5cf9f09862c3f870af6572f3b931b313f652f0a8a8def16506dee6443266
-
SSDEEP
24576:7I39dsK33405THAF6zg+3N739f4SJnVJBibyFV/uN4vo+XUP:76dsK334/FkgADnVzpukX4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4084 is-RP9GM.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language freshftp1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-RP9GM.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 756 wrote to memory of 4084 756 freshftp1.exe 83 PID 756 wrote to memory of 4084 756 freshftp1.exe 83 PID 756 wrote to memory of 4084 756 freshftp1.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\freshftp1.exe"C:\Users\Admin\AppData\Local\Temp\freshftp1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\is-058G3.tmp\is-RP9GM.tmp"C:\Users\Admin\AppData\Local\Temp\is-058G3.tmp\is-RP9GM.tmp" /SL4 $70116 "C:\Users\Admin\AppData\Local\Temp\freshftp1.exe" 617011 522242⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
643KB
MD5036ef63e2f9b138a42d6adb54ec0cd1e
SHA1353db5d438205a726a6d54beb62f9c62638f501d
SHA25671b487f0523f213004766402b22bf86fa0ef9891e940d2a4cb12eba6627e7cc6
SHA51231b8f6e76c8c4f5323f12384c41f6f2b04e58545c121da71e2a4da947a9c0aea9eb05df4f8199cc6dc89bc238577c4e2d5fb4b66e77e1130bc72b6c38f207cc9