Dropped Files | ZeroBOX
Name 73259df5ca7aed3e_calllcustomer.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP002.TMP\calllcustomer.exe
Size 358.8KB
Processes 604 (callcustomerpro.exe)
Type PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
MD5 fdee3e008188fdb5158ffef4b1129a5e
SHA1 4f5c8077075f3cdc2e07ed5453e4c7d8593ede21
SHA256 73259df5ca7aed3e33ffb61ac44ea5d0a33550075393ccc0246a0af24dd7fb62
CRC32 53A5F4E6
ssdeep 3072:V7mplU9F3r1LaQV6r3TE0Tz0klVG3J/HiKEPPbZKO6M3Uc4xHUirGn9L5EGctTT:Awdr12O6r3z1PGtHiVHbZr3L5ATT
Yara
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name a3a4fcaf19769da1_recoverystore.{0b6c4d1b-6bc7-11ee-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0B6C4D1B-6BC7-11EE-948E-94DE278C3274}.dat
Size 4.5KB
Processes 2788 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 c71e3dbbb7c857f9e01ee1a480a84163
SHA1 01b790fc61edf69c0179a1df2a7231835c6af019
SHA256 a3a4fcaf19769da1918ca234e120cfd4a9b89bcea710c217507e7ccee2f1d08e
CRC32 B33227E8
ssdeep 12:rlfF2ZgorEg5+IaCrI0F7+F2QErEg5+IaCrI0F7ugQNlTqbaxNNNlTqbaxNk:rqV5/1QE5/3QNlWwNNlWw
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 70f316a5492848bb_down[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\down[1]
Size 3.3KB
Type PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
MD5 555e83ce7f5d280d7454af334571fb25
SHA1 47f78f68d72e3d9041acc9107a6b0d665f408385
SHA256 70f316a5492848bb8242d49539468830b353ddaa850964db4e60a6d2d7db4880
CRC32 9EA3279D
ssdeep 96:/SDZ/I09Da01l+gmkyTt6Hk8nTjTnJw1Ne:/SDS0tKg9E05TPoNe
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 6976c426e3ac66d6_noConnect[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\noConnect[1]
Size 8.0KB
Type PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
MD5 3cb8faccd5de434d415ab75c17e8fd86
SHA1 098b04b7237860874db38b22830387937aeb5073
SHA256 6976c426e3ac66d66303c114b22b2b41109a7de648ba55ffc3e5a53bd0db09e7
CRC32 F9D26F41
ssdeep 192:SSDS0tKg9E05TKPzo6BmMSpEJH8x07oLKsiF+2MxNdcNyVE:tJXE05g/uEJH8m7oLKLo2MxncUVE
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 08d38e34824165b1_callcustomer.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP002.TMP\callcustomer.exe
Size 357.8KB
Type data
MD5 662a05bdbb8dfd728313e6466ba31997
SHA1 86b9915e471f473a7e246a4d8a7aac45ba177284
SHA256 08d38e34824165b190474fd35c9fbf9aa6549a5aad4b9f268756fd503fd13d36
CRC32 682EC599
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 1e58d8b34a27cc23_{0b6c4d1c-6bc7-11ee-948e-94de278c3274}.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{0B6C4D1C-6BC7-11EE-948E-94DE278C3274}.dat
Size 4.5KB
Processes 2788 (iexplore.exe)
Type Composite Document File V2 Document, Cannot read section info
MD5 7f45b45e3084d17cddc8f3e49a1a28bb
SHA1 b8691284a61a79c2d69fe241a873fe827c2fe8cd
SHA256 1e58d8b34a27cc238e9bae3e9cc3f34459eab841e0f2729fa16a8225727c72b4
CRC32 C7A48197
ssdeep 12:rl0ZGFqrEgmfB06FlcDrEgmfh0qgNNlTVbaxLNlz9baxz:rGGiGmNNlp+Nlhi
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
VirusTotal Search for analysis
Name 003d30e7d128c677_errorPageStrings[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\errorPageStrings[1]
Size 2.5KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 07d7197d980e82c3ce6b22c0342711ae
SHA1 e3e675f4507d3d2f4f56f06c76abdc40d09dd1a2
SHA256 003d30e7d128c6771b36ab2b0f02d36670e42488d86ba7db00ad862528266060
CRC32 3485002F
ssdeep 48:zTW8quJiyUlyHWKShUpeHRitRflRynLRX4Y1WW90W2olr8tcUV/9z8/pWMI9EMIN:zTW8qIiyUcAhUpIRSRflRynLRX4LMlrT
Yara None matched
VirusTotal Search for analysis
Name 469fdfcaca047a13_dnserror[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\dnserror[1]
Size 6.1KB
Type HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 8c98552955cbb31ebed64742bf23349a
SHA1 e1d12cf6c84e4dca1c69421209e12237633f8e75
SHA256 469fdfcaca047a13a75283d5fd4bb96b56a28666d9df02195fdc2a4b78250539
CRC32 1A5BE0FF
ssdeep 96:uATpCAEQIgGN2P8bWF2oxrjSaFXQsgUkn:ukp4QSN2aWFFjSGXQVUkn
Yara None matched
VirusTotal Search for analysis
Name afce792469d28568_ErrorPageTemplate[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\ErrorPageTemplate[1]
Size 2.2KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 cd78307e5749eb8aa467b025dc66bcd3
SHA1 7f85f932532719bc0ca23a21a24e146cdcd40668
SHA256 afce792469d28568da605230d27a6d5354f9451c60b5a3ce998edeaf098c8327
CRC32 12B03B3E
ssdeep 24:5Lj5x55k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+BieyuSQK:5f5H5k5pvFehWrrarrZIrHd35IQfOS6
Yara None matched
VirusTotal Search for analysis
Name d303191f76a9eb70_callcustomerpro.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP001.TMP\callcustomerpro.exe
Size 371.5KB
Processes 3044 (treelatest.exe)
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 7acdc65b3d56fde4fdf6d2bad8e9f0ca
SHA1 d34fd8fa8c8d2834b2efbc5c06036f7f845fc974
SHA256 d303191f76a9eb7059c4b173424d9639e61da3c3b4526bae73cef68b5e356aec
CRC32 0563BAAC
ssdeep 6144:AahOWp0yN90QEeLIWWzNXr5T3z2xEe7Va1xZ/Q+vXnyIM1st4he2X:Aimy902Il5XlEEecxa+vXVM1dheW
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • CAB_file_format - CAB archive file
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • Win32_Trojan_Emotet_RL_Gen_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name 39f99a25b3f8af6c_tlatest.bat
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP000.TMP\tlatest.bat
Size 44.0B
Processes 2628 (treelatestprores.exe)
Type DOS batch file, ASCII text, with CRLF line terminators
MD5 00bcd37e362e6d90e1285251fc5450e4
SHA1 079b1d1f632603581aec90d970b0d3cc75947784
SHA256 39f99a25b3f8af6cf697864b9e0b3f0d8b949b3d8bc688fb9d94a769013369c2
CRC32 445049BC
ssdeep 3:/qQKWYD0dCCAhs:/kL0dCCAq
Yara None matched
VirusTotal Search for analysis
Name 062165484fcb9238_callcustomer.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP002.TMP\callcustomer.exe
Size 357.8KB
Processes 604 (callcustomerpro.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 87d1a8d56ce3307aece3b799a7b1a9f2
SHA1 f0409ce1d87f6ffd63fdf59fdf7584b151889d05
SHA256 062165484fcb92386de75a68b3e294b4589ee5591188263706e7799543bfe6a3
CRC32 5EE7561D
ssdeep 3072:XxjUC3iEgrVr7QbKxQjjmcdiZanICG+6O6AfxI/ZpsEKxtTT:XhUCyh7EKxQjHiKp6AZI/Ps9TT
Yara
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 07d07a467e4988d3_favcenter[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\favcenter[1]
Size 3.3KB
Type PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
MD5 25d76ee5fb5b890f2cc022d94a42fe19
SHA1 62c180ec01ff2c30396fb1601004123f56b10d2f
SHA256 07d07a467e4988d3c377acd6dc9e53abca6b64e8fbf70f6be19d795a1619289b
CRC32 7FE3FBCC
ssdeep 96:RZ/I09Da01l+gmkyTt6Hk8nT1ny5y3iw+BT:RS0tKg9E05T1yIyw6
Yara
  • PNG_Format_Zero - PNG Format
VirusTotal Search for analysis
Name 1471693be91e53c2_background_gradient[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\background_gradient[1]
Size 453.0B
Type JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
MD5 20f0110ed5e4e0d5384a496e4880139b
SHA1 51f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA256 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
CRC32 C2D0CE77
ssdeep 6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 1beb05868ce93bcc_IE9CompatViewList[1].xml
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\IE9CompatViewList[1].xml
Size 141.8KB
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 9b63e0fb3785ffa49686dd75e303d177
SHA1 e3992de5a1b8f58a11a52ad71f275ae413927eb4
SHA256 1beb05868ce93bcc8fafc46adccdda6d104f3c6f6c6ed454d8a6c0c208d9bd0e
CRC32 F778EDEF
ssdeep 3072:AoSMrEDL1FwhdFFaz6l8vHG+TbFPAzepobjyG7I1K1IB2+Tir8v1IG9aIedyPcFC:dSMrEDL1FwhdFFaz6l8vHG+TbFPAzepR
Yara None matched
VirusTotal Search for analysis
Name 82877b748b1f1a87_thoseintroductory.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP001.TMP\thoseintroductory.exe
Size 359.8KB
Processes 3044 (treelatest.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 e5bbb887a117f13b0919fa9074a2bc2b
SHA1 84ff45e0c77027a972cf3150d984bbd5bb8055f8
SHA256 82877b748b1f1a87370aded74a2e0f16c1c695cfaf73e86d233abbbaa784c0dd
CRC32 EC84D3A3
ssdeep 6144:SGDphnfNmAiToQrYbJMVwFWllwLYGVqgjbOMZsA/4TT:S4h4ZIJMVwFuldGVvsg4TT
Yara
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 41e3f69ecc09290e_httpErrorPagesScripts[1]
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\httpErrorPagesScripts[1]
Size 5.4KB
Type UTF-8 Unicode (with BOM) text, with CRLF line terminators
MD5 dea81ac0a7951fb7c6cae182e5b19524
SHA1 8022d0b818a0aea1af61346d86e6c374737bc95a
SHA256 41e3f69ecc09290ebc49be16d2415036ddb2f7a4b868eef4091d0b5a301762fe
CRC32 5E7F4A18
ssdeep 96:JCc1g1V1riA1CiOcitXred1cILqcpOnZ1g1V1OWnvvqt:xmjriGCiOciwd1BPOPmjOWnvC
Yara None matched
VirusTotal Search for analysis
Name 4f081ca6dad29c45_treelatest.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP000.TMP\treelatest.exe
Size 523.5KB
Processes 2628 (treelatestprores.exe)
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 8d87a6a419052b5ab9e38574e0f8b9e2
SHA1 9417acecb32489d735cbb57a3e10489e0e2e2bae
SHA256 4f081ca6dad29c4528d40a56edccc0859778d055d25b4fb8b129746c9c9a7ee1
CRC32 F5380B94
ssdeep 6144:iahOxMB67r1l/94IuKHEE8NAMwcfVHed9VuxEe2Va1xmGbGD75Gfz24hX2r65OLb:iiYMErWMEEyEd3cEe5xmGbGMfrhXX3x
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • CAB_file_format - CAB archive file
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • Win32_Trojan_Emotet_RL_Gen_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis