Windows
Analysis Report
Microsoft.VCLibs.140.00_14.0.33519.0_x86__8wekyb3d8bbwe.zip
Overview
General Information
Sample name: | Microsoft.VCLibs.140.00_14.0.33519.0_x86__8wekyb3d8bbwe.ziprenamed because original name is a hash value |
Original sample name: | Microsoft.VCLibs.140.00_14.0.33519.0_x86__8wekyb3d8bbwe.Appx |
Analysis ID: | 1393030 |
MD5: | 21de135a5ac9248d0683da5b7b08f4db |
SHA1: | fc358891923a5c9c31398fecfc600ecb1b992014 |
SHA256: | 7ba6ea7bc32cd58b7e0683da588796086accfb74efb7a3e525e9f8014d2ad663 |
Infos: | |
Detection
Score: | 4 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 40% |
Signatures
Classification
Analysis Advice
Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox |
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior |
Sample may be VM or Sandbox-aware, try analysis on a native machine |
- System is w10x64
unarchiver.exe (PID: 1100 cmdline:
C:\Windows \SysWOW64\ unarchiver .exe" "C:\ Users\user \Desktop\M icrosoft.V CLibs.140. 00_14.0.33 519.0_x86_ _8wekyb3d8 bbwe.zip MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2) 7za.exe (PID: 1312 cmdline:
C:\Windows \System32\ 7za.exe" x -pinfecte d -y -o"C: \Users\use r\AppData\ Local\Temp \t2f21tjr. pdx" "C:\U sers\user\ Desktop\Mi crosoft.VC Libs.140.0 0_14.0.335 19.0_x86__ 8wekyb3d8b bwe.zip MD5: 77E556CDFDC5C592F5C46DB4127C6F4C) conhost.exe (PID: 3468 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
- • Compliance
- • E-Banking Fraud
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | File opened: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File created: | Jump to dropped file |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep time: | Jump to behavior |
Source: | Code function: | 0_2_00FDB286 |
Source: | Thread delayed: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Disable or Modify Tools | OS Credential Dumping | 32 Virtualization/Sandbox Evasion | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 32 Virtualization/Sandbox Evasion | LSASS Memory | 3 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Timestomp | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
0% | ReversingLabs |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1393030 |
Start date and time: | 2024-02-15 18:02:55 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 19s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Microsoft.VCLibs.140.00_14.0.33519.0_x86__8wekyb3d8bbwe.ziprenamed because original name is a hash value |
Original Sample Name: | Microsoft.VCLibs.140.00_14.0.33519.0_x86__8wekyb3d8bbwe.Appx |
Detection: | CLEAN |
Classification: | clean4.winZIP@4/17@0/0 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, WMIADAP.exe, SIHCl ient.exe, SgrmBroker.exe, MoUs oCoreWorker.exe, conhost.exe, svchost.exe - Excluded domains from analysis
(whitelisted): ocsp.digicert. com, slscr.update.microsoft.co m, ctldl.windowsupdate.com, ti me.windows.com, fe3cr.delivery .mp.microsoft.com - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryValueKey calls found. - VT rate limit hit for: Micros
oft.VCLibs.140.00_14.0.33519.0 _x86__8wekyb3d8bbwe.zip
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3917 |
Entropy (8bit): | 5.883035645303162 |
Encrypted: | false |
SSDEEP: | 96:aLVTLi+LOve98bpOdnZW4iKVP7BIk2OgONyxCdFfWMaKeQCfocYjVOsfesji:2Hi+ceebp4nw3KVP7BIk23SyodFf9aKK |
MD5: | B5AB48174AC1E50636F676D78AC60885 |
SHA1: | C6FB64202419F79AA1860332FBA2B661170DEDE9 |
SHA-256: | 16159C2589807F531084BBAE3666F3357A815C0F71F25E830C5A7784BCE1CA26 |
SHA-512: | 94968DBD2E81EE68DEA7E4D0B1E91D887E40FCE8932C94F1166206216327D235217C2504299BA9C20C632BB9185C1C97778329412ED1FF095D15E6C58598B260 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1266 |
Entropy (8bit): | 5.353407091365893 |
Encrypted: | false |
SSDEEP: | 24:Jdjl4+AA+AN/+K+tTzIj+ENgPYzDfDJCIUT4XbJ14PUrrw3x4RvPUZHShNfitFfY:3jRATANmtxz2+ENgADfDJGT4rJ14PeWo |
MD5: | C4899274436EDB5A4B2BB415077CC26E |
SHA1: | 915D3B714DDD4989341328F210E6FCE246B530CF |
SHA-256: | A340A8576FC77ABAA6980A6E2910EB508FC8EB40601CD5C31EAFC725EBDD44B8 |
SHA-512: | 4608FBD0065A07718ACCAFFE9DC7C7C5A9B8D4613729A7540E043360F05F1F28D5664B7D95B24D0BF65F9CF262C66DD1F23C02FDF208D00A835D63890E7395DA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13920 |
Entropy (8bit): | 7.468121871891257 |
Encrypted: | false |
SSDEEP: | 384:MeBQIa8MFi3g9h1RcvBxEfU/EtHNsAR9z2Zc:MYQ5jRWBWUyts89zEc |
MD5: | D50D4C943A29018E1F025BFF642EE460 |
SHA1: | BF1752CBC750F7D0BC355ECBC77F092B36CCD250 |
SHA-256: | 65CCA5143E7488DD22C28A8EB3CDCA6D8CA42BF52F06944E34E6F335B9532ADE |
SHA-512: | 0D67CA61E9A77312C666B66060A08DE12B63DEC501ECD0888DDD92E2619ABF614939B0F9FABF834BCF0E747AA9024A245426B8940830FFDF336644CE1B962784 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12103 |
Entropy (8bit): | 7.532293471634435 |
Encrypted: | false |
SSDEEP: | 192:0zQ8pZakTMFiJFg9h11zcvBnxEfezx1BI8HNsAX01k9z3AqmZNqggU:eQIa8MFi3g9h1RcvBxEfgxLtHNsAR9zE |
MD5: | 026915E804FFB968054B02E0DD6359A4 |
SHA1: | 0C8F2030F40583597DA60665F21493BCB5B7A3A9 |
SHA-256: | BC36A2BFFAA4CAD37251DAEF29FD90BABFFC268B9D4FF64BB754989B74696D33 |
SHA-512: | F5C7985C8ED0E0EB4591747E2D8CE259AD1A8226F8B10B4B09D8B38372CAB761E6F44FF83544FB39C5A6DD8DB3527630B2FEC95D26C9DFB6F5157FCDC37D8221 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 610 |
Entropy (8bit): | 4.981731155277698 |
Encrypted: | false |
SSDEEP: | 12:TMHdt266fY4cufY94Jef/Hfb2bqDfbqbqF8LfblbqQ0fbNJzc:2dtp6fYyU22/q2mXl2QAk |
MD5: | FE3425FF68F8A510322A40A0BDF490B5 |
SHA1: | 20B31584C7128E3EE9B566953175F5EF03CD0BE8 |
SHA-256: | 6695CE88024A05FD8E40ECCFE286DF8DBBC8AC596FA4B28A4BDE0123192277A7 |
SHA-512: | 02CEA7FB3766236E2B400AA46E5425735ED2D40E1D0E64663B9BE76132E56AA3732A13636BB8E9E0DCE77A7877F5FEF3CF3C2C2939DA1898508FC4D0C7F6B1F5 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 238112 |
Entropy (8bit): | 6.618098226597798 |
Encrypted: | false |
SSDEEP: | 6144:Wm/MxlPK7TVtEug1Vmt8nv7y6fs9IyHRU30yPmXspIw/88RSux6D12z/VoESioeE:j8XzfCUkRBw/6ux9znSrL |
MD5: | 78CE4ABB272C079FC55C040B5C86632F |
SHA1: | 99CA1FDFCD21823C2F7560AADC6BB28EE5F84149 |
SHA-256: | 52F6101A4E717B2C3D981DF81779717CCA2012663A5D67951894F499668553E0 |
SHA-512: | 6940BA75C40CB1A1350FAB14C01959873BF56D734B0F9AE6E3015F1CA7B59DA2FF95FD492203273FBBF4F0650B879D4FDC2487DCFDC2895992A77DA05757772F |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 426 |
Entropy (8bit): | 7.241494576863163 |
Encrypted: | false |
SSDEEP: | 6:6v/lhPahmTfzsXZMhyUE5Wmtpz7B+CiWiPwA/KCFq4I8xwt9lOw4h8hwJ25wgCp4:6v/7xAZMg5WmPz7B+hlI+ZkOw6p2ug1 |
MD5: | 5E369B22824C11DE956BA55DBBF33906 |
SHA1: | 62FC5D2CFE520B4BC6AB543A9256D7A88D3B8D5D |
SHA-256: | DA8591012E64D70D2320065D39B921CEAB3A74002F276F5B7052478518C4F331 |
SHA-512: | 266EDB9719E7AE85FC7F12956963D97EFE8AAB3F7FC0D74508AF6F26D9C9D438D4C6016721ED2AF52F5AC50BBD6CFEB56F1284C2347C61218BF566B3C6AEFCCF |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 22840 |
Entropy (8bit): | 6.4974206019398775 |
Encrypted: | false |
SSDEEP: | 384:qhbI99u3JojthPAXSEaWcnGWRTanFtX9g1EWb+NNPR9zKTusV:lk3Ghut20npCEkq9zwV |
MD5: | 3355094D0A356BEE95ADDB0572ED21ED |
SHA1: | 93F188EBB74D4E5BDC1D939227BE41A258827EAC |
SHA-256: | 891602567683A25EFC096203446591CF3923D84BB31D94A642C2115D9D31BCBA |
SHA-512: | 00655D512B9C0682D95F53FA68C3C511420DCE0008FA7AEC5ABA33C6C58E4DF5AC22DA683FAD025ED754145B5AE928480834062DB1D290F61CF311A7A02BA3D7 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 241856 |
Entropy (8bit): | 6.748647709604506 |
Encrypted: | false |
SSDEEP: | 6144:St/x5zxHdwmhHcwHZ3uOwM3K02dVCOsoRTp9YZS0C9kWWuc0yxEp:exHhhHTHduBMa0OsoRTpyZu9kWU0zp |
MD5: | 71287113063090890998DAEAB02F1492 |
SHA1: | 210E6DE17FAF210B16A1B3CB6D653812FEAE6921 |
SHA-256: | 4399C9D97BD9C939FCDD9F3947BA0FE1076B6BB6D00321213D28B497ADD77223 |
SHA-512: | 6EA47AB85B2AE0828A29192D3197344BD9220D0210CDF317550FB16F6ACC61A54C63DB22F04B43824DD1CEDAF3547F653727964783C679F1BA79EC9A3BEB31C9 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 439640 |
Entropy (8bit): | 6.669083576952026 |
Encrypted: | false |
SSDEEP: | 12288:tc8W4YMOIznZlfWKo18SVn2dpbhUgiW6QR7t5s03Ooc8dHkC2esK82X3QoQ:thYMOIznZAKo18Sodm03Ooc8dHkC2ene |
MD5: | DE8A460B6748276061E93424045C5085 |
SHA1: | 0FC32F13957613F74B6BD782B023918E0F344B77 |
SHA-256: | 35775D3A21C56FC5FFE602868C2F39704B7D967F6E3689993B80781572F00711 |
SHA-512: | E7AFFCED7F284F04BEDBBD8D4765E2E747E445D3386F4C92AC314846DA1D8BD98AFE87B62DDA9A7DD207EB504EBEA372B9EF16AE51FC2E7A91938992660B2293 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 35128 |
Entropy (8bit): | 6.5785921081364895 |
Encrypted: | false |
SSDEEP: | 768:6+5+wdeKh9nZj+CjAReFALKWKyRnpCcl8hYg69zz:66+wdek9dljceFALKv+P8yrzz |
MD5: | DF1F8D9A4FC4B2455E92CA986880C316 |
SHA1: | 24E357AB376FE0826FAA020F33FFFBC876676791 |
SHA-256: | E1C262CCA7EC5F23CC331CE9DD70E7ABE238B448F647A729093F8333C943C04E |
SHA-512: | B96209E8AC7AEC845B83F27FDC06E63851CF884EC22CC8EDBEBD99BEF524A412CFA2984B7EED29D22C29AA386ED8922A21D1348C1D94EEE25DEE5EE5A7D9EF0E |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 20176 |
Entropy (8bit): | 6.4294651808848595 |
Encrypted: | false |
SSDEEP: | 384:Qk7G3WseAcOJMjjrEVWiXiWy7nFtX9g1cswqY/6fR9zzEeW:P/OkYBe7npCcc/9zM |
MD5: | 8095595C4BE5290B3B6706DECE6186E5 |
SHA1: | 433AA9C59C685B81065F45C11E130A43EF909C05 |
SHA-256: | 88FDC721B71CA3DA41B0FD645BB7822EB713CA9600860C2C135AC383C09ECA19 |
SHA-512: | F35C18B573AE704F36E0288E71C019B45F96B26AEDEF0254C0DE22B1AE5993D4856988B700737AFF62DEDE6F9CAD4C3B0D32840D7174BBF85CD61E85EA5A5B1D |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 347040 |
Entropy (8bit): | 6.452306381955334 |
Encrypted: | false |
SSDEEP: | 6144:WLde6cD4ujbaOB6IUF04I/L6DTzxu2jeRQSLDfNpw3RLtRjQ9xf:hhsu3kWX6f9useukh4RLtRjQ9V |
MD5: | C8B63977B50A68B8DCA06D6CCE61F831 |
SHA1: | 21E6241795EF682B07B2BE1E07C5378C99D32B56 |
SHA-256: | 7F66C5EACC5323B0FF262D4CDEA1ADB75455A9EE9BAC55E4DA8DEBA757AFE7B9 |
SHA-512: | E69319C4106987DDCBA8768263C7F2655D0CA6E0D3D910D0BFDC651B2A2AA3CDBF33F36C8B47E2A2C9C7086EF4CD170207E756647E5FEB55EDBA6FEA25D741FA |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 273728 |
Entropy (8bit): | 6.554132849934548 |
Encrypted: | false |
SSDEEP: | 3072:wzRTU8caSFKPExgbXBXMAgS4WMwNZuQRcqZBD16rhDRnEL5RkPHoTRg2iaBbGwxe:Ta5IyXu1wzuQhRBSbbhrj |
MD5: | D67248D995BADFD6279FAA5A39F810E5 |
SHA1: | 5CBBDFE9D28E93A5CA91A699F934B63BEA614004 |
SHA-256: | EE3899BA4C916E88ABBE98ED0BD98FFB5B46F3B072E3FDC01BC9AC46D80E0136 |
SHA-512: | DE75AF1086FB10847B6F0FFC0EEBCBAADF27AE2D2D628FC61676CD1B7EFB97BB9398CC2251859621BD985053101B0B16B31AD202E2BA910EBF34F1ED2D462F4B |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 54256 |
Entropy (8bit): | 6.720711859933193 |
Encrypted: | false |
SSDEEP: | 1536:9XtNxZ1jb5M4yrPfWmQb+LSCxpwYdw/mwezy:xtNxDjpAxpwYS/mHu |
MD5: | 08706B9A202FA5B75FEB2FA8307C07AD |
SHA1: | 0812CFAC5CE070EB9681DF4F2AD43FFF1739CF9F |
SHA-256: | B065C21F34F90CEA54D094629693ABBCF622C7AD03809114CFEF91349C8809A7 |
SHA-512: | 0F10B3178D6DE515156F1AEC7C10C01AB477029F7777AA770B5137EE7C76B6BB03A3CC2532E3DC8628498A0384D7E6BE91721CA3BD450FDD860DF77910BA02BC |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 80584 |
Entropy (8bit): | 6.7905559754169325 |
Encrypted: | false |
SSDEEP: | 1536:upnmwd+O9WOCGYJe2NBObxuFGtREvHz3BFv19ecb0dZNDiORfz:onySWOE4UmU+EPzjecb0fNDHl |
MD5: | BACD42F652DF6CE399656E4BCB00C5D1 |
SHA1: | BF49C26FE98EF8EB03A4F08C8C1EEDD505FA1917 |
SHA-256: | F45DC2F9AB9040D641D54CD7BFB08C98CBC33D0F81B4613FE73B91AEDE1F48FD |
SHA-512: | FB1C0158186C7A7371CF422A7CCEAC6F1BECB76B1ABA104E6924D50827F1DC2E140292844967ECE042D7900DA4DF4D0833347186E18D37E70C6D5DA9C39A42E4 |
Malicious: | false |
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\unarchiver.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3071 |
Entropy (8bit): | 5.29013129911058 |
Encrypted: | false |
SSDEEP: | 48:uDA+gGVjGbZGVjGpTjGRGVjGptA4GbrGuA4GBGxGLGe4GVjG4GVjG9GXG6XfZdpt:uDTfAnaEJuxIVpXL5 |
MD5: | 34973953AE28E129BABC1A7387DEAAF4 |
SHA1: | C1A832B4344256FEADF7D9C293CBE7C6751F6110 |
SHA-256: | E21A2A00771054AE8572DEFAF8A5C6F0356A353DB779E727339D1CCA689CCA7D |
SHA-512: | 4FAAF6C9EBF7C8EA0BE18B5F13FC4B4B6BFB05E0E007AA4F50E4D7137A05ADD73147830A5A1C01D131C9E63F7D18E5976D3CF52D162F00F7FA01237D7439617A |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.99746165807975 |
TrID: |
|
File name: | Microsoft.VCLibs.140.00_14.0.33519.0_x86__8wekyb3d8bbwe.zip |
File size: | 758'544 bytes |
MD5: | 21de135a5ac9248d0683da5b7b08f4db |
SHA1: | fc358891923a5c9c31398fecfc600ecb1b992014 |
SHA256: | 7ba6ea7bc32cd58b7e0683da588796086accfb74efb7a3e525e9f8014d2ad663 |
SHA512: | 8729cfca45f31f8a2c45bbc689c1b0443ab8e25b8696542794dc1e50a9bb9c8e0afb8588fc1f3f34b9d1cd7154c3b8c3f2386cfefce1ff11c0b5d1d482792c55 |
SSDEEP: | 12288:rTdeDUqXwXDNF/SVOA8FUzR9wADhaNl2OP615VzojrHxq+JO5wGAiZ5erV432L:FMBYNFiv9wA9gst56M+o5wGdurqo |
TLSH: | 7AF423A289796FC8D45D09B52B39EC5A73310C7563E40767F81E19BEDC26ECC9F82980 |
File Content Preview: | PK..-.......=X................concrt140_app.dll.}{\TU...a.QQOJIe5..............hr.P ..f.}.`.m:NR..YYQYYZQiQZ..........,.A5&..5...9..s....}.}..=k..{.......fH....0.....X..>fv..i...o.f...8.N7.....E.&ky..........2.iF...^j**5...b.]._0.W......{=..S%m.>..6+.+|.. |
Icon Hash: | 90cececece8e8eb0 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 18:03:47 |
Start date: | 15/02/2024 |
Path: | C:\Windows\SysWOW64\unarchiver.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x8f0000 |
File size: | 12'800 bytes |
MD5 hash: | 16FF3CC6CC330A08EED70CBC1D35F5D2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 18:03:47 |
Start date: | 15/02/2024 |
Path: | C:\Windows\SysWOW64\7za.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x90000 |
File size: | 289'792 bytes |
MD5 hash: | 77E556CDFDC5C592F5C46DB4127C6F4C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 18:03:47 |
Start date: | 15/02/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage
Dynamic/Packed Code Coverage
Signature Coverage
Execution Coverage: | 20.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 5% |
Total number of Nodes: | 80 |
Total number of Limit Nodes: | 5 |
Graph
Callgraph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |