Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
022ce338093b066916440ca89bc619d13d104402ddbad665e19cb67d10ec2287.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
022ce338093b066916440ca89bc619d13d104402ddbad665e19cb67d10ec2287.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ftkyt.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ftkyt.exe
Resource
win10v2004-20241007-en
General
-
Target
022ce338093b066916440ca89bc619d13d104402ddbad665e19cb67d10ec2287.exe
-
Size
356KB
-
MD5
c852d6edda8423d9307f0cb5ea10f750
-
SHA1
a32331f7134fd005c57bb3d7b5d8ed4e9203bde3
-
SHA256
022ce338093b066916440ca89bc619d13d104402ddbad665e19cb67d10ec2287
-
SHA512
64aac84710e53d052490d8e1b703670e0bfc9d52d41a1742871ffe15ed327709bd135f3b7033bfa90a05dd6c67a1cb09785bc9bf86104319e795393988e3e08f
-
SSDEEP
6144:jNeZnTKu1gRtv6cWG3Gy+crqhf8+M6JCoo2FC04rIZ6AxKRPLZ:jNHv6cx3G/Th0+M68oo2F4cgAQNZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3012 ftkyt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 022ce338093b066916440ca89bc619d13d104402ddbad665e19cb67d10ec2287.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftkyt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3012 1808 022ce338093b066916440ca89bc619d13d104402ddbad665e19cb67d10ec2287.exe 83 PID 1808 wrote to memory of 3012 1808 022ce338093b066916440ca89bc619d13d104402ddbad665e19cb67d10ec2287.exe 83 PID 1808 wrote to memory of 3012 1808 022ce338093b066916440ca89bc619d13d104402ddbad665e19cb67d10ec2287.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\022ce338093b066916440ca89bc619d13d104402ddbad665e19cb67d10ec2287.exe"C:\Users\Admin\AppData\Local\Temp\022ce338093b066916440ca89bc619d13d104402ddbad665e19cb67d10ec2287.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\ftkyt.exe"C:\Users\Admin\AppData\Local\Temp\ftkyt.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5181fac370d823037dcad0d6bcc2cb09b
SHA168f0ace3d28f067310cccf6bfe4295aefea80e10
SHA2561468812bd2ef069b5a184371088ecec787d572cc5439841e40f2185f293beaa7
SHA5126c73580f591a6b966ae57a8757aa0249cdcf37b8250d2a979bb391a7c8fea460346f8fd1badea2a4d240c46907fe2246dfc019abc72ee5c9afe73fa3388230b5
-
Filesize
4KB
MD548ae303bf68446b03e09e96f84211ed9
SHA1250be154f31b6be74ad1eba0d11e80c43e049399
SHA2566769463ac3d4ef7d1ad744d3f06646da5f2e74671f5ab6445974d22a67fdcb1e
SHA512d9d2e8ba3b04b93ff46d859860aa9e3e64f6b76e2117d70fde62e162ae417d0cf0cb7acc27f90ee53f6a1e3852a82024cca9bfcc908539dad0856d62d986775f
-
Filesize
185KB
MD5ebd0f8ea2aee68a7af01b6766ae5b588
SHA16e8dd58bf9b663fdc93c40c641a9de0a112b3d02
SHA256d96a0a7695ed89d2db092a38744f2474cea07d377580245f5d247ab00bfb9080
SHA51267d66214bab5fef939d4ce83ec777c5fb15f4125d6882bc535f4dbd390bcf7b2191675c9319fb3ec23147d58d7824cb247bed8056caf5c9e9a11b9b38eaa63bd