Dropped Files | ZeroBOX
Name 4023972d3bf87c2c_flashupdate.lnk
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FlashUpdate.lnk
Size 980.0B
Processes 2556 (Wezwanie_swiadka.pdf.exe)
Type MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 15:32:08 1600, mtime=Sun Dec 31 15:32:08 1600, atime=Sun Dec 31 15:32:08 1600, length=0, window=hide
MD5 df95f5bed594c855a1c8bc8fd8b4577a
SHA1 bc35adfb92f61310c40ebdba076ceae0febdd254
SHA256 4023972d3bf87c2c4f0083a5ddff3260c569d6322563501d22b0e87cec7a5163
CRC32 EDE83541
ssdeep 12:8wl0KY3HV7GyuR+/fGYi1Amm/Q18/omNJkKA54t2YLEPKzlX8:8NZqRQmeYSoCHADPy
Yara
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name 7ee927529f7108d8_BrowserMetrics-63327DF3-A54.pma
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-63327DF3-A54.pma
Size 8.0MB
Type data
MD5 2f83a72f095bc42146a77940353d776c
SHA1 7b525857dbae3b79cce3f836475604f46d60008a
SHA256 7ee927529f7108d85841c07e1d05bafa82cb7d5a9a0db3ad9cf804c5a7b1632e
CRC32 1A7C42BC
ssdeep 6144:H9LG+zeL7c/lhRgdTTEDtsHVdUXaHmVGKPFIrgHkjdr:t6bcF
Yara None matched
VirusTotal Search for analysis
Name 976fdb7a18e50537_debug.log
Submit file
Filepath C:\Program Files (x86)\Google\Chrome\Application\debug.log
Size 272.0B
Processes 2764 (chrome.exe)
Type ASCII text
MD5 07696be26a74d74e34f45bf1adebccd6
SHA1 297ba50fccdc02f593f77d27bb531d977096683a
SHA256 976fdb7a18e50537671dc8112a18badfa126fe8bfae994338dedd7ee24a2fdc4
CRC32 7A8C0E96
ssdeep 6:qcUmSlNoqYl2zXAwosRU4LGGmm3V4v8XUXAwosRU4LGGmm3V4vF:nyyqYl2zXAwVRU4LGBm3V6/XAwVRU4Lg
Yara None matched
VirusTotal Search for analysis
Name ab75b7954a0ed4cd_wezwanie_swiadka.pdf
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\Wezwanie_swiadka.pdf
Size 35.9KB
Processes 2556 (Wezwanie_swiadka.pdf.exe)
Type PDF document, version 1.4
MD5 61b9d5892f81196d270840a780995813
SHA1 fc2ff9b9dd39059adc23e1a1d6493337c6208e6c
SHA256 ab75b7954a0ed4cdc04335699bb6f5802f7bfd5d64fd874cd42606b3ac4549e1
CRC32 EB99FAAE
ssdeep 768:0pKeJU0HUBO3LgKDD9Q9YjEPf91BnLU9cWzBb+NQ9n67scW+gJxYwWHwW/P9:0YSsdNXlLUKWzBie6WrWHwW/1
Yara
  • PDF_Format_Z - PDF Format
VirusTotal Search for analysis
Name 5a3ec8851acd1bb6_CrashpadMetrics.pma
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma
Size 1.0MB
Type data
MD5 aea7ffdba870ea9d59d542f890fecc8c
SHA1 2efe83750eebdfacc148d376cc4edfdf8e5d2ac9
SHA256 5a3ec8851acd1bb62d270e9bdca9625da9f34df69ef39608bc2ce3de68960056
CRC32 CB7B9D10
ssdeep 12:bHiZXAVMMOKEKSCemJKlkQPdl/JG89Hy3aJ0oMFgigpCbUycIXuYJ05:bwQOMzBS+Mk0/JvWoMeigp1y5eYW
Yara None matched
VirusTotal Search for analysis
Name 1d4e922d086471c9_fcc61298-a2fd-4f70-8ff1-d80d70dfbc28.dmp
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\reports\fcc61298-a2fd-4f70-8ff1-d80d70dfbc28.dmp
Size 904.0KB
Processes 2764 (chrome.exe)
Type Mini DuMP crash report, 10 streams, Wed Feb 14 12:22:47 2024, 0x0 type
MD5 fb7373c673edfb1c000c1e9081f9b193
SHA1 1abb4836919aae8daaa14dfd80f49df749c50891
SHA256 1d4e922d086471c9fc292aa1f02b5e0c789921b752414d9367fc9020c4500dc1
CRC32 509E101D
ssdeep 3072:jbiSkDdBaOrHp6wD7yYNI5d1K4RqNLHPws3LbE/NDZVTAnmtQelq9MMphEg/PAe9:CBR7DNKqMqj3R
Yara
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 8cbe36c2c4fccad8_metadata
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\metadata
Size 114.0B
Processes 2764 (chrome.exe)
Type data
MD5 2fdef5f1c603a9eec01cd2f8bc4efd5e
SHA1 15d159578e097f769562089de88f2f9bd37c495a
SHA256 8cbe36c2c4fccad8996aba96899b45b5ed6ff9ace97b9388040895e246d44dff
CRC32 8853FAAA
ssdeep 3:mTll+Xl2qyV6jkllDnlt6sD+Ii1UdyWll:mTlEsJ/vfd7/
Yara None matched
VirusTotal Search for analysis
Name 33f2994af8085313_BrowserMetrics-65CCB08B-AA0.pma
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-65CCB08B-AA0.pma
Size 8.0MB
Type data
MD5 f77deca1dc0d1d4fe7a787a40e28c1d3
SHA1 4723e81d0bcab23f16ae4bfc0190b0a750fc1fa3
SHA256 33f2994af8085313ef5f223f056fa1e782da98fa9e5b22ec76448ec3166370ab
CRC32 225882AD
ssdeep 192:nOh5KH1LepN6deIAkxpkLzJ9S7P6kQ7x8FURvCJTj6jvikP4:nOhqLyKPBpkLVSSkGoJn
Yara None matched
VirusTotal Search for analysis
Name 9a03cfe1174b0921_microword.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\MicroWord.exe
Size 4.8MB
Processes 2556 (Wezwanie_swiadka.pdf.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 542678c60cf6de9e6ca876e102b233e6
SHA1 3bf367ed7b05042eb268c87240690b4cdacabbe0
SHA256 9a03cfe1174b0921a10ffd389c6c152b0c0a2c9dd53195d55a9fd1f75d81b702
CRC32 49E8CF70
ssdeep 98304:jmwL7vUKRfk+s5BriIE1gK1NNruzAAgabHJDuf+INCIg4Y:jmwL39KrxEyKHNu8AgI1/dT
Yara
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • UPX_Zero - UPX packed file
  • mzp_file_format - MZP(Delphi) file format
  • themida_packer - themida packer
VirusTotal Search for analysis
Name e3b0c44298fc1c14_nseF210.tmp
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\nseF210.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name d37fcb160d37cfdd_settings.dat
Submit file
Filepath C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
Size 40.0B
Processes 2720 (chrome.exe)
Type data
MD5 a3122d4670c51912628b97bdd6fffb80
SHA1 45d2e3060e09f46071125d6125983c81ae4970a1
SHA256 d37fcb160d37cfddefea794094044b7e588d44c4883c72ba0ef1503e5f9c7d59
CRC32 77809701
ssdeep 3:FkXD3WyqUm:+ix
Yara None matched
VirusTotal Search for analysis