Dropped Files | ZeroBOX
Name b4f47b1da1d43d03_~$iden.doc
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$iden.doc
Size 162.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 72e89282d272a497405db4218a127934
SHA1 0c8e6f918aa4c440a6a6d536ebcdfd703e2aae1f
SHA256 b4f47b1da1d43d03f337d785bc868d68c95347b0d0be3219bf27c7ec64df38bc
CRC32 9B92DFE3
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtksItyXhn:y1lWnlxK7ghqqFksIIxn
Yara None matched
VirusTotal Search for analysis
Name e17a39d513d84d58_msforms.exd
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\Word8.0\MSForms.exd
Size 162.8KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 7139989d2fba26909e90cd7790c24936
SHA1 d9d8caa62d303bde98ecbf4a40a35895fc805524
SHA256 e17a39d513d84d5859948e70c43b6342eeaf619a1faa4174b6b99d5c45f26155
CRC32 45ABEE59
ssdeep 1536:IQWuSL6wNSc8SetKB4YuiMOqQ/WVMO+O9sOHK7K2xBmsqsDPza7vKp:I+SjNSc83tKBduiMnWOXTK7K1Kp
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{a5993b75-13a8-4ac3-a564-a96075f7666e}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A5993B75-13A8-4AC3-A564-A96075F7666E}.tmp
Size 1.0KB
Processes 3028 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name d516a371b6fc0a52_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 3028 (WINWORD.EXE)
Type data
MD5 56a4532b2fc2cf6fd4ec62a29758d231
SHA1 60f68bd8ac5b3f7290daa236bebd5f9c0f1510fd
SHA256 d516a371b6fc0a5270a1323f271bc2a36bc34f9cf06c783a642020c0da8948c3
CRC32 E93E4529
ssdeep 3:yW2lWRdvL7YMlbK7g7lxIt50iSjlVtNmk/tyXhn:y1lWnlxK7ghqqFNT/tyxn
Yara None matched
VirusTotal Search for analysis
Name 0275daac1226b684_15d343a7.wmf
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\15D343A7.wmf
Size 370.0B
Processes 3028 (WINWORD.EXE)
Type Targa image data - Map - RLE 11 x 65536 x 0 +4 "\004"
MD5 c04eb249161372b3ec1102a5f8a38a3e
SHA1 45a7e9fdf9235ee8fdac5bb244e515af89d05909
SHA256 0275daac1226b684ec9845ef32a71c7fd69b2b7cfdd0b27b727a27814626a78d
CRC32 F2488A02
ssdeep 6:M8/kK0Xgtu5S/As0sLk4J/cc26v8VO576u2k8lCKlYEbAKWQ+UgtuYMSVtl:M8/p0v5QosLnP26EVsfDClYExaVtl
Yara None matched
VirusTotal Search for analysis
Name a250740948aba579_microsoftwordupdater.log
Submit file
Filepath C:\Users\Public\Documents\MicrosoftWordUpdater.log
Size 327.0KB
Processes 3028 (WINWORD.EXE)
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 0d1dca5eaad49c2dbd979e1bf0b5f8d0
SHA1 f21b1c8c4482392d69725025e82eddd313f48aad
SHA256 a250740948aba579462397ac95ff10e6b0ee952c2af7d9d726cbfde9da1eaaff
CRC32 FF96C440
ssdeep 6144:3g2iqrzOgpZKUb+xLn/8loIZTbSgM8nzMQfdu24T5WL8gPIAO1Goo:31iqbDKUbw/QtbtM8ZF4dQ8gPIkoo
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis