Analysis

  • max time kernel
    142s
  • max time network
    55s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 14:41

General

  • Target

    filezilla.exe

  • Size

    4.0MB

  • MD5

    79cef3c9de232d1f58f0e26292376584

  • SHA1

    2dd2ab98e8fcf5c720bf3618a3a0b84666ca191d

  • SHA256

    26d717e65101b0ccd5d491c406f76a216381410890508d3d154d5aa073698887

  • SHA512

    2378c3ea857cbf0ff8b14c7984a0237613533c7f6451bed1ba8e09aeb71ab4c35b7f37f7298259a67467d40925cad4a4e8baf556444215ab84ec9ea4856246c4

  • SSDEEP

    49152:o7BUd0rZmYl3zoN/SXsS9BsF91aVi5WgLli6RbJjwKwam6+I8qzPqS6RxC5UIcOM:gZE/cBstwjein2Vj8B

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\filezilla.exe
    "C:\Users\Admin\AppData\Local\Temp\filezilla.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4044-47-0x00007FF841660000-0x00007FF841847000-memory.dmp

    Filesize

    1.9MB

  • memory/4044-50-0x00007FF841440000-0x00007FF841653000-memory.dmp

    Filesize

    2.1MB

  • memory/4044-52-0x0000000064450000-0x0000000064479000-memory.dmp

    Filesize

    164KB

  • memory/4044-51-0x00007FF840F30000-0x00007FF841431000-memory.dmp

    Filesize

    5.0MB

  • memory/4044-49-0x00007FF851110000-0x00007FF851159000-memory.dmp

    Filesize

    292KB

  • memory/4044-48-0x00007FF8513F0000-0x00007FF851445000-memory.dmp

    Filesize

    340KB

  • memory/4044-46-0x00007FF841850000-0x00007FF8418F4000-memory.dmp

    Filesize

    656KB

  • memory/4044-45-0x0000000066380000-0x00000000664BB000-memory.dmp

    Filesize

    1.2MB

  • memory/4044-43-0x00007FF841900000-0x00007FF8419BA000-memory.dmp

    Filesize

    744KB

  • memory/4044-42-0x00007FF8419C0000-0x00007FF841B84000-memory.dmp

    Filesize

    1.8MB

  • memory/4044-53-0x00007FF8509C0000-0x00007FF850A00000-memory.dmp

    Filesize

    256KB

  • memory/4044-41-0x00007FF841B90000-0x00007FF841CED000-memory.dmp

    Filesize

    1.4MB

  • memory/4044-40-0x00007FF841DE0000-0x00007FF841E62000-memory.dmp

    Filesize

    520KB

  • memory/4044-39-0x00007FF841CF0000-0x00007FF841DDF000-memory.dmp

    Filesize

    956KB

  • memory/4044-38-0x00007FF851160000-0x00007FF8511FE000-memory.dmp

    Filesize

    632KB

  • memory/4044-37-0x00007FF72AB70000-0x00007FF72AF7E000-memory.dmp

    Filesize

    4.1MB

  • memory/4044-44-0x00007FF854E10000-0x00007FF854E31000-memory.dmp

    Filesize

    132KB

  • memory/4044-54-0x0000000064410000-0x000000006444F000-memory.dmp

    Filesize

    252KB

  • memory/4044-61-0x00007FF8419C0000-0x00007FF841B84000-memory.dmp

    Filesize

    1.8MB

  • memory/4044-69-0x00007FF841440000-0x00007FF841653000-memory.dmp

    Filesize

    2.1MB

  • memory/4044-60-0x00007FF841B90000-0x00007FF841CED000-memory.dmp

    Filesize

    1.4MB

  • memory/4044-58-0x00007FF841CF0000-0x00007FF841DDF000-memory.dmp

    Filesize

    956KB