Dropped Files | ZeroBOX
Name a4c86fc4836ac728__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-77DD7.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 2612 (Needle_Setup.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 4ff75f505fddcc6a9ae62216446205d9
SHA1 efe32d504ce72f32e92dcf01aa2752b04d81a342
SHA256 a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81
CRC32 B1C5F7C5
ssdeep 96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name e19781aabe466dd8__isdecmp.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-77DD7.tmp\_isetup\_isdecmp.dll
Size 13.0KB
Processes 2612 (Needle_Setup.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 a813d18268affd4763dde940246dc7e5
SHA1 c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256 e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
CRC32 03FC4C88
ssdeep 384:BXvhMwoSitz/bjx7yxnbdn+EHvbsHoOODCg:BZ7FEAbd+EDsIO
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 43a656bcd060e8a3_Needle_Setup.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-4D249.tmp\Needle_Setup.tmp
Size 1.1MB
Processes 2560 (Needle_Setup.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 bcc236a3921e1388596a42b05686ff5e
SHA1 43bffbbac6a1bf5f1fa21e971e06e6f1d0af9263
SHA256 43a656bcd060e8a36502ca2deb878d56a99078f13d3e57dcd73a87128588c9e9
CRC32 66998E33
ssdeep 24576:jYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5lNx94k:KGUhni7iSFCQ9J
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • mzp_file_format - MZP(Delphi) file format
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 9e553f2151e508a2_4advapi32.drv
Submit file
Filepath c:\users\test22\appdata\roaming\4advapi32.drv
Size 5.4MB
Processes 2764 (Needle_Setup.tmp)
Type PE32+ executable (DLL) (console) x86-64, for MS Windows
MD5 08fe1f292d723b1d21328e8c3a435741
SHA1 1454a858d5c6e888521ac3004a0c9f593b85be0f
SHA256 9e553f2151e508a2ef0b7a8e2af669331cf0c7ce524b370d4af1eb1f51d7fe7e
CRC32 1D250B12
ssdeep 49152:6oDpm4sS5znr68z6w2jfa1yuDpoYkFAPi8oNAjQXKG2BPEWt07DCHtRNTGtNdevx:xhnx6w2u19mFAPib2hKE7egivrDC
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsDLL - (no description)
  • IsPE64 - (no description)
  • DllRegisterServer_Zero - execute regsvr32.exe
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name b9a86a0d08347db3_unins000.exe
Submit file
Filepath c:\users\test22\appdata\local\unins000.exe
Size 1.1MB
Processes 2764 (Needle_Setup.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 75dec547cef95b93fc498518b0b22277
SHA1 2a82edb095a41a4b82b36bccba71121e464d8e71
SHA256 b9a86a0d08347db35172032780c06c410adbea2d882481bb869fe00e1f8df361
CRC32 43CAADE2
ssdeep 24576:bYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5lNx94f:yGUhni7iSFCQ9g
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • mzp_file_format - MZP(Delphi) file format
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 9884e9d1b4f8a873__shfoldr.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-77DD7.tmp\_isetup\_shfoldr.dll
Size 22.8KB
Processes 2612 (Needle_Setup.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
CRC32 AE2C3EC2
ssdeep 384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name d539dfa58d17d1f2_unins000.dat
Submit file
Filepath C:\Users\test22\AppData\Local\unins000.dat
Size 3.4KB
Processes 2764 (Needle_Setup.tmp)
Type data
MD5 cf4b595edc4010488a832470069d559c
SHA1 3d5735066eef698d48146aca2c826352c8bb54b6
SHA256 d539dfa58d17d1f2942353a27a1943909eb3b1b48e8067819ed31c755bff3b73
CRC32 A2274650
ssdeep 96:ls1dblhcpvwvJu82tiK2Cdfc1AGlEDA4MZAe2Li3HhY:ls1dphcpvcJu1i+f7fDSmCHq
Yara None matched
VirusTotal Search for analysis
Name 44e8aa0601fffe82_590aee7bdd69b59b.customDestinations-ms~RF387157.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF387157.TMP
Size 7.8KB
Processes 2900 (powershell.exe) 2084 (powershell.exe)
Type data
MD5 ee6cfd78f72f03663db2a7df0c696dd7
SHA1 56126e81a5f6577f8e24a890185d0c9eb600fa02
SHA256 44e8aa0601fffe82c494bbc7d7280aa3bc5e90effe2aee2d716d5716e1d6b568
CRC32 F27137C4
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCworu4tDHXyGlUVul:EtCgXoRtCgbHnorBTyY
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis