Edit tour
Windows
Analysis Report
FileZilla_3.67.1_win64_sponsored-setup.exe
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Compliance
Score: | 51 |
Range: | 0 - 100 |
Signatures
Multi AV Scanner detection for dropped file
Creates an autostart registry key pointing to binary in C:\Windows
Creates files in the system32 config directory
Creates multiple autostart registry keys
Detected potential unwanted application
Modifies Internet Explorer zone settings
Modifies Internet Explorer zonemap settings
Overwrites Mozilla Firefox settings
Sigma detected: Dot net compiler compiles file from suspicious location
Tries to harvest and steal browser information (history, passwords, etc)
Uses netsh to modify the Windows network and firewall settings
Writes a notice file (html or txt) to demand a ransom
Yara detected Generic Downloader
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Is looking for software installed on the system
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: IE Change Domain Zone
Stores files to the Windows start menu directory
Uses 32bit PE files
Classification
- System is w10x64
- FileZilla_3.67.1_win64_sponsored-setup.exe (PID: 2168 cmdline:
"C:\Users\ user\Deskt op\FileZil la_3.67.1_ win64_spon sored-setu p.exe" MD5: AC97E64C3E2E865C50155DFDFFE5428A) - WcInstaller.exe (PID: 3684 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\nsmA29 2.tmp\WcIn staller.ex e" --silen t --partne r=FZ210427 --searche nbl MD5: CA94290A5FB89E0AAACBF01585718B17) - WebCompanionInstaller.exe (PID: 4648 cmdline:
.\WebCompa nionInstal ler.exe -- partner=FZ 210427 --v ersion=9.1 .0.993 --s ilent --pa rtner=FZ21 0427 --sea rchenbl MD5: 80619C0E2165AB0C217D4355461DA07D) - sc.exe (PID: 3828 cmdline:
"sc.exe" C reate "WCA ssistantSe rvice" bin Path= "C:\ Program Fi les (x86)\ Lavasoft\W eb Compani on\Applica tion\Lavas oft.WCAssi stant.WinS ervice.exe " DisplayN ame= "WC A ssistant" start= aut o MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) - conhost.exe (PID: 3404 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 7032 cmdline:
"sc.exe" f ailure WCA ssistantSe rvice rese t= 30 acti ons= resta rt/60000 MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) - conhost.exe (PID: 6148 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 7044 cmdline:
"sc.exe" d escription "WCAssist antService " "Ad-Awar e Web Comp anion Inte rnet secur ity servic e" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) - conhost.exe (PID: 4280 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - rundll32.exe (PID: 3652 cmdline:
"C:\Window s\sysnativ e\RunDLL32 .Exe" syss etup,Setup InfObjectI nstallActi on BootIns tall 128 C :\Program Files (x86 )\Lavasoft \Web Compa nion\Servi ce\x64\bdd ci.inf MD5: EF3179D498793BF4234F708D3BE28633) - runonce.exe (PID: 1532 cmdline:
"C:\Window s\system32 \runonce.e xe" -r MD5: 9ADEF025B168447C1E8514D919CB5DC0) - grpconv.exe (PID: 4452 cmdline:
"C:\Window s\System32 \grpconv.e xe" -o MD5: 8531882ACC33CB4BDC11B305A01581CE) - net.exe (PID: 4464 cmdline:
"C:\Window s\sysnativ e\net.exe" start bdd ci MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - conhost.exe (PID: 5248 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - net1.exe (PID: 6552 cmdline:
C:\Windows \system32\ net1 start bddci MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - sc.exe (PID: 6148 cmdline:
"sc.exe" C reate "DCI Service" b inPath= "C :\Program Files (x86 )\Lavasoft \Web Compa nion\Servi ce\x64\DCI Service.ex e" Display Name= "DCI Service" s tart= auto MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) - conhost.exe (PID: 6588 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 1668 cmdline:
"sc.exe" d escription "DCIServi ce" "Webpr otection B ridge serv ice" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) - conhost.exe (PID: 6800 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 3508 cmdline:
"C:\Window s\System32 \cmd.exe" /C "C:\Pro gram Files (x86)\Lav asoft\Web Companion\ Service\x6 4\bridge_s tart.cmd" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 568 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - sc.exe (PID: 1164 cmdline:
sc start D CIService MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8) - cmd.exe (PID: 3500 cmdline:
"C:\Window s\System32 \cmd.exe" /C netsh h ttp add ur lacl url=h ttp://+:90 07/ user=E veryone MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6896 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - netsh.exe (PID: 5948 cmdline:
netsh http add urlac l url=http ://+:9007/ user=Ever yone MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - WebCompanion.exe (PID: 632 cmdline:
"C:\Progra m Files (x 86)\Lavaso ft\Web Com panion\App lication\W ebCompanio n.exe" --s ilent --in stall --ge o= --searc henbl MD5: 11CE0FC17BFCDCCF929515BD90455BAF) - csc.exe (PID: 3760 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v2.0 .50727\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\rrd1gvmr .cmdline" MD5: 2B9482EB5D3AF71029277E18F6C656C0) - conhost.exe (PID: 3020 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cvtres.exe (PID: 6996 cmdline:
C:\Windows \Microsoft .NET\Frame work\v2.0. 50727\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE S29AE.tmp" "c:\Users \user\AppD ata\Local\ Temp\CSC29 9E.tmp" MD5: E118330B4629B12368D91B9DF6488BE0) - WerFault.exe (PID: 6680 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 2 168 -s 246 4 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 2748 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 2 168 -s 259 6 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 5588 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 2 168 -s 119 2 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 2744 cmdline:
C:\Windows \System32\ svchost.ex e -k WerSv cGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A) - WerFault.exe (PID: 636 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -pss -s 432 -p 21 68 -ip 216 8 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 5960 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -pss -s 532 -p 21 68 -ip 216 8 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 7048 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -pss -s 492 -p 21 68 -ip 216 8 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- svchost.exe (PID: 4508 cmdline:
C:\Windows \system32\ svchost.ex e -k netsv cs -p -s w lidsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- svchost.exe (PID: 4700 cmdline:
C:\Windows \System32\ svchost.ex e -k Local Service -p -s Licens eManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- DCIService.exe (PID: 3348 cmdline:
"C:\Progra m Files (x 86)\Lavaso ft\Web Com panion\Ser vice\x64\D CIService. exe" MD5: 3827CA1C0EC114A29BB576BEF431F070)
- Lavasoft.WCAssistant.WinService.exe (PID: 1888 cmdline:
"C:\Progra m Files (x 86)\Lavaso ft\Web Com panion\App lication\L avasoft.WC Assistant. WinService .exe" MD5: 3442D7F43B57552DB02DD69C13F6E682) - cmd.exe (PID: 4268 cmdline:
"C:\Window s\System32 \cmd.exe" /C netsh h ttp add ur lacl url=h ttp://+:90 07/ user=E veryone MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 1532 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - netsh.exe (PID: 1612 cmdline:
netsh http add urlac l url=http ://+:9007/ user=Ever yone MD5: 6F1E6DD688818BC3D1391D0CC7D597EB)
- WebCompanion.exe (PID: 7100 cmdline:
"C:\Progra m Files (x 86)\Lavaso ft\Web Com panion\App lication\W ebCompanio n.exe" --m inimize MD5: 11CE0FC17BFCDCCF929515BD90455BAF) - csc.exe (PID: 5788 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v2.0 .50727\csc .exe" /noc onfig /ful lpaths @"C :\Users\us er\AppData \Local\Tem p\i6uwqyh0 .cmdline" MD5: 2B9482EB5D3AF71029277E18F6C656C0) - conhost.exe (PID: 4156 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cvtres.exe (PID: 1452 cmdline:
C:\Windows \Microsoft .NET\Frame work\v2.0. 50727\cvtr es.exe /NO LOGO /READ ONLY /MACH INE:IX86 " /OUT:C:\Us ers\user\A ppData\Loc al\Temp\RE S40C1.tmp" "c:\Users \user\AppD ata\Local\ Temp\CSC40 B0.tmp" MD5: E118330B4629B12368D91B9DF6488BE0)
- WebCompanion.exe (PID: 2660 cmdline:
"C:\Progra m Files (x 86)\Lavaso ft\Web Com panion\App lication\W ebCompanio n.exe" --m inimize MD5: 11CE0FC17BFCDCCF929515BD90455BAF)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
Click to see the 1 entries |
System Summary |
---|
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113: |
Source: | Author: frack113: |
Source: | Author: frack113: |
Source: | Author: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements): |
Source: | Author: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: |
Source: | Author: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: |
Source: | Author: vburov: |
Data Obfuscation |
---|
Source: | Author: Joe Security: |
⊘No Snort rule has matched
Timestamp: | 2024-07-22T12:52:20.710966+0200 |
SID: | 2849740 |
Source Port: | 49767 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:10.230018+0200 |
SID: | 2849740 |
Source Port: | 49756 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:13.276896+0200 |
SID: | 2849740 |
Source Port: | 49760 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:09.448983+0200 |
SID: | 2849740 |
Source Port: | 49753 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:16.623558+0200 |
SID: | 2849740 |
Source Port: | 49764 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:14.819899+0200 |
SID: | 2849740 |
Source Port: | 49762 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:53:34.014772+0200 |
SID: | 2849740 |
Source Port: | 49775 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:51:59.048344+0200 |
SID: | 2849740 |
Source Port: | 49748 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:12.515625+0200 |
SID: | 2849740 |
Source Port: | 49759 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:10.988342+0200 |
SID: | 2849740 |
Source Port: | 49757 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:18.083826+0200 |
SID: | 2849740 |
Source Port: | 49766 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:53:28.888202+0200 |
SID: | 2849740 |
Source Port: | 49770 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:53:35.223095+0200 |
SID: | 2849740 |
Source Port: | 49779 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:15.652589+0200 |
SID: | 2849740 |
Source Port: | 49763 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:17.325088+0200 |
SID: | 2849740 |
Source Port: | 49765 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:14.168629+0200 |
SID: | 2849740 |
Source Port: | 49761 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:52:11.790870+0200 |
SID: | 2849740 |
Source Port: | 49758 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Timestamp: | 2024-07-22T12:51:49.871551+0200 |
SID: | 2849740 |
Source Port: | 49741 |
Destination Port: | 443 |
Protocol: | TCP |
Classtype: | Possibly Unwanted Program Detected |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Binary or memory string: | memstr_2e19cebf-3 |
Compliance |
---|
Source: | Static PE information: |
Source: | Window detected: |