File name:

FileZilla_3.67.0_win64-setup.exe

Full analysis: https://app.any.run/tasks/4f5d231d-e9e1-4e3d-8d66-eff7279e386e
Verdict: Malicious activity
Analysis date: November 09, 2024, 03:10:28
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
qrcode
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

D24255FA5F117A2506045143856B6336

SHA1:

8EA2BF726044E98479076D0E64327F7AE7A6E5F2

SHA256:

D7E11B178FCC3D1EE7F6AD3DCE6DA2EA043DE64D521CF3578FB09031CBDB0AE2

SSDEEP:

98304:HMyWOAfu/ycn2A237vF402BeCkdLddmK2bKg9eR5S2UjaVWxnHs5sleLWmArq0zM:8lzP5chUclFe0OHEcKswjajKqUn4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • uninstall.exe (PID: 3004)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
      • uninstall.exe (PID: 3004)
    • The process creates files with name similar to system file names

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
    • Executable content was dropped or overwritten

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
      • uninstall.exe (PID: 3004)
      • FileZilla_3.67.0_win64-setup.exe (PID: 5512)
    • Reads security settings of Internet Explorer

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
    • Application launched itself

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
  • INFO

    • Checks supported languages

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
    • Create files in a temporary directory

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
    • Process checks computer location settings

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
    • Reads the computer name

      • FileZilla_3.67.0_win64-setup.exe (PID: 612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:07:02 02:09:43+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 139776
UninitializedDataSize: 2048
EntryPoint: 0x3645
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.67.0.0
ProductVersionNumber: 3.67.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Tim Kosse
FileDescription: FileZilla FTP Client
FileVersion: 3.67.0
LegalCopyright: Tim Kosse
OriginalFileName: FileZilla_3.67.0_win32-setup.exe
ProductName: FileZilla
ProductVersion: 3.67.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
4
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start filezilla_3.67.0_win64-setup.exe filezilla_3.67.0_win64-setup.exe uninstall.exe regsvr32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
612"C:\Users\admin\AppData\Local\Temp\FileZilla_3.67.0_win64-setup.exe" C:\Users\admin\AppData\Local\Temp\FileZilla_3.67.0_win64-setup.exe
explorer.exe
User:
admin
Company:
Tim Kosse
Integrity Level:
MEDIUM
Description:
FileZilla FTP Client
Version:
3.67.0
Modules
Images
c:\users\admin\appdata\local\temp\filezilla_3.67.0_win64-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3004"C:\Program Files\FileZilla FTP Client\uninstall.exe" /frominstall /keepstartmenudir _?=C:\Program Files\FileZilla FTP ClientC:\Program Files\FileZilla FTP Client\uninstall.exe
FileZilla_3.67.0_win64-setup.exe
User:
admin
Company:
Tim Kosse
Integrity Level:
HIGH
Description:
FileZilla FTP Client
Exit code:
0
Version:
3.65.0
Modules
Images
c:\program files\filezilla ftp client\uninstall.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5512"C:\Users\admin\AppData\Local\Temp\FileZilla_3.67.0_win64-setup.exe" /UAC:70214 /NCRC C:\Users\admin\AppData\Local\Temp\FileZilla_3.67.0_win64-setup.exe
FileZilla_3.67.0_win64-setup.exe
User:
admin
Company:
Tim Kosse
Integrity Level:
HIGH
Description:
FileZilla FTP Client
Version:
3.67.0
Modules
Images
c:\users\admin\appdata\local\temp\nsnc157.tmp\nsdialogs.dll
c:\windows\syswow64\comdlg32.dll
c:\windows\syswow64\linkinfo.dll
c:\windows\syswow64\ntshrui.dll
c:\windows\syswow64\srvcli.dll
c:\windows\syswow64\cscapi.dll
c:\users\admin\appdata\local\temp\nsnc157.tmp\nsis_appid.dll
c:\windows\syswow64\windows.staterepositoryps.dll
6852"C:\WINDOWS\system32\regsvr32.exe" /s /u "C:\Program Files\FileZilla FTP Client\fzshellext_64.dll"C:\Windows\System32\regsvr32.exeuninstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
590
Read events
564
Write events
11
Delete events
15

Modification events

(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileZilla3CopyHook
Operation:delete keyName:(default)
Value:
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}\InProcServer32
Operation:delete keyName:(default)
Value:
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}
Operation:delete keyName:(default)
Value:
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\FileZilla 3\fzshellext
Operation:delete valueName:Enable
Value:

(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\FileZilla 3\fzshellext
Operation:delete keyName:(default)
Value:
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\FileZilla 3
Operation:delete keyName:(default)
Value:
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
17
(PID) Process:(6852) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
18
(PID) Process:(3004) uninstall.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\filezilla.exe
Operation:delete valueName:DumpType
Value:

(PID) Process:(3004) uninstall.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\LocalDumps\fzsftp.exe
Operation:delete valueName:DumpType
Value:

Executable files
30
Suspicious files
66
Text files
686
Unknown types
0

Dropped files

PID
Process
Filename
Type
612FileZilla_3.67.0_win64-setup.exeC:\Users\admin\AppData\Local\Temp\nsqBBF8.tmp\UserInfo.dllexecutable
MD5:D458B8251443536E4A334147E0170E95
SHA256:4913D4CCCF84CD0534069107CFF3E8E2F427160CAD841547DB9019310AC86CC7
612FileZilla_3.67.0_win64-setup.exeC:\Users\admin\AppData\Local\Temp\nsqBBF8.tmp\UAC.dllexecutable
MD5:ADB29E6B186DAA765DC750128649B63D
SHA256:2F7F8FC05DC4FD0D5CDA501B47E4433357E887BBFED7292C028D99C73B52DC08
3004uninstall.exeC:\Users\admin\AppData\Local\Temp\nsq479E.tmp\UAC.dllexecutable
MD5:ADB29E6B186DAA765DC750128649B63D
SHA256:2F7F8FC05DC4FD0D5CDA501B47E4433357E887BBFED7292C028D99C73B52DC08
3004uninstall.exeC:\Users\admin\AppData\Local\Temp\nsq479E.tmp\UserInfo.dllexecutable
MD5:98FF85B635D9114A9F6A0CD7B9B649D0
SHA256:933F93A30CE44DF96CBC4AC0B56A8B02EE01DA27E4EA665D1D846357A8FCA8DE
5512FileZilla_3.67.0_win64-setup.exeC:\Users\admin\AppData\Local\Temp\nsnC157.tmp\nsDialogs.dllexecutable
MD5:1D8F01A83DDD259BC339902C1D33C8F1
SHA256:4B7D17DA290F41EBE244827CC295CE7E580DA2F7E9F7CC3EFC1ABC6898E3C9ED
5512FileZilla_3.67.0_win64-setup.exeC:\Program Files\FileZilla FTP Client\fzsftp.exeexecutable
MD5:1035E5D9386199763A1F683EC4644BF4
SHA256:BD4270C0FB61378B8C8F6720E5BB55921783D9255144D34CD13DD575B5C2B41B
3004uninstall.exeC:\Users\admin\AppData\Local\Temp\nsq479E.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
5512FileZilla_3.67.0_win64-setup.exeC:\Program Files\FileZilla FTP Client\filezilla.exeexecutable
MD5:79CEF3C9DE232D1F58F0E26292376584
SHA256:26D717E65101B0CCD5D491C406F76A216381410890508D3D154D5AA073698887
5512FileZilla_3.67.0_win64-setup.exeC:\Program Files\FileZilla FTP Client\fzputtygen.exeexecutable
MD5:7E208D8C27326712EEEED291BA350C3C
SHA256:06F3610B7582AB8C906A81C0A9AC8199CA738E89A37E05021625C4AD9F7DD95A
5512FileZilla_3.67.0_win64-setup.exeC:\Program Files\FileZilla FTP Client\libgmp-10.dllexecutable
MD5:8C379D5323F086363F0D0F85410E029C
SHA256:DCFE75F06FF67B0E94035831F8A7F5E23757535235FFEA2350B64783841A8F27
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
43
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6944
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1552
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5740
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5740
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4032
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6944
svchost.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4360
SearchApp.exe
2.16.204.75:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4360
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1552
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
www.bing.com
  • 2.16.204.75
  • 2.16.204.87
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.64
  • 20.190.159.71
  • 40.126.31.73
  • 20.190.159.68
  • 20.190.159.75
  • 20.190.159.2
  • 20.190.159.23
whitelisted
th.bing.com
  • 2.16.204.75
  • 2.16.204.87
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info