Dropped Files | ZeroBOX
Name 8a33833537b4a632_~$sdqweqw.dotm
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\~$sdqweqw.dotm
Size 162.0B
Processes 1212 (WINWORD.EXE)
Type data
MD5 95268069cfdf8da23704ee676b9730f5
SHA1 0ea168f35dde2de5735aad23bb1c638d8feda199
SHA256 8a33833537b4a63218a7cd99dd4eacebcc900eb0022468b60b7322b09c1d5456
CRC32 F1F6EA12
ssdeep 3:yW2lWRdV3GoW6L7Y3l/vXK7nh3tpuItOtVlNJkll/n:y1lWcoWmeK7fO2ll/n
Yara None matched
VirusTotal Search for analysis
Name 3f5a4b98badbf4c1_~$normal.dotm
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
Size 162.0B
Processes 1212 (WINWORD.EXE)
Type data
MD5 956fe7ffcbe247951a43656508a05469
SHA1 05c88121b82fa4284ceaf0a28db6d8f878ae0776
SHA256 3f5a4b98badbf4c10dbbbb5ce8670aafe34030b45c9cdbed791f16ffbc228d6b
CRC32 B7AA9478
ssdeep 3:yW2lWRdV3GoW6L7Y3l/vXK7nh3tpuItOtVlNJcSl/:y1lWcoWmeK7fOd/
Yara None matched
VirusTotal Search for analysis
Name 4826c0d860af884d_~wrs{be4cde67-8279-41d0-b946-07cb50716005}.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BE4CDE67-8279-41D0-B946-07CB50716005}.tmp
Size 1.0KB
Processes 1212 (WINWORD.EXE)
Type data
MD5 5d4d94ee7e06bbb0af9584119797b23a
SHA1 dbb111419c704f116efa8e72471dd83e86e49677
SHA256 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
CRC32 23C03491
ssdeep 3:ol3lYdn:4Wn
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_Newfile.zip
Empty file or file not found
Filepath C:\Temp\Newfile.zip
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name d6431d5645fffd05_d93f411851d7c929.customDestinations-ms~RF214d1fa.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF214d1fa.TMP
Size 7.8KB
Processes 2224 (powershell.exe) 2376 (powershell.exe)
Type data
MD5 260d23ce04a8f8555a73b7d2dc15e911
SHA1 ebad746fb7de847c50f7502a44f6e35534733efd
SHA256 d6431d5645fffd05a23166d630253bc7ce8c099cf6e9c956f8ae5e1249ee8588
CRC32 11D6B213
ssdeep 96:ctuCeGCPDXBqvsqvJCwo5tuCeGCPDXBqvsEHyqvJCworSP7Hwxf2lUVul:ctvXo5tvbHnorrxQ
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name a9220271c0eb79e5_d93f411851d7c929.customDestinations-ms~RF214caf5.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF214caf5.TMP
Size 7.8KB
Type data
MD5 b0c9ff441742f3847ea27da9dee7f2cd
SHA1 c42a1eb32ba953a0ce5d8635caabf71b5b281495
SHA256 a9220271c0eb79e5750e0d0e62058ecac560e09cdf9e82ef61aeeabada5d48a4
CRC32 0BBCAB1A
ssdeep 96:RutuCOGCPDXBqvsqvJCwo+utuCOGCPDXBqvsEHyqvJCworSP7Hwxf2lUVul:UtvXoxtvbHnorrxQ
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis