Analysis
-
max time kernel
154s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2023, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
FileZilla_3.66.0_win64_sponsored2-setup.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
FileZilla_3.66.0_win64_sponsored2-setup.exe
Resource
win10v2004-20231127-en
General
-
Target
FileZilla_3.66.0_win64_sponsored2-setup.exe
-
Size
12.1MB
-
MD5
6dd9e17c098a5c9d9da2146fadf9d071
-
SHA1
5637533f19d87a433a7fe12ce78ad7e5518c40b5
-
SHA256
edca5598fc8715a5ca8bd77e7b8fb8bf1ccebdec3f5543f67058ebd572b3aba9
-
SHA512
1cb10a00f208a54f6d3a7f4e1939d6d5f7124525bd95f18c3ff45570fa240d8e73c002295a39dafcc560785fef85f61a8450728f3d42e23dfc3addd6af2287f6
-
SSDEEP
393216:DAScWJzs+eBLT0PO+x7fNDNhGVWHD7ga1PkLQ9:DAxWpsFKvFFjGVOD7ga1Pt9
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion avg_secure_browser_setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion avg_secure_browser_setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast avg_secure_browser_setup.exe Key opened \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000\SOFTWARE\AVAST Software\Avast avg_secure_browser_setup.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 avg_secure_browser_setup.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000\Control Panel\International\Geo\Nation avg_secure_browser_setup.exe -
Executes dropped EXE 1 IoCs
pid Process 1944 avg_secure_browser_setup.exe -
Loads dropped DLL 18 IoCs
pid Process 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI avg_secure_browser_setup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI avg_secure_browser_setup.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe 1944 avg_secure_browser_setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 1944 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 113 PID 4636 wrote to memory of 1944 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 113 PID 4636 wrote to memory of 1944 4636 FileZilla_3.66.0_win64_sponsored2-setup.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\FileZilla_3.66.0_win64_sponsored2-setup.exe"C:\Users\Admin\AppData\Local\Temp\FileZilla_3.66.0_win64_sponsored2-setup.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\avg_secure_browser_setup.exeavg_secure_browser_setup.exe /s /run_source="avg_ads_playanext_filezilla"2⤵
- Checks BIOS information in registry
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.8MB
MD57b5634de7f1cdbc27f9b26a0a640caff
SHA1c7b1a14b83b00a7a8a82bfaa1a08a3219d37ea74
SHA25634cefdca984e20f08ec6c79908b157b37c8475248fb8bfcb3b8d095038cfcd1a
SHA512a36500cdf45d4aec23a656569f24414fe339f9738212d2c40427dcdbfe15a342988c277f76aa603b29288342f336c0ecad797de6f50d89e9cc2456a61c1b8923
-
Filesize
947KB
MD5610f4eb991ae0db08785dc4a6c1b1fb2
SHA10b28c35f1569eec2dd1cd6c8cfdabb349f6e0866
SHA2566872cf401483b46c9b0456f676cc6f7e810fe11b7831567b187c6228ec4c0857
SHA512327647555d35f4dcf567579c4750299d8fe8ead866bfc304efd7f2b855bfd659da407c344c8077041310e214d0395d2f0c85c7d504ecf0403b970aca72496f7a
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
5.0MB
MD526b25c45d674d0394712bf091cb83c13
SHA15d9d29dcbedd27c086acfc8804ff77a6e4dc897c
SHA25656a9a478aedec9526fd863a36c767d4d203df37c5cb7c352cb5317a3b9e1a6c0
SHA51235ed5a38c0b45e8e477e513d2aa6ce811118d650ae7f8ddfe002710e64485dfed396c92b25d5006422c88440c71e083bd61d1e3e1e64c9718a3a85a7e25ee216
-
Filesize
2.1MB
MD5506f6a0c70b4963ea184b5c151c2b11c
SHA1c65704a0fdd6b54b95c6cf240d7f1b231a5d5a01
SHA256cc97eb3889e281f7052218d4df726d93cbe7561eb06f7dbfb4643e841daa8f41
SHA512f3454135ea2bd25c8afb1f5d23a58dc7edf29b5c1c06bcc2b22467dcc7c6f33df7051faa5e40645649c300fc9e1121e0b05da396ec21e640f20702cce890bed5
-
Filesize
126KB
MD59c2acf73b6c57d45779039135c04c4fb
SHA19d7bd49d99e088e40b46cf3833b7126907e80866
SHA256640f1790c7f910dd84f6ca04a063be9d16a7752e35c36d2143be168b367ecc17
SHA512bca59702fdd2095b1af4bed38ecd4cef584d64ba0be18654f5c43514b9e9139be107c465ad10cf9a0460f4c8ac4c15a4701c617dd0458ea59e05c59931cd754d
-
Filesize
195KB
MD59632d454727fd9cd1421fcb55645a447
SHA1eb94353123db606f456796dba05dbdf8c1510f97
SHA256ddcffa4a0464c30f3a3e75a135b4193b44b9e73c5dceb919da007db2deea09c0
SHA5120f0626c27bc2083edaece3527499953e20ca47cbffde96ebf58be5e3f13e8ec5fc08043b0fdad510c23a71caae823c636602385630995b8a259f5f563f06bc61
-
Filesize
127KB
MD50e539e4d192bfe47fba242d5420f1fed
SHA16c88b671a88934f5547cc21561d7bb9686a4a0f8
SHA25655769512567f84297ca8e01b00ca5cfd7d5098d5ddd132279a459ecaa745a277
SHA5121aa9297c2aa0d0414c5803112449e358d5783e97279f8b5a3bbb05fec903385024fc871fcdb3833089bb6a5b2de5fb0f4e18ee53c4cd32ccd092d82120b6b5d1
-
Filesize
36KB
MD59d22d71914617f6e67049296293bfd69
SHA16418ab33eb3bc2eb0718bbd8673da6d341a019dc
SHA256b991eab11ee0e62e62e80a3ea4a660e822070457e994cd7eed6ea67107973c22
SHA512aa951103e741b564234722731733b89198312ec1acc97777cd00d751621af3ad77c786fcb726eab402b05794d4b12bcd4a656f6d9f22e2b2d07e036ef8fc6783
-
Filesize
93KB
MD5d5d71a2caeae0872c18dbb3071695028
SHA14c23ac61f25fb39b48b3dab9bdfd61a93ec5953e
SHA256b7e09e6b24e5b7235f90ac542f619ed1aee1be6b15ad3fdec29e1293ba0033b6
SHA5122cdc5955b0140a764e6c11e41a387824df4f9ac5f0a6bb1f1daa24024e42f34e39399b3a774802b14ad71326e48ba749c3c01c4605338c6607e5c029baae1da5
-
Filesize
24KB
MD5640bff73a5f8e37b202d911e4749b2e9
SHA19588dd7561ab7de3bca392b084bec91f3521c879
SHA256c1e568e25ec111184deb1b87cfda4bfec529b1abeab39b66539d998012f33502
SHA51239c6c358e2b480c8cbebcc1da683924c8092fb2947f2da4a8df1b0dc1fdda61003d91d12232a436ec88ff4e0995b7f6ee8c6efbdca935eaa984001f7a72fea0a
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
4KB
MD5d458b8251443536e4a334147e0170e95
SHA1ba8d4d580f1bc0bb2eaa8b9b02ee9e91b8b50fc3
SHA2564913d4cccf84cd0534069107cff3e8e2f427160cad841547db9019310ac86cc7
SHA5126ff523a74c3670b8b5cd92f62dcc6ea50b65a5d0d6e67ee1079bdb8a623b27dd10b9036a41aa8ec928200c85323c1a1f3b5c0948b59c0671de183617b65a96b1
-
Filesize
9KB
MD51d8f01a83ddd259bc339902c1d33c8f1
SHA19f7806af462c94c39e2ec6cc9c7ad05c44eba04e
SHA2564b7d17da290f41ebe244827cc295ce7e580da2f7e9f7cc3efc1abc6898e3c9ed
SHA51228bf647374b4b500a0f3dbced70c2b256f93940e2b39160512e6e486ac31d1d90945acecef578f61b0a501f27c7106b6ffc3deab2ec3bfb3d9af24c9449a1567