ftp.exe

  • File Path: C:\Windows\system32\ftp.exe
  • Description: File Transfer Program

Hashes

Type Hash
MD5 D53C97FE21E6BCBDEB80EECAE274E4D4
SHA1 01A84CB1733048520C6E8E099C07F748DAB52648
SHA256 D7FB0E7E7E6C653E0DB554433DFA6AAD8BE33B99431DD0A31E25943D0EFB91F0
SHA384 367DFB74FD0EF20BDD9E1AE0C8D67349C08977B99BF64658A428CDFF981677FF62C1003F285ACB6E6F69FC835C3AE3F1
SHA512 3B52296964D3FEEF5605F36B3D601660C9BE01FEBEED9DE8ECE5D70932C3E985995144A30F6B853C6EC69EC2A2B59D65634B207C255BFA59D81B2226567BB824
SSDEEP 1536:SL9q/bXmnLhUc+4p5obG48INnRDwCvGiLMYnw:SL9dZ+8pmnR0nv+w
IMP 77FB959251723204D9A218FADEE0AF08
PESHA1 3F03913A860FF5F8F26A4017E5EAE60976F96C6F
PE256 18979577E49BD0C4FA8D99C115FB3EE87327A93E68F92165902577A5444648F9

Runtime Data

Usage (stderr):


Transfers files to and from a computer running an FTP server service
(sometimes called a daemon). Ftp can be used interactively.

FTP [-v] [-d] [-i] [-n] [-g] [-s:filename] [-a] [-A] [-x:sendbuffer] [-r:recvbuffer] [-b:asyncbuffers] [-w:windowsize] [host]

  -v              Suppresses display of remote server responses.
  -n              Suppresses auto-login upon initial connection.
  -i              Turns off interactive prompting during multiple file
                  transfers.
  -d              Enables debugging.
  -g              Disables filename globbing (see GLOB command).
  -s:filename     Specifies a text file containing FTP commands; the
                  commands will automatically run after FTP starts.
  -a              Use any local interface when binding data connection.
  -A              login as anonymous.
  -x:send sockbuf Overrides the default SO_SNDBUF size of 8192.
  -r:recv sockbuf Overrides the default SO_RCVBUF size of 8192.
  -b:async count  Overrides the default async count of 3
  -w:windowsize   Overrides the default transfer buffer size of 65535.
  host            Specifies the host name or IP address of the remote
                  host to connect to.

Notes:
  - mget and mput commands take y/n/q for yes/no/quit.
  - Use Control-C to abort commands.

Child Processes:

conhost.exe

Open Handles:

Path Type
(RW-) C:\Users\user File
\BaseNamedObjects\C:*ProgramData*Microsoft*Windows*Caches*{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000004.db Section
\BaseNamedObjects\C:*ProgramData*Microsoft*Windows*Caches*{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000004.db Section
\BaseNamedObjects\C:*ProgramData*Microsoft*Windows*Caches*cversions.2.ro Section
\BaseNamedObjects\NLS_CodePage_1252_3_2_0_0 Section
\BaseNamedObjects\NLS_CodePage_437_3_2_0_0 Section

Loaded Modules:

Path
C:\Windows\SYSTEM32\DNSAPI.dll
C:\Windows\system32\ftp.exe
C:\Windows\SYSTEM32\IPHLPAPI.DLL
C:\Windows\System32\KERNEL32.DLL
C:\Windows\System32\KERNELBASE.dll
C:\Windows\System32\msvcrt.dll
C:\Windows\system32\MSWSOCK.dll
C:\Windows\system32\napinsp.dll
C:\Windows\system32\NLAapi.dll
C:\Windows\System32\NSI.dll
C:\Windows\SYSTEM32\ntdll.dll
C:\Windows\System32\rasadhlp.dll
C:\Windows\System32\RPCRT4.dll
C:\Windows\System32\sechost.dll
C:\Windows\system32\SspiCli.dll
C:\Windows\System32\winrnr.dll
C:\Windows\System32\WS2_32.dll
C:\Windows\system32\wshbth.dll

Signature

  • Status: Signature verified.
  • Serial: 33000001C422B2F79B793DACB20000000001C4
  • Thumbprint: AE9C1AE54763822EEC42474983D8B635116C8452
  • Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
  • Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

File Metadata

  • Original Filename: ftp.exe.mui
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 10.0.17763.1 (WinBuild.160101.0800)
  • Product Version: 10.0.17763.1
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.
  • Machine Type: 64-bit

File Scan

  • VirusTotal Detections: 0/69
  • VirusTotal Link: https://www.virustotal.com/gui/file/d7fb0e7e7e6c653e0db554433dfa6aad8be33b99431dd0a31e25943d0efb91f0/detection/

Possible Misuse

The following table contains possible examples of ftp.exe being misused. While ftp.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma proc_creation_win_susp_ftp.yml title: Suspicious ftp.exe DRL 1.0
sigma proc_creation_win_susp_ftp.yml description: Detects renamed ftp.exe, ftp.exe script execution and child processes ran by ftp.exe DRL 1.0
sigma proc_creation_win_susp_ftp.yml Image\|endswith: 'ftp.exe' DRL 1.0
sigma proc_creation_win_susp_ftp.yml OriginalFileName\|contains: 'ftp.exe' DRL 1.0
sigma proc_creation_win_susp_ftp.yml ParentImage\|endswith: 'ftp.exe' DRL 1.0
LOLBAS Ftp.yml Name: Ftp.exe  
LOLBAS Ftp.yml Usecase: Spawn new process using ftp.exe. Ftp.exe runs cmd /C YourCommand  
LOLBAS Ftp.yml Usecase: Spawn new process using ftp.exe. Ftp.exe downloads the binary.  
LOLBAS Ftp.yml - Path: C:\Windows\System32\ftp.exe  
LOLBAS Ftp.yml - Path: C:\Windows\SysWOW64\ftp.exe  
LOLBAS Ftp.yml - IOC: cmd /c as child process of ftp.exe  

Additional Info*

*The information below is copied from MicrosoftDocs, which is maintained by Microsoft. Available under CC BY 4.0 license.


ftp

Applies to: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012

Transfers files to and from a computer running a File Transfer Protocol (ftp) server service. This command can be used interactively or in batch mode by processing ASCII text files.

Syntax

ftp [-v] [-d] [-i] [-n] [-g] [-s:<filename>] [-a] [-A] [-x:<sendbuffer>] [-r:<recvbuffer>] [-b:<asyncbuffers>][-w:<windowssize>][<host>] [-?]

Parameters

Parameter Description
-v Suppresses display of remote server responses.
-d Enables debugging, displaying all commands passed between the FTP client and FTP server.
-i Disables interactive prompting during multiple file transfers.
-n Suppresses auto-login upon initial connection.
-g Disables file name globbing. Glob permits the use of the asterisk (*) and question mark (?) as wildcard characters in local file and path names.
-s:<filename> Specifies a text file that contains ftp commands. These commands run automatically after ftp starts. This parameter allows no spaces. Use this parameter instead of redirection (<). Note: In Windows 8 and Windows Server 2012 or later operating systems, the text file must be written in UTF-8.
-a Specifies that any local interface can be used when binding the ftp data connection.
-A Logs onto the ftp server as anonymous.
-x:<sendbuffer> Overrides the default SO_SNDBUF size of 8192.
-r:<recvbuffer> Overrides the default SO_RCVBUF size of 8192.
-b:<asyncbuffers> Overrides the default async buffer count of 3.
-w:<windowssize> Specifies the size of the transfer buffer. The default window size is 4096 bytes.
<host> Specifies the computer name, IP address, or IPv6 address of the ftp server to which to connect. The host name or address, if specified, must be the last parameter on the line.
-? Displays help at the command prompt.
Remarks
  • The ftp command-line parameters are case-sensitive.

  • This command is available only if the Internet Protocol (TCP/IP) protocol is installed as a component in the properties of a network adapter in Network Connections.

  • The ftp command can be used interactively. After it is started, ftp creates a sub-environment in which you can use ftp commands. You can return to the command prompt by typing the quit command. When the ftp sub-environment is running, it is indicated by the ftp > command prompt. For more information, see the ftp commands.

  • The ftp command supports the use of IPv6 when the IPv6 protocol is installed.

Examples

To log on to the ftp server named ftp.example.microsoft.com, type:

ftp ftp.example.microsoft.com

To log on to the ftp server named ftp.example.microsoft.com and run the ftp commands contained in a file named resync.txt, type:

ftp -s:resync.txt ftp.example.microsoft.com

Additional References


MIT License. Copyright (c) 2020-2021 Strontic.