Dropped Files | ZeroBOX
Name a9220271c0eb79e5_d93f411851d7c929.customDestinations-ms~RFa69265.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFa69265.TMP
Size 7.8KB
Type data
MD5 b0c9ff441742f3847ea27da9dee7f2cd
SHA1 c42a1eb32ba953a0ce5d8635caabf71b5b281495
SHA256 a9220271c0eb79e5750e0d0e62058ecac560e09cdf9e82ef61aeeabada5d48a4
CRC32 0BBCAB1A
ssdeep 96:RutuCOGCPDXBqvsqvJCwo+utuCOGCPDXBqvsEHyqvJCworSP7Hwxf2lUVul:UtvXoxtvbHnorrxQ
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 0b21faf9306e2b24_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 804 (WINWORD.EXE)
Type data
MD5 b51b29cdee436360968f7775dbb74fa7
SHA1 1433ed15b893b3558876d58215c7a18ecec2cc48
SHA256 0b21faf9306e2b2450fb649f756957d6c2a8e01197bd223672169c9fe4157cfe
CRC32 78AA25F6
ssdeep 3:yW2lWRdIKyW6L7zjTK7j8tOlFItMmShlyn:y1lWOWmrTK7zWpShUn
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_Newfile.zip
Empty file or file not found
Filepath C:\Temp\Newfile.zip
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{31d35423-5cdc-4ae5-9630-1138e3515487}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{31D35423-5CDC-4AE5-9630-1138E3515487}.tmp
Size 1.0KB
Processes 804 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name f7a634927dffd559_~$newf.dotm
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$newf.dotm
Size 162.0B
Processes 804 (WINWORD.EXE)
Type data
MD5 f00b76b9bcdb4e29843155f3962ca339
SHA1 12e898c974aeded071f11f7d1212fbe917d8f048
SHA256 f7a634927dffd55977dd5511e22a233b7c60ef0eb2e7b9c8cd6adc76260c57fe
CRC32 EE7DE2D6
ssdeep 3:yW2lWRdIKyW6L7zjTK7j8tOlFItMmSh1Ill:y1lWOWmrTK7zWpShm/
Yara None matched
VirusTotal Search for analysis
Name d6431d5645fffd05_d93f411851d7c929.customDestinations-ms~RFa69a06.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFa69a06.TMP
Size 7.8KB
Processes 2212 (powershell.exe) 2372 (powershell.exe)
Type data
MD5 260d23ce04a8f8555a73b7d2dc15e911
SHA1 ebad746fb7de847c50f7502a44f6e35534733efd
SHA256 d6431d5645fffd05a23166d630253bc7ce8c099cf6e9c956f8ae5e1249ee8588
CRC32 11D6B213
ssdeep 96:ctuCeGCPDXBqvsqvJCwo5tuCeGCPDXBqvsEHyqvJCworSP7Hwxf2lUVul:ctvXo5tvbHnorrxQ
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis