Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2024, 12:24

General

  • Target

    ftcracked/FTcrack29.12.24.exe

  • Size

    37KB

  • MD5

    87cfeda63611ab5fd13365448322336f

  • SHA1

    be0b2cf9d79deac19d507911762a662e2b1ee806

  • SHA256

    50c8280cae98b74c34c674348a119bad9c5f07e8ddb766f141056a9dcb0eaa57

  • SHA512

    40ddd3f87f3281bfbb459977177384be825b97786cb333db0108b8a0eb72aea14bb22794c84e5a2ca10fcc3b9f083085d7fd864a3751c81e2b8ae7831b4e8b89

  • SSDEEP

    384:IC617CiM33jBVbJsy8PJ8bAoxPPvfQaUh0ErAF+rMRTyN/0L+EcoinblneHQM3eJ:NNbJP8PJQAiHVUtrM+rMRa8NuIKt

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 5 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ftcracked\FTcrack29.12.24.exe
    "C:\Users\Admin\AppData\Local\Temp\ftcracked\FTcrack29.12.24.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\ProgramData\svhost.exe
      "C:\ProgramData\svhost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops autorun.inf file
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\ProgramData\svhost.exe" "svhost.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:1204

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\svhost.exe

          Filesize

          37KB

          MD5

          87cfeda63611ab5fd13365448322336f

          SHA1

          be0b2cf9d79deac19d507911762a662e2b1ee806

          SHA256

          50c8280cae98b74c34c674348a119bad9c5f07e8ddb766f141056a9dcb0eaa57

          SHA512

          40ddd3f87f3281bfbb459977177384be825b97786cb333db0108b8a0eb72aea14bb22794c84e5a2ca10fcc3b9f083085d7fd864a3751c81e2b8ae7831b4e8b89

        • C:\Users\Admin\Desktop\AssertCompare.cfg

          Filesize

          361KB

          MD5

          b1bcd87f2cd18e5ba3189de654505299

          SHA1

          ade8c3c1ba3dcfc0f6d5315e3df5be6522bbb802

          SHA256

          6bd0ed5259c15e4af08e855114489c31e04b7e1d5e4c098958ffd1ef18857224

          SHA512

          c96cee0cf2d6a6889db1442baaa3203ad1775da5358d8b7ba79092de809c6b37b892a9cdbf0442488209f378c802462bf30658ce4677183e314ab75437f07308

        • C:\Users\Admin\Desktop\PushReset.mpeg2

          Filesize

          799KB

          MD5

          184e87451428fa2b5c886bbd7fe41d9c

          SHA1

          74b2d414faf600733329972bf8cd5ee674f6e136

          SHA256

          bf6127f90d79fb187b91f17b78195b73b3e4a57b10f8770efcd0f3b6a3bd639a

          SHA512

          ed06ea1d075a3ff3db86c79987ed29957d62596e81a258418be7d016cd1ac6fd1c7d54a71fb1e453f5016aa9062d86073c8ce6d4c64734749a90faa4f2de44a7

        • memory/1500-0-0x0000000074C42000-0x0000000074C43000-memory.dmp

          Filesize

          4KB

        • memory/1500-1-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/1500-2-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/1500-13-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/1500-12-0x0000000074C42000-0x0000000074C43000-memory.dmp

          Filesize

          4KB

        • memory/2384-25-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2384-26-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2384-27-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2384-28-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2384-29-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2384-30-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2384-31-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2384-15-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2384-14-0x0000000074C40000-0x00000000751F1000-memory.dmp

          Filesize

          5.7MB