Dropped Files | ZeroBOX
Name b26d99296cc1f38a_adobe_caps.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\adobe_caps.dll
Size 209.5KB
Processes 7032 (huachen.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 9decb9ebf19e4e45bd75f175140e1018
SHA1 c9d35d2bc78dd37270dbe17f2555324c6f560d11
SHA256 b26d99296cc1f38ad735c36a305eb206b8a9022e92b463886ed918f42dee0b04
CRC32 93A9CC02
ssdeep 6144:c4sJ9Xq8PZUUIw0b5xmKT1XtapIIbtrWwOlHz:cbJ9XTUUM1XtOIIbwd
Yara
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 70d1bfb908eab666_file4.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\file4.exe
Size 160.0KB
Processes 8024 (Setup2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 02580709c0e95aba9fdd1fbdf7c348e9
SHA1 c39c2f4039262345121ecee1ea62cc4a124a0347
SHA256 70d1bfb908eab66681a858d85bb910b822cc76377010abd6a77fd5a78904ea15
CRC32 B6A5F871
ssdeep 3072:CaY0LwJiwqkCPyIrxC55W4NfrZL5P1yxRrh485qC96QnoSe:C7Ylvx83L5aRl4Isp3
Yara
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • IsPE32 - (no description)
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name a45317c374d54e32_jfiag3g_gg.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\jfiag3g_gg.exe
Size 184.0KB
Processes 6096 (customer2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5 7fee8223d6e4f82d6cd115a28f0b6d58
SHA1 1b89c25f25253df23426bd9ff6c9208f1202f58b
SHA256 a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59
CRC32 A2E6C04C
ssdeep 3072:Wqpy/Qpjny+xdr+xG1IJQqv5Os/8+lD0y40rIyTZGnq7gUT+uX2uR:M/Ejn0ai5j/8+lDtTZGnql6n
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name a32e0a83001d2c5d_2.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\$inst\2.tmp
Size 36.0B
Processes 8024 (Setup2.exe)
Type Microsoft Cabinet archive data, 36 bytes
MD5 8708699d2c73bed30a0a08d80f96d6d7
SHA1 684cb9d317146553e8c5269c8afb1539565f4f78
SHA256 a32e0a83001d2c5d41649063217923dac167809cab50ec5784078e41c9ec0f0f
CRC32 EAB67334
ssdeep 3:wDl:wDl
Yara None matched
VirusTotal Search for analysis
Name 720930f64cf55888_uninstall.ini
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\Uninstall.ini
Size 2.6KB
Processes 8024 (Setup2.exe)
Type ISO-8859 text, with CRLF line terminators
MD5 fe4643a8ffc2620c1f9be5f56b435ea4
SHA1 edc0772fc369d545ef9a5d3dd517fba9a1d70cea
SHA256 720930f64cf558880d4658a259de6723bfe89f77bedadfaccec68a72e65f9187
CRC32 5F26657E
ssdeep 48:RbZjNrNWj9z39zH9394989zC9r9x9399L9f9/9u9G9G17eHdGVydsJWM0qK1PY1m:/zMxBNW6AxzN9RFloBxNVJJWqwPr
Yara None matched
VirusTotal Search for analysis
Name 10e5ac89b123f7a6_fj4ghga23_fsa.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\fj4ghga23_fsa.txt
Size 367.0B
Processes 5752 (jfiag3g_gg.exe) 6096 (customer2.exe)
Type Netscape cookie, ASCII text, with CRLF line terminators
MD5 4c26325fb75a37583434f62a7c665474
SHA1 495bff1c1a803ea047d12d08ec53d4e312df01c1
SHA256 10e5ac89b123f7a61c425f13a326851d9ae8afe0b8249c22a0a54a0b00345d98
CRC32 0329FBEE
ssdeep 6:SIB8uTEv3rT66Dvl03rT6D36ruIX0x8ptTUL2Scq0finQHPzWZW4vopYxA66SQ3:jB8OEv7PDvl07I36RXs8PY5cqLnOivoF
Yara None matched
VirusTotal Search for analysis
Name 783d47c446d1e482_md8_8eus.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
Size 805.0KB
Processes 8024 (Setup2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 b72ca731ce917c0cf7893702be1e30af
SHA1 d77a405a51e88c75b3bee2ab29662101ffb3e0a3
SHA256 783d47c446d1e482c19fbc6ded572ea16d5784dc775073662827c31f32d9a0ef
CRC32 ADEC27DC
ssdeep 12288:HMpDy6+/dlE1HqD/cvxW8Fs1gxsz+3wajvU1fOqDwWQ703Pptdi5hpHzsRhiQu3W:spKnofGgxCaodOqDwWQ703PpGpIRhiL
Yara
  • VMProtect_Zero - VMProtect packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 9c7186723c961a7a_temp_0.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\$inst\temp_0.tmp
Size 2.4MB
Processes 8024 (Setup2.exe)
Type Microsoft Cabinet archive data, 2473762 bytes, 6 files
MD5 024256c2a33af5625064f18a1d6c5c0c
SHA1 52f6a1899d412aa72a50d603e33ad08bb0f100db
SHA256 9c7186723c961a7acd73bed874f26c9a471f20a1ec33064c1b3a9660c4ba68c7
CRC32 C7F597CE
ssdeep 49152:k8b4OEkgGTFPZ/Q6hVp/Q1/wMOHST9y74WAoym5VD39ZhF6VdT4M:fb4OE6TT/TdY1TOyT93xypZhFs0M
Yara None matched
VirusTotal Search for analysis
Name 8b581869bf8944a8_jfiag3g_gg.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\jfiag3g_gg.exe
Size 61.5KB
Processes 6096 (customer2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5 a6279ec92ff948760ce53bba817d6a77
SHA1 5345505e12f9e4c6d569a226d50e71b5a572dce2
SHA256 8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181
CRC32 4FB6B99A
ssdeep 1536:kFqVH99TlY1Gsae6hiQ0OghNUenX7snouy8/JVz5:79TlY1Gsae6hKhNUaX7sout/JJ5
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 01808f7bce25db18_install.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\install.dll
Size 5.5KB
Processes 7032 (huachen.exe) 8168 (rundll32.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 5e6df381ce1c9102799350b7033e41df
SHA1 f8a4012c9547d9bb2faecfba75fc69407aaec288
SHA256 01808f7bce25db18bce99e432555fcfff148a1d931128edebc816975145cabd7
CRC32 DD4D555B
ssdeep 48:q06Bne2I+Zdn1MG9trHvY9eQtt1IEpRZWAbfbdyR+P8Wseu/gdW:r6hk+ZJyB46t1IEZWiuXI
Yara
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name fe9e28ff0b652e22_fj4ghga23_fsa.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\fj4ghga23_fsa.txt
Size 31.0B
Processes 3456 (jfiag3g_gg.exe) 6096 (customer2.exe)
Type Netscape cookie, ASCII text, with CRLF line terminators
MD5 b7161c0845a64ff6d7345b67ff97f3b0
SHA1 d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256 fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
CRC32 03997E72
ssdeep 3:SIWG8Advn:SIB8uv
Yara None matched
VirusTotal Search for analysis
Name 02b51b8e732ff02e_install.dll.lnk
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\install.dll.lnk
Size 796.0B
Processes 7032 (huachen.exe)
Type MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, ctime=Sun Dec 31 15:32:08 1600, mtime=Sun Dec 31 15:32:08 1600, atime=Sun Dec 31 15:32:08 1600, length=0, window=hide
MD5 4a7806de9590904a313be10aed7a58fa
SHA1 33fa8a36fd39effaafc24fef8621e7e231a0f0e5
SHA256 02b51b8e732ff02e18b02d125b41d975e981b58e018ac59a81a692067bbd350e
CRC32 75A37135
ssdeep 12:8AlXEbC3pQVe/4V3lrW+filrs/Q1cwADmNz4t2YLEPKzlX8:8A7pQQClK+filrLbBPy
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name 689fb410bd14b79f_customer2.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\customer2.exe
Size 971.0KB
Processes 8024 (Setup2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 6d7603e4fd4d633cae7eaee0f1029a17
SHA1 6c601009e71dc9201f30778f620d018ced0b067d
SHA256 689fb410bd14b79f1932953f7bd35e3569c75f99e6c507f8a37eaeb9760e9b5a
CRC32 A7628EE0
ssdeep 24576:LMuFuRDs+a14JiNwXlenXTNkdBAnlXG6+Z1mbXgL3:H0Ds+a144NwVenpkUlXF+Z1IQL3
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • IsPE32 - (no description)
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name b3a3c03a2b140d4f_uninstall.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\Uninstall.exe
Size 97.6KB
Processes 8024 (Setup2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 56b3225c7b1d6f05b4ba4ba7b4ce2202
SHA1 27c0ed1a6d25a68a48950a7ede29d87e1f2b1461
SHA256 b3a3c03a2b140d4fbe9bac4416866210d014da4c64355b395715f2d4c2506c46
CRC32 6DE3DA1A
ssdeep 1536:zO/z6hPABUjO/Zd1716EoLiL4l1HdIaqQPDm0xK8i6f0Zn9PRVW8sW45o75M:kzgjO/Zd1RePDmZ8tf05iW4u1M
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name 505e4ac23b897ca8_setup.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\setup.exe
Size 347.0KB
Processes 8024 (Setup2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 a8cc9dda6be409dfa3557836e36b0eb6
SHA1 0c7d8496ed16ab77fbab240f7e327748cdbe86a8
SHA256 505e4ac23b897ca84f0689e624202253255edfe200c0c40ab2fb8f6c362de4ba
CRC32 C7E508FF
ssdeep 6144:YsP5fI5BT7ofaUvJGBJOjxzlh+oVu+UXz6JbcVSt:YsP5g5BTUfaU8JOZlsokZXOJd
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • Trojan_Win32_Glupteba_1_Zero - Trojan Win32 Glupteba
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 489b212676f1f9bc_install.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\install.dat
Size 544.9KB
Processes 7032 (huachen.exe) 8168 (rundll32.exe)
Type data
MD5 15bd2bbf870f580e27ceff98747ca6b5
SHA1 4964d6c024ac25972a6be4316dfe55de9eb38d26
SHA256 489b212676f1f9bc593d28aafb2229b66292bba19c029a011e95540a94e4edd2
CRC32 8D76CFDC
ssdeep 12288:qL9GtrB6svl9Wldt9lKD0sDxtv/S20NNEMQl:qL2dHqpHM0sqpy3
Yara None matched
VirusTotal Search for analysis
Name cf6ed4efcb1b7394_huachen.exe
Submit file
Filepath C:\Program Files (x86)\Company\NewProduct\huachen.exe
Size 800.0KB
Processes 8024 (Setup2.exe)
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 8acd95006ac6d1eabf37683d7ce31052
SHA1 e3e9e4d1aa7588afb8d24b215e1e61b0de4b8e27
SHA256 cf6ed4efcb1b7394e2e4458bad29b9cc43102295411411a8a4306558aed128ea
CRC32 A43AC7A0
ssdeep 12288:H5bJ9XTUUM1XtOIIbwdWL9GtrB6svl9Wldt9lKD0sDxtv/S20NNEMQB:Hb9j+Xt0w4L2dHqpHM0sqpy/
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis