File name:

FileZilla_3.67.0_win64-setup.exe

Full analysis: https://app.any.run/tasks/4f5d231d-e9e1-4e3d-8d66-eff7279e386e
Verdict: Malicious activity
Analysis date: November 09, 2024, 03:10:28
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
qrcode
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

D24255FA5F117A2506045143856B6336

SHA1:

8EA2BF726044E98479076D0E64327F7AE7A6E5F2

SHA256:

D7E11B178FCC3D1EE7F6AD3DCE6DA2EA043DE64D521CF3578FB09031CBDB0AE2

SSDEEP:

98304:HMyWOAfu/ycn2A237vF402BeCkdLddmK2bKg9eR5S2UjaVWxnHs5sleLWmArq0zM:8lzP5chUclFe0OHEcKswjajKqUn4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • uninstall.exe (PID: 3004)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
      • uninstall.exe (PID: 3004)
      • FileZilla_3.67.0_win64-setup.exe (PID: 5512)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
      • uninstall.exe (PID: 3004)
    • Reads security settings of Internet Explorer

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
    • Application launched itself

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
    • The process creates files with name similar to system file names

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
  • INFO

    • Checks supported languages

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
    • Create files in a temporary directory

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
    • Reads the computer name

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
    • Process checks computer location settings

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:07:02 02:09:43+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 139776
UninitializedDataSize: 2048
EntryPoint: 0x3645
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.67.0.0
ProductVersionNumber: 3.67.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Tim Kosse
FileDescription: FileZilla FTP Client
FileVersion: 3.67.0
LegalCopyright: Tim Kosse
OriginalFileName: FileZilla_3.67.0_win32-setup.exe
ProductName: FileZilla
ProductVersion: 3.67.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start filezilla_3.67.0_win64-setup.exe filezilla_3.67.0_win64-setup.exe uninstall.exe regsvr32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
612"C:\Users\admin\AppData\Local\Temp\FileZilla_3.67.0_win64-setup.exe" C:\Users\admin\AppData\Local\Temp\FileZilla_3.67.0_win64-setup.exe
explorer.exe
User:
admin
Company:
Tim Kosse
Integrity Level:
MEDIUM
Description:
FileZilla FTP Client
Version:
3.67.0
Modules
Images
c:\users\admin\appdata\local\temp\filezilla_3.67.0_win64-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3004"C:\Program Files\FileZilla FTP Client\uninstall.exe" /frominstall /keepstartmenudir _?=C:\Program Files\FileZilla FTP ClientC:\Program Files\FileZilla FTP Client\uninstall.exe
FileZilla_3.67.0_win64-setup.exe
User:
admin
Company:
Tim Kosse
Integrity Level:
HIGH
Description:
FileZilla FTP Client
Exit code:
0
Version:
3.65.0
Modules
Images
c:\program files\filezilla ftp client\uninstall.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5512"C:\Users\admin\AppData\Local\Temp\FileZilla_3.67.0_win64-setup.exe" /UAC:70214 /NCRC C:\Users\admin\AppData\Local\Temp\FileZilla_3.67.0_win64-setup.exe
FileZilla_3.67.0_win64-setup.exe
User:
admin
Company:
Tim Kosse
Integrity Level:
HIGH
Description:
FileZilla FTP Client
Version:
3.67.0
Modules
Images
c:\users\admin\appdata\local\temp\nsnc157.tmp\nsdialogs.dll
c:\windows\syswow64\comdlg32.dll
c:\windows\syswow64\linkinfo.dll
c:\windows\syswow64\ntshrui.dll
c:\windows\syswow64\srvcli.dll
c:\windows\syswow64\cscapi.dll
c:\users\admin\appdata\local\temp\nsnc157.tmp\nsis_appid.dll
c:\windows\syswow64\windows.staterepositoryps.dll
6852"C:\WINDOWS\system32\regsvr32.exe" /s /u "C:\Program Files\FileZilla FTP Client\fzshellext_64.dll"C:\Windows\System32\regsvr32.exeuninstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
590
Read events
564
Write events
11
Delete events
15

Modification events

(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileZilla3CopyHook
Operation:delete keyName:(default)
Value:
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}\InProcServer32
Operation:delete keyName:(default)
Value:
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}
Operation:delete keyName:(default)
Value:
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\FileZilla 3\fzshellext
Operation:delete valueName:Enable
Value:

(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\FileZilla 3\fzshellext
Operation:delete keyName:(default)
Value:
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\FileZilla 3
Operation:delete keyName:(default)
Value:
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
17
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
18
(PID) Process:(3004) uninstall.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\filezilla.exe
Operation:delete valueName:DumpType
Value:

(PID) Process:(3004) uninstall.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\fzsftp.exe
Operation:delete valueName:DumpType
Value:

Executable files
30
Suspicious files
66
Text files
686
Unknown types
0

Dropped files

PID
Process
Filename
Type
612FileZilla_3.67.0_win64-setup.exeC:\Users\admin\AppData\Local\Temp\nsqBBF8.tmp\System.dllexecutable
MD5:4ADD245D4BA34B04F213409BFE504C07
SHA256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
5512FileZilla_3.67.0_win64-setup.exeC:\Users\admin\AppData\Local\Temp\nsnC157.tmp\nsDialogs.dllexecutable
MD5:1D8F01A83DDD259BC339902C1D33C8F1
SHA256:4B7D17DA290F41EBE244827CC295CE7E580DA2F7E9F7CC3EFC1ABC6898E3C9ED
612FileZilla_3.67.0_win64-setup.exeC:\Users\admin\AppData\Local\Temp\nsqBBF8.tmp\UAC.dllexecutable
MD5:ADB29E6B186DAA765DC750128649B63D
SHA256:2F7F8FC05DC4FD0D5CDA501B47E4433357E887BBFED7292C028D99C73B52DC08
3004uninstall.exeC:\Users\admin\AppData\Local\Temp\nsq479E.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
3004uninstall.exeC:\Users\admin\AppData\Local\Temp\nsa478D.tmpbinary
MD5:C7E474CA3901FC9AE5FD124308FF74E4
SHA256:4AAE673DFCC1FC8A4B90D0E0DB2BEB6769CED86AD23F3816B9533B2BDA2E2C50
5512FileZilla_3.67.0_win64-setup.exeC:\Program Files\FileZilla FTP Client\NEWStext
MD5:19C328041291022688D81CE7AF5EC055
SHA256:AA62A9F3E4937DD885E6DA2E7E787DFBA72333520E4C50D6C93AB4517BB59317
5512FileZilla_3.67.0_win64-setup.exeC:\Program Files\FileZilla FTP Client\fzstorj.exeexecutable
MD5:978C159CF2DF761B4A353925B50DA3F4
SHA256:39EB51C18AC730861C96DDD4B2A73DBC2B7C70AE8411F9F4F5B841E391222820
5512FileZilla_3.67.0_win64-setup.exeC:\Program Files\FileZilla FTP Client\fzputtygen.exeexecutable
MD5:7E208D8C27326712EEEED291BA350C3C
SHA256:06F3610B7582AB8C906A81C0A9AC8199CA738E89A37E05021625C4AD9F7DD95A
5512FileZilla_3.67.0_win64-setup.exeC:\Program Files\FileZilla FTP Client\GPL.htmlhtml
MD5:11E176C5E0120EE94E365F999084BCE8
SHA256:F7E89C1EDBBEF8BC837B47C48113A2416F1AF0CFC2B2218DA39085465EA1045C
612FileZilla_3.67.0_win64-setup.exeC:\Users\admin\AppData\Local\Temp\nsqBBF8.tmp\UserInfo.dllexecutable
MD5:D458B8251443536E4A334147E0170E95
SHA256:4913D4CCCF84CD0534069107CFF3E8E2F427160CAD841547DB9019310AC86CC7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
43
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1552
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5740
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5740
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4032
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6944
svchost.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4360
SearchApp.exe
2.16.204.75:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4360
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1552
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
www.bing.com
  • 2.16.204.75
  • 2.16.204.87
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.64
  • 20.190.159.71
  • 40.126.31.73
  • 20.190.159.68
  • 20.190.159.75
  • 20.190.159.2
  • 20.190.159.23
whitelisted
th.bing.com
  • 2.16.204.75
  • 2.16.204.87
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info