Dropped Files | ZeroBOX
Name d0fb5bed25252197_win32[1].exe
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\win32[1].exe
Size 598.5KB
Processes 2084 (iexplore.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 5fcb1ad7eb5087f9645b96b2f7700a61
SHA1 bab944a745d29b523db6dca01f962445027436e4
SHA256 d0fb5bed25252197e74507a0660e07c788afcfd0dce03d72f6c41df5b523700e
CRC32 91B18F9C
ssdeep 12288:jYUhlm4S4F3M9yxm2iNlLGEW1rl9Yx8qLYdvwvyMKt03NctYrp/c1:jJW11jLGECr/LX+4t0my/c
Yara
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • PE_Header_Zero - PE File Signature
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name 6dac2a20e58a30df_{980b8f86-cf3d-11eb-bde1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{980B8F86-CF3D-11EB-BDE1-94DE278C3274}.dat
Size 4.5KB
Processes 2428 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 ff055c5315f5a0ac1c8d4f496a5e286a
SHA1 2bb492920313fd9ae667eb2a1c027d75492c8885
SHA256 6dac2a20e58a30df22f1ce3b94f8c6b4718e090ba9b6607bbb413d9ca1183c95
CRC32 480DB975
ssdeep 12:rlxAFerEgm8GL7KFBcDrEgm8G/7qsLNl26abax1NlUfRbaxodwKi6al:rBG8CG8yLNlIoNlQJXal
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name f30e37f95d88baf4_recoverystore.{980b8f85-cf3d-11eb-bde1-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{980B8F85-CF3D-11EB-BDE1-94DE278C3274}.dat
Size 5.0KB
Processes 2428 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 c8defbe23f77c702a4e224fb05480298
SHA1 9b75238706f1e04a0f335564a3ebddcd9a0a8d92
SHA256 f30e37f95d88baf482fa5da6387be14c58fe00de85b011fef371484a2b82e36d
CRC32 91160A97
ssdeep 12:rlfF2RrEg5+IaCrI0CI7eF2PtcTrEgmZ+IaCrI0CIc8GmRVOeMiqI771NlTqbaxy:rqR5/faTG5/k85jBM+NlWt1NlWtB+
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis