Analysis

  • max time kernel
    141s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 19:53

General

  • Target

    filezilla.exe

  • Size

    4.0MB

  • MD5

    71e87d8f4ab33dd57bff41f76c339e64

  • SHA1

    d202fea4df82d26fabbfe3bdb9515a08d021cd09

  • SHA256

    96816c715a54e596a9d12527d9bb0d2dbcbc02d2a73ce72a1fd36d634d3587cd

  • SHA512

    79dd39320f7e5abf261555959058508b0b1c5dfc72310df90b61f76849421139c4466e071212d9ca4fbcbbb442aa36ce2ddfd5306660be5e48d1a0f5cc0c0b21

  • SSDEEP

    49152:AHzFL+1NfyOT3BxU4/pRjpjqEgpMDqiUy0mTr5FeD2Q+zO3CevC3hPsw3p8MXqAD:OhaT3fpR1TTzOjUhCfa

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\filezilla.exe
    "C:\Users\Admin\AppData\Local\Temp\filezilla.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4700-43-0x00007FF969F00000-0x00007FF969FBA000-memory.dmp

    Filesize

    744KB

  • memory/4700-45-0x0000000066380000-0x00000000664BB000-memory.dmp

    Filesize

    1.2MB

  • memory/4700-51-0x000000005FFF0000-0x0000000060019000-memory.dmp

    Filesize

    164KB

  • memory/4700-49-0x00007FF96A2D0000-0x00007FF96A319000-memory.dmp

    Filesize

    292KB

  • memory/4700-47-0x00007FF95AF70000-0x00007FF95B471000-memory.dmp

    Filesize

    5.0MB

  • memory/4700-46-0x00007FF9695C0000-0x00007FF9697A7000-memory.dmp

    Filesize

    1.9MB

  • memory/4700-44-0x00007FF96E840000-0x00007FF96E861000-memory.dmp

    Filesize

    132KB

  • memory/4700-42-0x00007FF9697B0000-0x00007FF969974000-memory.dmp

    Filesize

    1.8MB

  • memory/4700-52-0x00007FF95AD50000-0x00007FF95AF63000-memory.dmp

    Filesize

    2.1MB

  • memory/4700-41-0x00007FF96D890000-0x00007FF96D912000-memory.dmp

    Filesize

    520KB

  • memory/4700-40-0x00007FF969980000-0x00007FF969ADD000-memory.dmp

    Filesize

    1.4MB

  • memory/4700-39-0x00007FF969D50000-0x00007FF969E3D000-memory.dmp

    Filesize

    948KB

  • memory/4700-38-0x00007FF96D980000-0x00007FF96DA1E000-memory.dmp

    Filesize

    632KB

  • memory/4700-54-0x000000005FFB0000-0x000000005FFEF000-memory.dmp

    Filesize

    252KB

  • memory/4700-53-0x00007FF969C60000-0x00007FF969CA0000-memory.dmp

    Filesize

    256KB

  • memory/4700-50-0x00007FF969560000-0x00007FF9695B5000-memory.dmp

    Filesize

    340KB

  • memory/4700-48-0x00007FF969CA0000-0x00007FF969D44000-memory.dmp

    Filesize

    656KB

  • memory/4700-37-0x00007FF6C9F40000-0x00007FF6CA34E000-memory.dmp

    Filesize

    4.1MB

  • memory/4700-61-0x00007FF9697B0000-0x00007FF969974000-memory.dmp

    Filesize

    1.8MB