Loading ...

Play interactive tourEdit tour

Analysis Report https://bitbucket.org/phjounin/tftpd64/downloads/Tftpd64-4.64-setup.exe

Overview

General Information

Sample URL:https://bitbucket.org/phjounin/tftpd64/downloads/Tftpd64-4.64-setup.exe
Analysis ID:401517
Infos:

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Stores files to the Windows start menu directory

Classification

Startup

  • System is w10x64
  • cmd.exe (PID: 6392 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://bitbucket.org/phjounin/tftpd64/downloads/Tftpd64-4.64-setup.exe' > cmdline.out 2>&1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 6408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • wget.exe (PID: 6440 cmdline: wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://bitbucket.org/phjounin/tftpd64/downloads/Tftpd64-4.64-setup.exe' MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • Tftpd64-4.64-setup.exe (PID: 7140 cmdline: 'C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exe' MD5: 044CC568B52CE2E65EB82D3D3B7FFA2F)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Program Files\Tftpd64\tftpd64.exeVirustotal: Detection: 8%Perma Link
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64Jump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64\tftpd64.exeJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64\tftpd32.chmJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64\EUPL-EN.pdfJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64\tftpd32.iniJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64\uninstall.exeJump to behavior
Source: unknownHTTPS traffic detected: 104.192.141.1:443 -> 192.168.2.6:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.217.128.89:443 -> 192.168.2.6:49713 version: TLS 1.2
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_00405EC2 FindFirstFileA,FindClose,5_2_00405EC2
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_00402671 FindFirstFileA,5_2_00402671
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_004054EC DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,5_2_004054EC
Source: unknownDNS traffic detected: queries for: bitbucket.org
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertBaltimoreCA-2G2.crt
Source: wget.exe, 00000002.00000002.339741494.00000000012B9000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertBaltimoreCA-2G2.crt0
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertBaltimoreCA-2G2.crtna
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2ExtendedValidationServerCA.crt
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2ExtendedValidationServerCA.crt0
Source: wget.exe, 00000002.00000002.339702945.000000000126C000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl
Source: wget.exe, 00000002.00000002.339702945.000000000126C000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertBaltimoreCA-2G2.crl
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertBaltimoreCA-2G2.crl0:
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertBaltimoreCA-2G2.crlqg
Source: wget.exe, 00000002.00000002.339702945.000000000126C000.00000004.00000001.sdmp, wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl
Source: wget.exe, 00000002.00000002.339741494.00000000012B9000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
Source: wget.exe, 00000002.00000002.339702945.000000000126C000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-ev-server-g2.crl
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-ev-server-g2.crl04
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertBaltimoreCA-2G2.crl
Source: wget.exe, 00000002.00000002.339741494.00000000012B9000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertBaltimoreCA-2G2.crl0K
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl
Source: wget.exe, 00000002.00000003.336855620.000000000129F000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: wget.exe, 00000002.00000002.339702945.000000000126C000.00000004.00000001.sdmp, wget.exe, 00000002.00000003.336864547.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-ev-server-g2.crl
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-ev-server-g2.crl0K
Source: Tftpd64-4.64-setup.exe, Tftpd64-4.64-setup.exe, 00000005.00000000.343792672.0000000000409000.00000008.00020000.sdmp, uninstall.exe.5.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: Tftpd64-4.64-setup.exe, 00000005.00000000.343792672.0000000000409000.00000008.00020000.sdmp, uninstall.exe.5.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: wget.exe, 00000002.00000002.339702945.000000000126C000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com
Source: wget.exe, 00000002.00000002.339741494.00000000012B9000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: wget.exe, 00000002.00000003.336855620.000000000129F000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0K
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0R
Source: wget.exe, 00000002.00000002.339702945.000000000126C000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.comy
Source: tftpd64.exe.5.drString found in binary or memory: http://tftpd32.jounin.net
Source: wget.exe, 00000002.00000002.339741494.00000000012B9000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: wget.exe, 00000002.00000003.336855620.000000000129F000.00000004.00000001.sdmp, wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: https://aui-cdn.atlassian.com
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: https://bbuseruploads.s3.amazonaws.com/0d2c3bf4-a97c-40b5-b347-2c7c47f5335d/downloads/17389c4c-2e
Source: cmdline.out.2.drString found in binary or memory: https://bbuseruploads.s3.amazonaws.com/0d2c3bf4-a97c-40b5-b347-2c7c47f5335d/downloads/17389c4c-2e4d-
Source: wget.exe, 00000002.00000002.339757198.00000000013D0000.00000004.00000040.sdmp, cmdline.out.2.drString found in binary or memory: https://bitbucket.org/phjounin/tftpd64/downloads/Tftpd64-4.64-setup.exe
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.n
Source: wget.exe, 00000002.00000003.336855620.000000000129F000.00000004.00000001.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.net;
Source: wget.exe, 00000002.00000003.336855620.000000000129F000.00000004.00000001.sdmpString found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website;
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS
Source: wget.exe, 00000002.00000003.336855620.000000000129F000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: wget.exe, 00000002.00000003.339327377.00000000012A8000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPSWW
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 104.192.141.1:443 -> 192.168.2.6:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.217.128.89:443 -> 192.168.2.6:49713 version: TLS 1.2
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_00404FF1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_00404FF1
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_0040312A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,5_2_0040312A
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_004048025_2_00404802
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_004063545_2_00406354
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_00406B2B5_2_00406B2B
Source: Tftpd64-4.64-setup.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: uninstall.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: classification engineClassification label: mal48.win@5/12@2/2
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_004042C1 GetDlgItem,SetWindowTextA,SHAutoComplete,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceExA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,5_2_004042C1
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_00402053 CoCreateInstance,MultiByteToWideChar,5_2_00402053
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile created: C:\Program Files\Tftpd64Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6408:120:WilError_01
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsk9E8A.tmpJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\wget.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://bitbucket.org/phjounin/tftpd64/downloads/Tftpd64-4.64-setup.exe' > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://bitbucket.org/phjounin/tftpd64/downloads/Tftpd64-4.64-setup.exe'
Source: unknownProcess created: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exe 'C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exe'
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P 'C:\Users\user\Desktop\download' --no-check-certificate --content-disposition --user-agent='Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko' 'https://bitbucket.org/phjounin/tftpd64/downloads/Tftpd64-4.64-setup.exe' Jump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile written: C:\Program Files\Tftpd64\tftpd32.iniJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeAutomated click: I Agree
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeAutomated click: Next >
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeAutomated click: Install
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64Jump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64\tftpd64.exeJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64\tftpd32.chmJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64\EUPL-EN.pdfJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64\tftpd32.iniJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDirectory created: C:\Program Files\Tftpd64\uninstall.exeJump to behavior
Source: tftpd64.exe.5.drStatic PE information: section name: _RDATA
Source: C:\Windows\SysWOW64\wget.exeFile created: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeJump to dropped file
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile created: C:\Program Files\Tftpd64\uninstall.exeJump to dropped file
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile created: C:\Program Files\Tftpd64\tftpd64.exeJump to dropped file
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Tftpd64Jump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Tftpd64\Uninstall.lnkJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Tftpd64\Tftpd64.lnkJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Tftpd64\Tftpd64 Settings.lnkJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDropped PE file which has not been started: C:\Program Files\Tftpd64\uninstall.exeJump to dropped file
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeDropped PE file which has not been started: C:\Program Files\Tftpd64\tftpd64.exeJump to dropped file
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile Volume queried: C:\Program Files FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeFile Volume queried: C:\Program Files FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_00405EC2 FindFirstFileA,FindClose,5_2_00405EC2
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_00402671 FindFirstFileA,5_2_00402671
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_004054EC DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,5_2_004054EC
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeAPI call chain: ExitProcess graph end nodegraph_5-3309
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeAPI call chain: ExitProcess graph end nodegraph_5-3311
Source: Tftpd64-4.64-setup.exe, 00000005.00000002.606518853.0000000000DE0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: Tftpd64-4.64-setup.exe, 00000005.00000002.606518853.0000000000DE0000.00000002.00000001.sdmpBinary or memory string: Progman
Source: Tftpd64-4.64-setup.exe, 00000005.00000002.606518853.0000000000DE0000.00000002.00000001.sdmpBinary or memory string: &Program Manager
Source: Tftpd64-4.64-setup.exe, 00000005.00000002.606518853.0000000000DE0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\SysWOW64\wget.exeQueries volume information: C:\Users\user\Desktop\download VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\download\Tftpd64-4.64-setup.exeCode function: 5_2_0040312A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,5_2_0040312A
Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder1Process Injection2Masquerading3OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Virtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery3VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery15Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.