Analysis

  • max time kernel
    296s
  • max time network
    297s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-11-2024 14:08

General

  • Target

    ft.server.exe

  • Size

    37KB

  • MD5

    e481569ecba8befd9971a1644b1a6f0d

  • SHA1

    e22e7b39866702efd0772fa96511ff871ad50781

  • SHA256

    1275aa3de74112f8fd4aa2bd856fccb732cf337edadc3e92a7e11b732775f53e

  • SHA512

    6ca77b99afebca543006c3e7dab63a24059a4d5cc18cd6fd8d2fe1a9c864823a3789a90ce4e94d2d67523bbd9a006ab487b62f44a8bf3bd5d985a5a0744d4191

  • SSDEEP

    384:yINyQilEhHeTnMGiyMTp4vrijPMIvrAF+rMRTyN/0L+EcoinblneHQM3epzX/Nrj:1NHSMGxMTp4ubM+rM+rMRa8Nudrt

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 5 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ft.server.exe
    "C:\Users\Admin\AppData\Local\Temp\ft.server.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Windows\ft.exe
      "C:\Windows\ft.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops autorun.inf file
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Windows\ft.exe" "ft.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:3564
  • C:\Windows\system32\BackgroundTransferHost.exe
    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
    1⤵
    • Modifies registry class
    PID:3824
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
    1⤵
      PID:1956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\b413a8a8-9d81-4748-8468-bfd0500895fd.down_data

      Filesize

      555KB

      MD5

      5683c0028832cae4ef93ca39c8ac5029

      SHA1

      248755e4e1db552e0b6f8651b04ca6d1b31a86fb

      SHA256

      855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

      SHA512

      aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

    • C:\Windows\ft.exe

      Filesize

      37KB

      MD5

      e481569ecba8befd9971a1644b1a6f0d

      SHA1

      e22e7b39866702efd0772fa96511ff871ad50781

      SHA256

      1275aa3de74112f8fd4aa2bd856fccb732cf337edadc3e92a7e11b732775f53e

      SHA512

      6ca77b99afebca543006c3e7dab63a24059a4d5cc18cd6fd8d2fe1a9c864823a3789a90ce4e94d2d67523bbd9a006ab487b62f44a8bf3bd5d985a5a0744d4191

    • memory/2736-14-0x0000000074960000-0x0000000074F11000-memory.dmp

      Filesize

      5.7MB

    • memory/2736-13-0x0000000074960000-0x0000000074F11000-memory.dmp

      Filesize

      5.7MB

    • memory/2736-24-0x0000000074960000-0x0000000074F11000-memory.dmp

      Filesize

      5.7MB

    • memory/2736-25-0x0000000074960000-0x0000000074F11000-memory.dmp

      Filesize

      5.7MB

    • memory/2736-26-0x0000000074960000-0x0000000074F11000-memory.dmp

      Filesize

      5.7MB

    • memory/2736-27-0x0000000074960000-0x0000000074F11000-memory.dmp

      Filesize

      5.7MB

    • memory/2736-28-0x0000000074960000-0x0000000074F11000-memory.dmp

      Filesize

      5.7MB

    • memory/4428-2-0x0000000074960000-0x0000000074F11000-memory.dmp

      Filesize

      5.7MB

    • memory/4428-12-0x0000000074960000-0x0000000074F11000-memory.dmp

      Filesize

      5.7MB

    • memory/4428-0-0x0000000074961000-0x0000000074962000-memory.dmp

      Filesize

      4KB

    • memory/4428-1-0x0000000074960000-0x0000000074F11000-memory.dmp

      Filesize

      5.7MB