Overview
overview
7Static
static
3FileZilla_...up.exe
windows7-x64
5FileZilla_...up.exe
windows10-2004-x64
4$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7AUTHORS
windows7-x64
1AUTHORS
windows10-2004-x64
1NEWS
windows7-x64
1NEWS
windows10-2004-x64
1docs/fzdefaults.xml
windows7-x64
1docs/fzdefaults.xml
windows10-2004-x64
1locales/an...lla.mo
windows7-x64
3locales/an...lla.mo
windows10-2004-x64
3locales/an...lla.mo
windows7-x64
3locales/an...lla.mo
windows10-2004-x64
3locales/ar...lla.mo
windows7-x64
3locales/ar...lla.mo
windows10-2004-x64
3locales/ar...lla.mo
windows7-x64
3locales/ar...lla.mo
windows10-2004-x64
3locales/az...lla.mo
windows7-x64
3locales/az...lla.mo
windows10-2004-x64
3locales/az...lla.mo
windows7-x64
3locales/az...lla.mo
windows10-2004-x64
3locales/bg...lla.mo
windows7-x64
3locales/bg...lla.mo
windows10-2004-x64
3locales/bg...lla.mo
windows7-x64
3locales/bg...lla.mo
windows10-2004-x64
3locales/ca...lla.mo
windows7-x64
3locales/ca...lla.mo
windows10-2004-x64
3locales/ca...lla.mo
windows7-x64
3locales/ca...lla.mo
windows10-2004-x64
3locales/ca...lla.mo
windows7-x64
3locales/ca...lla.mo
windows10-2004-x64
3Analysis
-
max time kernel
358s -
max time network
368s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
FileZilla_3.67.0_win64_sponsored2-setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FileZilla_3.67.0_win64_sponsored2-setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
AUTHORS
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
AUTHORS
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
NEWS
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
NEWS
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
docs/fzdefaults.xml
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
docs/fzdefaults.xml
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
locales/an/filezilla.mo
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
locales/an/filezilla.mo
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
locales/an/libfilezilla.mo
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
locales/an/libfilezilla.mo
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
locales/ar/filezilla.mo
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
locales/ar/filezilla.mo
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
locales/ar/libfilezilla.mo
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
locales/ar/libfilezilla.mo
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
locales/az/filezilla.mo
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
locales/az/filezilla.mo
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
locales/az/libfilezilla.mo
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
locales/az/libfilezilla.mo
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
locales/bg_BG/filezilla.mo
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
locales/bg_BG/filezilla.mo
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
locales/bg_BG/libfilezilla.mo
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
locales/bg_BG/libfilezilla.mo
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
locales/ca/filezilla.mo
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
locales/ca/filezilla.mo
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
locales/ca/libfilezilla.mo
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
locales/ca/libfilezilla.mo
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
locales/ca_ES@valencia/filezilla.mo
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
locales/ca_ES@valencia/filezilla.mo
Resource
win10v2004-20240508-en
General
-
Target
docs/fzdefaults.xml
-
Size
2KB
-
MD5
bc0afacd8028e222472bb32474db8148
-
SHA1
826f5ec70527440c72e0be67cd4744d95f45f288
-
SHA256
0d2e249a171a07a0b412c9f3eca041e772d530991d6333f9c96600c8c0935027
-
SHA512
d65ac28f18ae9886f05f19feb209b6b26199c9353928f304ed705efa9e0632b66442fde52e6fcabdc81a9b3b42bb3a751df5e08929acea14ecbfb43294214664
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6088494d75cada01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a80760000000002000000000010660000000100002000000035a8d52134bdfad05b34ff9f25f7bbb4ff5611dece53a6d643ff93b44aa7429b000000000e80000000020000200000008c489fe7ea7acf265f98210f3ca0670fe7bd46de068c6cdd46bf100fc4e8f02f20000000101a95cf8740251d52c40bad327964bf9751e89a9a4d0640153ccfaf17ca86bf40000000537af5aa42321b7879f5ad6c9b700de935ff7414f2dff6730908610cc0bf856b5e28fa61dc9f7f8c14f067790411dde75e0f7fe37589d290c5deb2237d138c50 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77C2B351-3668-11EF-A155-FAD28091DCF5} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425862667" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1620 1468 MSOXMLED.EXE 28 PID 1468 wrote to memory of 1620 1468 MSOXMLED.EXE 28 PID 1468 wrote to memory of 1620 1468 MSOXMLED.EXE 28 PID 1468 wrote to memory of 1620 1468 MSOXMLED.EXE 28 PID 1620 wrote to memory of 2768 1620 iexplore.exe 29 PID 1620 wrote to memory of 2768 1620 iexplore.exe 29 PID 1620 wrote to memory of 2768 1620 iexplore.exe 29 PID 1620 wrote to memory of 2768 1620 iexplore.exe 29 PID 2768 wrote to memory of 2624 2768 IEXPLORE.EXE 30 PID 2768 wrote to memory of 2624 2768 IEXPLORE.EXE 30 PID 2768 wrote to memory of 2624 2768 IEXPLORE.EXE 30 PID 2768 wrote to memory of 2624 2768 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\docs\fzdefaults.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfbfd677dbfab4b41a9c622e7277f5f
SHA128814da03bf0d85920536737e22c9f00a7013728
SHA2560070f4d299e36954444d54551e0574a8093cff035b0b6ef6a5a84e8cd749b4c5
SHA5129d53c5b6f1a20692190e2a89e5641be36e869970780b2e3c26408301348de1482b99df263a88fddd6a46f9620bd3f5e6d535b43685e5ab06f623586176bb2124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd432615638c952d502a3d4be9c6686e
SHA125bf79118d188a369de2e48136eef00b96d8a905
SHA256ddc57aa9e57a221daaa6a652d1d154f087c89720d4c6ae60ccca333d2bc5404a
SHA512ded5219b848db3a22f5f339acc96639d5b23a87830342f032b8edfaf6ecd0274c941548b443f862054ec5e084b3b1c4e0e84f65e2be9d8c409253b60292a56f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb42e830dd11dd77e80ca87458649818
SHA13e937e0d1a126131807ed5663bcd46a82519fa4c
SHA2563269011065cbf91b986b7bc63f34190468e8667c348e75d59c47c9b4e032f86a
SHA512dcf36d1978df366be344f61756edd87435603b47d540ef9698dc83d39f1afa2314679f438a3db0c01f0633f8e5c7d11b07a546dd56f95f0ebafe608b1db243dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57892c078157ed57b02cd635fb051c395
SHA1a4e305fae61c9e532b16c2a2114267dc62e0e8e6
SHA2569886c6e057c4b03536102d0796f7468e989a90e44f1c0cd93e26f581c99de57c
SHA512e7b78b77dd2bbed6ef734bef384fde3bca4ca9d5380acb351fb0f4395a7c5ff4dd7b2047a4a0ebdbd8c91dec65e6ab015bf704357388681d4bb55f3cb83a5c9e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b