Resubmissions

12-06-2024 18:38

240612-w98g1syhkk 7

12-06-2024 18:29

240612-w46fgayfjn 7

Analysis

  • max time kernel
    140s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 18:29

General

  • Target

    filezilla.exe

  • Size

    4.0MB

  • MD5

    79cef3c9de232d1f58f0e26292376584

  • SHA1

    2dd2ab98e8fcf5c720bf3618a3a0b84666ca191d

  • SHA256

    26d717e65101b0ccd5d491c406f76a216381410890508d3d154d5aa073698887

  • SHA512

    2378c3ea857cbf0ff8b14c7984a0237613533c7f6451bed1ba8e09aeb71ab4c35b7f37f7298259a67467d40925cad4a4e8baf556444215ab84ec9ea4856246c4

  • SSDEEP

    49152:o7BUd0rZmYl3zoN/SXsS9BsF91aVi5WgLli6RbJjwKwam6+I8qzPqS6RxC5UIcOM:gZE/cBstwjein2Vj8B

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\filezilla.exe
    "C:\Users\Admin\AppData\Local\Temp\filezilla.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2904-44-0x00007FFA42640000-0x00007FFA42661000-memory.dmp

    Filesize

    132KB

  • memory/2904-47-0x00007FFA2B170000-0x00007FFA2B214000-memory.dmp

    Filesize

    656KB

  • memory/2904-52-0x00007FFA3AC00000-0x00007FFA3AC40000-memory.dmp

    Filesize

    256KB

  • memory/2904-54-0x000000005A990000-0x000000005A9CF000-memory.dmp

    Filesize

    252KB

  • memory/2904-53-0x00007FFA2AA40000-0x00007FFA2AC53000-memory.dmp

    Filesize

    2.1MB

  • memory/2904-51-0x000000005A9D0000-0x000000005A9F9000-memory.dmp

    Filesize

    164KB

  • memory/2904-50-0x00007FFA3AF90000-0x00007FFA3AFE5000-memory.dmp

    Filesize

    340KB

  • memory/2904-49-0x00007FFA3B070000-0x00007FFA3B0B9000-memory.dmp

    Filesize

    292KB

  • memory/2904-48-0x00007FFA2AC60000-0x00007FFA2B161000-memory.dmp

    Filesize

    5.0MB

  • memory/2904-45-0x0000000066380000-0x00000000664BB000-memory.dmp

    Filesize

    1.2MB

  • memory/2904-43-0x00007FFA2B410000-0x00007FFA2B4CA000-memory.dmp

    Filesize

    744KB

  • memory/2904-42-0x00007FFA3AC40000-0x00007FFA3ACC2000-memory.dmp

    Filesize

    520KB

  • memory/2904-41-0x00007FFA2B4D0000-0x00007FFA2B694000-memory.dmp

    Filesize

    1.8MB

  • memory/2904-40-0x00007FFA2B6A0000-0x00007FFA2B7FD000-memory.dmp

    Filesize

    1.4MB

  • memory/2904-46-0x00007FFA2B220000-0x00007FFA2B407000-memory.dmp

    Filesize

    1.9MB

  • memory/2904-39-0x00007FFA2B800000-0x00007FFA2B8EF000-memory.dmp

    Filesize

    956KB

  • memory/2904-38-0x00007FFA3ACD0000-0x00007FFA3AD6E000-memory.dmp

    Filesize

    632KB

  • memory/2904-37-0x00007FF6BCC50000-0x00007FF6BD05E000-memory.dmp

    Filesize

    4.1MB

  • memory/2904-72-0x00007FFA2AA40000-0x00007FFA2AC53000-memory.dmp

    Filesize

    2.1MB

  • memory/2904-60-0x00007FFA2B4D0000-0x00007FFA2B694000-memory.dmp

    Filesize

    1.8MB

  • memory/2904-59-0x00007FFA2B6A0000-0x00007FFA2B7FD000-memory.dmp

    Filesize

    1.4MB

  • memory/2904-58-0x00007FFA2B800000-0x00007FFA2B8EF000-memory.dmp

    Filesize

    956KB