Dropped Files | ZeroBOX
Name b4778652a9da05e5_d93f411851d7c929.customDestinations-ms~RFb82914.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFb82914.TMP
Size 7.8KB
Processes 2988 (powershell.exe) 3068 (powershell.exe)
Type data
MD5 40c9a8fba0ce52c6aee04cccbf0fad61
SHA1 5669a8836764c2114062760cafe309fbe4776acb
SHA256 b4778652a9da05e5b052044f704dd05147d9e788288b943eee7085dbda0043c9
CRC32 1BA84945
ssdeep 96:+ZtuCcBGCPDXBqvsqvJCwoLZtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:+ZtCgXoLZtCgbHnorLxY
Yara
  • Generic_Malware_Zero - Generic Malware
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name 33f0be926c68f749_sys_rh.bin
Submit file
Filepath C:\ProgramData\sys_rh.bin
Size 1.6KB
Processes 2540 (SystemUpdate.exe)
Type ASCII text, with CRLF line terminators
MD5 9bc83276af97842def832a8e4a57ff89
SHA1 f9412e836938d2e67b1681ef562955218568bd74
SHA256 33f0be926c68f749a4fbede88a55ee546e00dd9041ec762a6d491d30b2286492
CRC32 01A5E621
ssdeep 24:AY+aJXwh9ZC4Qj31Mkm6ERt1OVGoNwEGuBVfSt2axnEvCDUygmiFzQUgWdGYWfor:ADqgha4QD13ERt1hWMtypFs6Gf2
Yara None matched
VirusTotal Search for analysis
Name 64c80419e5ca81a5_dllhost.exe
Submit file
Filepath C:\ProgramData\Dllhost\dllhost.exe
Size 24.5KB
Processes 2540 (SystemUpdate.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 acf4152befc5768daaf11c92fd3899b0
SHA1 f8a210a2a00876f15008f275063988e5cf534722
SHA256 64c80419e5ca81a5bfee32e223b5676aac6d47c4aa8168ceae6247f766c291d6
CRC32 83DC4B2A
ssdeep 384:6pDzRxQY2QaZLixTecaPEPrAIvWZUBp4Qdbi8LNbkus6wCwC7kzCYbmFCTxdccdH:6pD9elPqL3bhD9Ff2X
Yara
  • Generic_Malware_Zero - Generic Malware
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name b7c225ef3cc3e875_d93f411851d7c929.customDestinations-ms~RFb8253c.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFb8253c.TMP
Size 7.8KB
Processes 2884 (powershell.exe) 2988 (powershell.exe)
Type data
MD5 81ca4510272caf505e8091e9a28cb716
SHA1 71414aeec9f1e4a6f5a461b01700cc9cc992cd9e
SHA256 b7c225ef3cc3e87506150eb140e7b9cc127a3469c50a808854acac71a53d98bf
CRC32 FC31E90F
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:EtCgXoRtCgbHnorLxY
Yara
  • Generic_Malware_Zero - Generic Malware
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name a12c34fef1d6475d_winlogson.exe
Submit file
Filepath C:\ProgramData\Dllhost\winlogson.exe
Size 5.2MB
Processes 148 (dllhost.exe)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 6c454e10bbea489cfc96253fe55ec282
SHA1 22fd5c79495ad06036635eff26a31c76d859e3b7
SHA256 a12c34fef1d6475d99aa9af2e8bf1fd55bca83982a0ee2a9131ffd9fd15cb2a7
CRC32 16169542
ssdeep 98304:u0eUU9n9S8uIqzzCRrXdKrMiAeA4qG36UiVuiTK5GaRqayVMBzi0:rU9bZB4L3RYu3GaRqVaW0
Yara
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE64 - (no description)
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis
Name 0d09f312bb272257_config.json
Submit file
Filepath C:\ProgramData\SystemFiles\config.json
Size 310.0B
Processes 148 (dllhost.exe)
Type ASCII text, with CRLF line terminators
MD5 ed14dd820f7a202af04496de4b86cedd
SHA1 0b9440d08060f4d45fbb6f35c8dbdc60f135fd7f
SHA256 0d09f312bb2722572c6efe16c989a9cd52fb54d2f5faf04a05ddb88e64e0f4ef
CRC32 67D11F11
ssdeep 6:h3T6tyHuMRwg5p+/6m17iHKsIdm7wsUcPboTrFshfGB3Qvm1aE7KBM/MI9:h3T6tyHdpq6mMHikIFs5G2vm0E7aCT
Yara None matched
VirusTotal Search for analysis