Dropped Files | ZeroBOX
Name 29ae7b30ed8394c5_AdvancedRun.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\AdvancedRun.exe
Size 88.9KB
Processes 2312 (MAEK.pif)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 17fc12902f4769af3a9271eb4e2dacce
SHA1 9a4a1581cc3971579574f837e110f3bd6d529dab
SHA256 29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
CRC32 CC276C7F
ssdeep 1536:JW3osrWjET3tYIrrRepnbZ6ObGk2nLY2jR+utQUN+WXim:HjjET9nX0pnUOik2nXjR+utQK+g3
Yara
  • ASPack_Zero - ASPack packed file
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name faa711f56a647a33_iEjqmti.tmp
Submit file
Filepath C:\Users\test22\AppData\Roaming\iEjqmti.tmp
Size 177.5KB
Type UTF-8 Unicode text, with very long lines, with no line terminators
MD5 4104a0860a7f2d089998e15a35e2af42
SHA1 e8832b39adb456828333dc03a9763d316bc6d1e9
SHA256 faa711f56a647a33d32a0d54d80123eca42dfa1186c2bb15b8c1a5d5479e1270
CRC32 4D5FFC88
ssdeep 3072:OJIcSTedOb0wUJQ1PwDztZzweDWniCZPYPC+MGQ8iTVEG+D8VbnRFQ:OmT0PJNPzzWniC+q8Pi2G+D8VbnRq
Yara
  • NPKI_Zero - File included NPKI
VirusTotal Search for analysis
Name a9220271c0eb79e5_d93f411851d7c929.customDestinations-ms~RF13a8d6.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF13a8d6.TMP
Size 7.8KB
Processes 2896 (powershell.exe) 2164 (powershell.exe)
Type data
MD5 b0c9ff441742f3847ea27da9dee7f2cd
SHA1 c42a1eb32ba953a0ce5d8635caabf71b5b281495
SHA256 a9220271c0eb79e5750e0d0e62058ecac560e09cdf9e82ef61aeeabada5d48a4
CRC32 0BBCAB1A
ssdeep 96:RutuCOGCPDXBqvsqvJCwo+utuCOGCPDXBqvsEHyqvJCworSP7Hwxf2lUVul:UtvXoxtvbHnorrxQ
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 5ca054064ada565a_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 2164 (powershell.exe)
Type data
MD5 9d56fc6dbf372a6edd6cd551e97313e2
SHA1 cc96b33087967e800bd24ce8f0d30fa2bb95f220
SHA256 5ca054064ada565a982bc67470f139c24b84e88dabdb6e25031c66f622f7c68a
CRC32 2C363D24
ssdeep 96:RutuCOGCPDXBqvsqvJCwo+utuCOGCPDXBqvsEHyqvJCworSP7Hwxf2lUVul:ktvXoRtvbHnorrxQ
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 824fae3331b95e2f_pa.wsoK.tmp
Submit file
Filepath C:\Users\test22\AppData\Roaming\pa.wsoK.tmp
Size 40.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 41c19a9e8541fcb934c13c075bf47721
SHA1 648a7622d533d79b9a0bb31dc370134ec3a75ed7
SHA256 824fae3331b95e2f88ca60c87a6c9569086906ec76fc1db8d6dee9adddc4e80c
CRC32 560F7642
ssdeep 48:+35TqYzDGF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:Ulce7mlcwilGc7Ha3f+u
Yara None matched
VirusTotal Search for analysis
Name 343547ccd4990682_MAEK.pif
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\MAEK.pif
Size 442.4KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 6d5f00a23f0fc84d7e44a9dbcd31e0b4
SHA1 fcfe53ac6c4727a7d711415632882fc7f5569491
SHA256 343547ccd4990682ba60ae259bf210c4a1078e3de6cee1fcfa48d345d83e23e5
CRC32 75883F4D
ssdeep 6144:EiLj77i/Q7JjlL9Xiu5LRB+PbjHUZJKBeSSBjFQ1R/DYu4bmwadtIVy1:ECj7AQ7JxMyLyPvH5wljaMmwm++
Yara
  • hide_executable_file - Hide executable file
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • UPX_Zero - UPX packed file
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
VirusTotal Search for analysis