Dropped Files | ZeroBOX
Name f374376a6558637f_Ritorni.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Ritorni.tmp
Size 62.5KB
Processes 620 (368530214.exe) 1828 (Ape.exe.com)
Type data
MD5 4a2922d544acdbcf6d4d9373a6dd8a64
SHA1 2f895ba2296a429489e075119e1cb2e141c1208e
SHA256 f374376a6558637f1f03e7619f9ce56b9cb72b3320887b05441e61babe97a276
CRC32 8BD5076B
ssdeep 1536:LRdB3v3CMub/yPfA+48xPrQpAgGSL/vdtjQe:LLdqM66fb48FQpjRL3dtjQe
Yara None matched
VirusTotal Search for analysis
Name ad32d9d7641ffa93_vkunfbghbknyq.js
Submit file
Filepath C:\Users\test22\AppData\Roaming\UeAfbbSQvS\vkunfbGHBKNYQ.js
Size 273.0B
Processes 1828 (Ape.exe.com)
Type ASCII text, with no line terminators
MD5 0969e33d07f9b43a8cc441f372a7ee9a
SHA1 a2bf83230fe52a332d17c5f4151328b6bb64986d
SHA256 ad32d9d7641ffa93338d915dcb1708946875e0017b757bd6808fb47e02cb599f
CRC32 B8730254
ssdeep 6:5AThIH8CYM2h2sUS4tRZDbRXp+NI5Uu2JtNbRXp+NI5UuGHzHWDbRXp+NI5UF:5GS6R4t7vVU5Jt9VUJHqvVUF
Yara None matched
VirusTotal Search for analysis
Name cd613c19c8c01be6_prendesse.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Prendesse.tmp
Size 872.8KB
Processes 620 (368530214.exe)
Type data
MD5 d70c0a17546dd934dcf952d08a4f1de1
SHA1 2c503e31e42983514cd7b7c41321b93ae5bd6f4a
SHA256 cd613c19c8c01be6b0069ee961864286c123bba5a2016d8963045db901b423c5
CRC32 FAC15DDB
ssdeep 12288:LpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:LT3E53Myyzl0hMf1tr7Caw8M01
Yara
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
VirusTotal Search for analysis
Name a2fee9b78cc8baaf_salute.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Salute.tmp
Size 563.0B
Processes 620 (368530214.exe)
Type ASCII text, with CRLF line terminators
MD5 181de33cb8e74c11d05fabe9380c1bf0
SHA1 721a51b3ec47ebb645cf00d53d841ba21a4ca3f7
SHA256 a2fee9b78cc8baaf4b4736606f2c3d18b50322cd6867dfe34ee0ab694ed01b40
CRC32 7F96497A
ssdeep 12:Lek4/OjOfdZhjpP5IekgjFze0McFzebFwWJzC5yQ9m/6ktl9Vs:Sk4BXVkgjF/McFON+xknrs
Yara None matched
VirusTotal Search for analysis
Name 2284946c475407d7_L
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\L
Size 1.1MB
Type ASCII text, with very long lines, with CRLF, CR, LF line terminators
MD5 4ebab3f8b72fcbc6f78d1c8e681fce81
SHA1 3e6a1e56f25277abd14b4a22346d223ee1450b85
SHA256 2284946c475407d7f1e4c97583c6b6859b1e315c8a20c011bd6c35da697cfb12
CRC32 67E24382
ssdeep 12288:3BGeYUcNCHihpow505hKMNtEdOR5W7wjAZkbrOtt0/pem46opZhcgnc:WNCHwowEEhwUZm5/pqbVnc
Yara
  • NPKI_Zero - File included NPKI
VirusTotal Search for analysis
Name bd968dffefea7baa_sprcnxiuiz.url
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SprCNXIuIz.url
Size 172.0B
Processes 1828 (Ape.exe.com)
Type MS Windows 95 Internet shortcut text (URL=<"C:\Users\test22\AppData\Roaming\UeAfbbSQvS\vkunfbGHBKNYQ.js>), Little-endian UTF-16 Unicode text, with CRLF line terminators
MD5 c4696c38e2ec76a4fe03baabe3fafac1
SHA1 e48559c7297f3fde3d5cf33a7e2b20acf33fe82b
SHA256 bd968dffefea7baa6bcd9770193869e65d37ec3121c3f935b9d7b0c501cf3e08
CRC32 2407DF64
ssdeep 3:Q+2lRQuRkiglZlo14tEIduhOEjl3QlMIolCl7Pk727juQRbH4ltpulw:Q+2lJglZyKm/UEZglJPZcy76QNYljuu
Yara None matched
VirusTotal Search for analysis
Name 237d1bca6e056df5_Ape.exe.com
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Ape.exe.com
Size 872.7KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c56b5f0201a3b3de53e561fe76912bfd
SHA1 2a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
CRC32 76090EE7
ssdeep 12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
Yara
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
VirusTotal Search for analysis