Edit tour

Windows Analysis Report
zip-this.exe

Overview

General Information

Sample name:zip-this.exe
Analysis ID:1468676
MD5:8136f91ee26d01a66ae245ee22fb8175
SHA1:4ffbcf85a8d8b830a6fd40e8f3211eb9108213e8
SHA256:5245409d96f08efb1811e7e9bcb979deffc2c37e6266b3f537d66711a097cae7
Infos:

Detection

Score:5
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • zip-this.exe (PID: 7288 cmdline: "C:\Users\user\Desktop\zip-this.exe" MD5: 8136F91EE26D01A66AE245EE22FB8175)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Users\user\Desktop\zip-this.exeDirectory created: C:\Program Files\ZipThisJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeDirectory created: C:\Program Files\ZipThis\zipthisUserId.txtJump to behavior
Source: zip-this.exeStatic PE information: certificate valid
Source: unknownHTTPS traffic detected: 45.33.84.9:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: zip-this.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: POST /v6 HTTP/1.1Content-Type: text/plain; charset=utf-8Host: apb.thisilient.comContent-Length: 88Expect: 100-continueConnection: Keep-Alive
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: apb.thisilient.com
Source: unknownHTTP traffic detected: POST /v6 HTTP/1.1Content-Type: text/plain; charset=utf-8Host: apb.thisilient.comContent-Length: 88Expect: 100-continueConnection: Keep-Alive
Source: zip-this.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: zip-this.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: zip-this.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: zip-this.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: zip-this.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0$
Source: zip-this.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: zip-this.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: zip-this.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: zip-this.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: zip-this.exe, 00000000.00000002.3511294691.000001E3E42D2000.00000004.00000800.00020000.00000000.sdmp, zip-this.exe, 00000000.00000002.3511294691.000001E3E3F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/Belongings/dmsans-regular.ttf
Source: zip-this.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: zip-this.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: zip-this.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: zip-this.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: zip-this.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: zip-this.exeString found in binary or memory: http://ocsp.globalsign.com/rootr30;
Source: zip-this.exe, 00000000.00000002.3511294691.000001E3E3CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: zip-this.exe, 00000000.00000002.3516192463.000001E3FF152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://scripts.sil.org/OFL
Source: zip-this.exeString found in binary or memory: http://scripts.sil.org/OFLThis
Source: zip-this.exeString found in binary or memory: http://scripts.sil.org/OFLhttps://www.indiantypefoundry.comhttp://www.colophon-foundry.orgColophon
Source: zip-this.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: zip-this.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: zip-this.exeString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
Source: zip-this.exe, 00000000.00000002.3516192463.000001E3FF152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.colophon-foundry.org
Source: zip-this.exe, 00000000.00000002.3511294691.000001E3E3CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://apb.thisilient.com
Source: zip-this.exe, 00000000.00000002.3511294691.000001E3E3CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://apb.thisilient.com/v6
Source: zip-this.exeString found in binary or memory: https://apb.thisilient.com/v6Khttps://www.zipthisapp.com/success?u=
Source: zip-this.exeString found in binary or memory: https://can.thisilient.com/r
Source: zip-this.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: zip-this.exe, 00000000.00000002.3516192463.000001E3FF152000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.indiantypefoundry.com
Source: zip-this.exe, 00000000.00000002.3511294691.000001E3E3F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.zipthisapp.com/legal
Source: zip-this.exeString found in binary or memory: https://www.zipthisapp.com/legal?
Source: zip-this.exe, 00000000.00000002.3511294691.000001E3E3D3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.zipthisapp.com/policy
Source: zip-this.exeString found in binary or memory: https://www.zipthisapp.com/policy?
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownHTTPS traffic detected: 45.33.84.9:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: C:\Users\user\Desktop\zip-this.exeCode function: 0_2_00007FFD9BAB0FE20_2_00007FFD9BAB0FE2
Source: C:\Users\user\Desktop\zip-this.exeCode function: 0_2_00007FFD9BAB14A00_2_00007FFD9BAB14A0
Source: zip-this.exeStatic PE information: No import functions for PE file found
Source: zip-this.exe, 00000000.00000000.1650204149.000001E3E1F5A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameZipThis.exe0 vs zip-this.exe
Source: zip-this.exe, 00000000.00000000.1650048053.000001E3E1D72000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameZipThisApp.exe6 vs zip-this.exe
Source: zip-this.exeBinary or memory string: OriginalFilenameZipThisApp.exe6 vs zip-this.exe
Source: zip-this.exeBinary or memory string: OriginalFilenameZipThis.exe0 vs zip-this.exe
Source: zip-this.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: clean5.winEXE@1/1@1/1
Source: C:\Users\user\Desktop\zip-this.exeFile created: C:\Program Files\ZipThisJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeMutant created: NULL
Source: zip-this.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: zip-this.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
Source: C:\Users\user\Desktop\zip-this.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: zip-this.exeString found in binary or memory: $settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -StartWhenAvailable -RestartCount 2 -RestartInterval (New-TimeSpan -Minutes 10) -RunOnlyIfNetworkAvailable -ExecutionTimeLimit (New-TimeSpan -Hours 1)
Source: zip-this.exeString found in binary or memory: 2belongings/add_circle.png>belongings/add_circle_white.pngR
Source: zip-this.exeString found in binary or memory: /Belongings/add_circle.png
Source: zip-this.exeString found in binary or memory: /Belongings/add_circle_white.png
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: msvcp140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: msctfui.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{41945702-8302-44A6-9445-AC98E8AFA086}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\zip-this.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeDirectory created: C:\Program Files\ZipThisJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeDirectory created: C:\Program Files\ZipThis\zipthisUserId.txtJump to behavior
Source: zip-this.exeStatic PE information: certificate valid
Source: zip-this.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: zip-this.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: zip-this.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: zip-this.exeStatic file information: File size 2126128 > 1048576
Source: zip-this.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1e6a00
Source: zip-this.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: zip-this.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: zip-this.exeStatic PE information: 0x816608DC [Sun Oct 17 17:03:24 2038 UTC]
Source: C:\Users\user\Desktop\zip-this.exeCode function: 0_2_00007FFD9BABD800 push eax; ret 0_2_00007FFD9BABD801
Source: C:\Users\user\Desktop\zip-this.exeCode function: 0_2_00007FFD9BABD7E9 push eax; ret 0_2_00007FFD9BABD7EA
Source: C:\Users\user\Desktop\zip-this.exeCode function: 0_2_00007FFD9BABD71E push 8B485F4Dh; iretd 0_2_00007FFD9BABD723
Source: zip-this.exeStatic PE information: section name: .text entropy: 7.388917584841253
Source: C:\Users\user\Desktop\zip-this.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeMemory allocated: 1E3E22A0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeMemory allocated: 1E3FBCD0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\zip-this.exeWindow / User API: threadDelayed 1145Jump to behavior
Source: C:\Users\user\Desktop\zip-this.exe TID: 7324Thread sleep time: -3689348814741908s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\zip-this.exe TID: 7324Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\zip-this.exe TID: 7324Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\zip-this.exeThread delayed: delay time: 100000Jump to behavior
Source: zip-this.exe, 00000000.00000002.3513360065.000001E3FC4F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\zip-this.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeQueries volume information: C:\Users\user\Desktop\zip-this.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\PresentationFramework-SystemXml.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\zip-this.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
2
Masquerading
OS Credential Dumping1
Query Registry
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
Virtualization/Sandbox Evasion
Security Account Manager32
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Software Packing
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1468676 Sample: zip-this.exe Startdate: 07/07/2024 Architecture: WINDOWS Score: 5 8 apb.thisilient.com 2->8 5 zip-this.exe 14 4 2->5         started        process3 dnsIp4 10 apb.thisilient.com 45.33.84.9, 443, 49732 LINODE-APLinodeLLCUS United States 5->10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
apb.thisilient.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://scripts.sil.org/OFL0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://can.thisilient.com/r0%VirustotalBrowse
https://www.zipthisapp.com/legal0%VirustotalBrowse
https://www.indiantypefoundry.com0%VirustotalBrowse
https://www.zipthisapp.com/legal?0%VirustotalBrowse
http://www.colophon-foundry.org0%VirustotalBrowse
https://www.indiantypefoundry.com0%Avira URL Cloudsafe
https://www.zipthisapp.com/legal0%Avira URL Cloudsafe
https://can.thisilient.com/r0%Avira URL Cloudsafe
https://www.zipthisapp.com/legal?0%Avira URL Cloudsafe
http://www.colophon-foundry.org0%Avira URL Cloudsafe
https://apb.thisilient.com/v60%Avira URL Cloudsafe
https://apb.thisilient.com/v6Khttps://www.zipthisapp.com/success?u=0%Avira URL Cloudsafe
http://scripts.sil.org/OFLhttps://www.indiantypefoundry.comhttp://www.colophon-foundry.orgColophon0%Avira URL Cloudsafe
https://www.zipthisapp.com/policy0%Avira URL Cloudsafe
https://www.zipthisapp.com/policy?0%Avira URL Cloudsafe
http://defaultcontainer/Belongings/dmsans-regular.ttf0%Avira URL Cloudsafe
https://apb.thisilient.com0%Avira URL Cloudsafe
https://apb.thisilient.com/v6Khttps://www.zipthisapp.com/success?u=0%VirustotalBrowse
https://www.zipthisapp.com/policy0%VirustotalBrowse
https://apb.thisilient.com/v60%VirustotalBrowse
http://scripts.sil.org/OFLThis0%Avira URL Cloudsafe
https://www.zipthisapp.com/policy?0%VirustotalBrowse
http://scripts.sil.org/OFLhttps://www.indiantypefoundry.comhttp://www.colophon-foundry.orgColophon0%VirustotalBrowse
http://scripts.sil.org/OFLThis0%VirustotalBrowse
https://apb.thisilient.com0%VirustotalBrowse

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
apb.thisilient.com
45.33.84.9
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://apb.thisilient.com/v6false
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://www.indiantypefoundry.comzip-this.exe, 00000000.00000002.3516192463.000001E3FF152000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.zipthisapp.com/legalzip-this.exe, 00000000.00000002.3511294691.000001E3E3F51000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://can.thisilient.com/rzip-this.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.zipthisapp.com/legal?zip-this.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.colophon-foundry.orgzip-this.exe, 00000000.00000002.3516192463.000001E3FF152000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://apb.thisilient.com/v6Khttps://www.zipthisapp.com/success?u=zip-this.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.zipthisapp.com/policyzip-this.exe, 00000000.00000002.3511294691.000001E3E3D3D000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://scripts.sil.org/OFLhttps://www.indiantypefoundry.comhttp://www.colophon-foundry.orgColophonzip-this.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.zipthisapp.com/policy?zip-this.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://scripts.sil.org/OFLzip-this.exe, 00000000.00000002.3516192463.000001E3FF152000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://defaultcontainer/Belongings/dmsans-regular.ttfzip-this.exe, 00000000.00000002.3511294691.000001E3E42D2000.00000004.00000800.00020000.00000000.sdmp, zip-this.exe, 00000000.00000002.3511294691.000001E3E3F51000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namezip-this.exe, 00000000.00000002.3511294691.000001E3E3CD1000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://apb.thisilient.comzip-this.exe, 00000000.00000002.3511294691.000001E3E3CD1000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://scripts.sil.org/OFLThiszip-this.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
45.33.84.9
apb.thisilient.comUnited States
63949LINODE-APLinodeLLCUSfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1468676
Start date and time:2024-07-07 11:37:50 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 9s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:zip-this.exe
Detection:CLEAN
Classification:clean5.winEXE@1/1@1/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 59%
  • Number of executed functions: 2
  • Number of non-executed functions: 2
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtReadVirtualMemory calls found.
No simulations
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
LINODE-APLinodeLLCUSarm7-20240707-0306.elfGet hashmaliciousMiraiBrowse
  • 45.79.252.2
https://iwahadxi.hosted.phplist.com/lists/lt.php/?tid=eU1SAFEEUlZTABhUAVAGGAZWVFsfXVQLWkkDBQIAUAwCAgcAAldPWwdaBlNRVAgYVwEEXh9QClxcSQcAUlcbWgQGAAJVVwRXBAoBSQcBAVALVA8LHwIEXVtJUg8GVxsAVVMHGA5SB1EBC1YDAQQBDAGet hashmaliciousUnknownBrowse
  • 45.33.29.14
http://ww7.eagleget.comGet hashmaliciousUnknownBrowse
  • 45.79.244.209
https://iwahadxi.hosted.phplist.com/lists/lt.php/?tid=eU1SAFEEUlZTABhUAVAGGAZWVFsfXVQLWkkDBQIAUAwCAgcAAldPWwdaBlNRVAgYVwEEXh9QClxcSQcAUlcbWgQGAAJVVwRXBAoBSQcBAVALVA8LHwIEXVtJUg8GVxsAVVMHGA5SB1EBC1YDAQQBDAGet hashmaliciousUnknownBrowse
  • 45.33.29.14
https://iriss.online/i/ontransfer_pathways/login?p=loginGet hashmaliciousUnknownBrowse
  • 172.105.10.234
q9WhhN00yY.elfGet hashmaliciousUnknownBrowse
  • 103.3.63.181
3521381fadca86cfc577e8aa81ecff5f3453102559bb7e86d903d9b87db1456c_dump.exeGet hashmaliciousRemcosBrowse
  • 173.255.204.62
https://iwahadxi.hosted.phplist.com/lists/lt.php/?tid=eU1SAFEEUlZTABhUAVAGGAZWVFsfXVQLWkkDBQIAUAwCAgcAAldPWwdaBlNRVAgYVwEEXh9QClxcSQcAUlcbWgQGAAJVVwRXBAoBSQcBAVALVA8LHwIEXVtJUg8GVxsAVVMHGA5SB1EBC1YDAQQBDAGet hashmaliciousUnknownBrowse
  • 45.33.29.14
BDQfYL99b2.exeGet hashmaliciousRemcosBrowse
  • 173.255.204.62
Quotation.xlsGet hashmaliciousRemcosBrowse
  • 173.255.204.62
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
3b5074b1b5d032e5620f69f9f700ff0eBootie.exeGet hashmaliciousUnknownBrowse
  • 45.33.84.9
Bootie.exeGet hashmaliciousUnknownBrowse
  • 45.33.84.9
new.batGet hashmaliciousUnknownBrowse
  • 45.33.84.9
file.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
  • 45.33.84.9
2U1S7Ab7YU.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
  • 45.33.84.9
z9c2rA23iT.exeGet hashmaliciousKeyzetsu ClipperBrowse
  • 45.33.84.9
B5U2ccQ8H1.exeGet hashmaliciousRL STEALER, StormKittyBrowse
  • 45.33.84.9
https://41619ec8e8407cbea965833e1fb35e027cd895bdef33c8d4bb7a06d460.pages.dev/Get hashmaliciousHTMLPhisherBrowse
  • 45.33.84.9
https://f4dfc3a6ab223a609ab2682120fd9f431b51dcff8df1312719112d196d.pages.dev/Get hashmaliciousHTMLPhisherBrowse
  • 45.33.84.9
https://df2f9d0204d7f42110452adfb9a45d39eaf5f3cccd842ff8b1eb858a83.pages.dev/Get hashmaliciousHTMLPhisherBrowse
  • 45.33.84.9
No context
Process:C:\Users\user\Desktop\zip-this.exe
File Type:ASCII text, with no line terminators
Category:dropped
Size (bytes):36
Entropy (8bit):3.819114154689793
Encrypted:false
SSDEEP:3:uRQSEjgJt7Wm6W:uz6W
MD5:F34B2A889FFDCA8370F356D392E4999F
SHA1:BFF9E99F9347C17BB3B1FD667393BA9F7727DEC6
SHA-256:2F52288A0D11804E8796A0FB63AB4883945D8C2AE4EAAB4E831F393F44E6676E
SHA-512:829A448A002DAAD524B87D786C8589062B59F387495CF23226B4860ABDECFA9DC8CDCB1B7AFCFD211A8140AB2C30DB1B0291DF586A7995B5E08A4A0F82B39953
Malicious:false
Reputation:low
Preview:78457e2e-bf76-4fd9-8a07-53a73fe2052c
File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.295779467805375
TrID:
  • Win64 Executable GUI Net Framework (217006/5) 49.88%
  • Win64 Executable GUI (202006/5) 46.43%
  • Win64 Executable (generic) (12005/4) 2.76%
  • Generic Win/DOS Executable (2004/3) 0.46%
  • DOS Executable Generic (2002/1) 0.46%
File name:zip-this.exe
File size:2'126'128 bytes
MD5:8136f91ee26d01a66ae245ee22fb8175
SHA1:4ffbcf85a8d8b830a6fd40e8f3211eb9108213e8
SHA256:5245409d96f08efb1811e7e9bcb979deffc2c37e6266b3f537d66711a097cae7
SHA512:85ccf57110105c3a78ccd907c6ba48362910334b1c2f707a6e0b5ff09b0e9c6ab1b9dddca1317ac8a4bc828fff4fe11661e739c4d49013ea2a2e8b050e537531
SSDEEP:49152:UC3ZB5UBastfj24CzFRwL6UGqio00G9Zn/tzwHgZz:PmaAb24CzhUbiCG9Zn/oOz
TLSH:E3A5DFC26380D68BD51A19B451B2D3679224AF5CBE23BE77107336FD9C499C40E3A3B9
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....f..........."...0..j............... .....@..... ........................ .....H. ...`...@......@............... .....
Icon Hash:1364e4e4e4e46817
Entrypoint:0x140000000
Entrypoint Section:
Digitally signed:true
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x816608DC [Sun Oct 17 17:03:24 2038 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:
Signature Valid:true
Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 21/02/2024 12:51:07 21/02/2025 12:51:07
Subject Chain
  • E=contactus@lightnertok.com, CN=LIGHTNER TOK LTD, O=LIGHTNER TOK LTD, L=Tel Aviv-Jaffa, S=Tel Aviv, C=IL, OID.1.3.6.1.4.1.311.60.2.1.3=IL, SERIALNUMBER=516201944, OID.2.5.4.15=Private Organization
Version:3
Thumbprint MD5:CEC13869EA7B5624B992C775556F2F58
Thumbprint SHA-1:B0F054A3A02999D47B5FADE5C33FA9C9FE1B951F
Thumbprint SHA-256:661CCA115D81F163E9E7C33A3D60D2BFC02F95829864B132267E130EDA8DAE07
Serial:4469809AA0E206829C99CD18
Instruction
dec ebp
pop edx
nop
add byte ptr [ebx], al
add byte ptr [eax], al
add byte ptr [eax+eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1ea0000x1d598.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x2042000x2f30.rsrc
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x1e88dc0x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x1e68f80x1e6a004cf6424cb2f57c73201aea70f4837606False0.7150313864628821data7.388917584841253IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x1ea0000x1d5980x1d600599299a852bd9c6d448567eb0c76b4afFalse0.24753989361702128data4.926885937751479IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x1ea1a00x47e1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9756534970925493
RT_ICON0x1ee9940x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.09379805986040458
RT_ICON0x1ff1cc0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.1300188946622579
RT_ICON0x2034040x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.15425311203319503
RT_ICON0x2059bc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.20098499061913697
RT_ICON0x206a740x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.24822695035460993
RT_GROUP_ICON0x206eec0x5adata0.7666666666666667
RT_VERSION0x206f580x37adata0.4348314606741573
RT_MANIFEST0x2072e40x2b0XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5188953488372093

Download Network PCAP: filteredfull

  • Total Packets: 11
  • 443 (HTTPS)
  • 53 (DNS)
TimestampSource PortDest PortSource IPDest IP
Jul 7, 2024 11:38:40.776047945 CEST49732443192.168.2.445.33.84.9
Jul 7, 2024 11:38:40.776087999 CEST4434973245.33.84.9192.168.2.4
Jul 7, 2024 11:38:40.776185989 CEST49732443192.168.2.445.33.84.9
Jul 7, 2024 11:38:40.799596071 CEST49732443192.168.2.445.33.84.9
Jul 7, 2024 11:38:40.799619913 CEST4434973245.33.84.9192.168.2.4
Jul 7, 2024 11:38:41.288358927 CEST4434973245.33.84.9192.168.2.4
Jul 7, 2024 11:38:41.288464069 CEST49732443192.168.2.445.33.84.9
Jul 7, 2024 11:38:41.292754889 CEST49732443192.168.2.445.33.84.9
Jul 7, 2024 11:38:41.292764902 CEST4434973245.33.84.9192.168.2.4
Jul 7, 2024 11:38:41.292993069 CEST4434973245.33.84.9192.168.2.4
Jul 7, 2024 11:38:41.340396881 CEST49732443192.168.2.445.33.84.9
Jul 7, 2024 11:38:41.380539894 CEST4434973245.33.84.9192.168.2.4
Jul 7, 2024 11:38:41.462284088 CEST4434973245.33.84.9192.168.2.4
Jul 7, 2024 11:38:41.517600060 CEST49732443192.168.2.445.33.84.9
Jul 7, 2024 11:38:41.608982086 CEST49732443192.168.2.445.33.84.9
Jul 7, 2024 11:38:41.609025002 CEST4434973245.33.84.9192.168.2.4
Jul 7, 2024 11:38:41.808240891 CEST4434973245.33.84.9192.168.2.4
Jul 7, 2024 11:38:41.808844090 CEST4434973245.33.84.9192.168.2.4
Jul 7, 2024 11:38:41.808897018 CEST49732443192.168.2.445.33.84.9
Jul 7, 2024 11:38:41.899347067 CEST49732443192.168.2.445.33.84.9
TimestampSource PortDest PortSource IPDest IP
Jul 7, 2024 11:38:40.734517097 CEST5599553192.168.2.41.1.1.1
Jul 7, 2024 11:38:40.765758991 CEST53559951.1.1.1192.168.2.4
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Jul 7, 2024 11:38:40.734517097 CEST192.168.2.41.1.1.10x7ac3Standard query (0)apb.thisilient.comA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Jul 7, 2024 11:38:40.765758991 CEST1.1.1.1192.168.2.40x7ac3No error (0)apb.thisilient.com45.33.84.9A (IP address)IN (0x0001)false
  • apb.thisilient.com
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.44973245.33.84.94437288C:\Users\user\Desktop\zip-this.exe
TimestampBytes transferredDirectionData
2024-07-07 09:38:41 UTC154OUTPOST /v6 HTTP/1.1
Content-Type: text/plain; charset=utf-8
Host: apb.thisilient.com
Content-Length: 88
Expect: 100-continue
Connection: Keep-Alive
2024-07-07 09:38:41 UTC25INHTTP/1.1 100 Continue
2024-07-07 09:38:41 UTC88OUTData Raw: 48 51 41 42 42 77 45 4f 55 31 59 48 53 46 4a 51 41 77 51 66 55 67 64 55 43 68 70 63 55 46 5a 56 54 46 41 41 57 56 49 46 42 51 45 41 42 77 77 42 56 78 59 48 55 31 4a 52 43 41 59 42 42 41 46 66 55 51 6b 48 41 46 55 48 53 56 64 53 56 77 55 4b 58 41 4a 53 55 77 3d 3d
Data Ascii: HQABBwEOU1YHSFJQAwQfUgdUChpcUFZVTFAAWVIFBQEABwwBVxYHU1JRCAYBBAFfUQkHAFUHSVdSVwUKXAJSUw==
2024-07-07 09:38:41 UTC192INHTTP/1.1 200 OK
Content-Type: application/json;charset=ISO-8859-1
Date: Sun, 07 Jul 2024 09:38:41 GMT
Server: Nginx
Vary: Accept-Encoding
Connection: close
Transfer-Encoding: chunked
2024-07-07 09:38:41 UTC477INData Raw: 31 64 36 0d 0a 22 45 41 52 77 45 77 41 4c 56 31 35 5a 55 31 70 56 51 30 42 59 51 46 68 59 57 78 59 41 42 42 63 4b 64 52 51 46 42 77 4d 4c 56 31 59 4b 42 51 59 48 47 41 63 4b 55 41 73 55 41 46 52 52 44 42 34 4b 41 41 49 4b 47 51 56 53 41 77 4e 51 41 77 63 41 42 77 56 55 42 42 59 41 42 42 63 4c 64 78 51 46 42 31 4a 52 51 6c 74 57 57 6b 49 53 42 77 45 58 42 58 4d 63 41 58 4d 53 41 6e 45 58 42 41 42 54 51 56 78 48 59 56 4a 51 57 6c 63 63 42 67 4d 53 42 6e 49 58 41 33 41 63 41 58 55 53 42 33 41 58 42 41 42 61 51 55 4a 44 57 6c 35 34 51 31 39 4a 45 51 4d 46 45 41 42 7a 55 46 4e 56 52 31 51 53 42 33 41 58 42 41 42 55 58 56 78 53 59 55 70 43 55 78 63 4c 42 68 51 45 64 42 59 41 42 46 4e 4a 52 46 31 65 56 6c 4a 47 58 31 31 58 45 51 4e 78 57 6c 42 47 55 30 59 55 52
Data Ascii: 1d6"EARwEwALV15ZU1pVQ0BYQFhYWxYABBcKdRQFBwMLV1YKBQYHGAcKUAsUAFRRDB4KAAIKGQVSAwNQAwcABwVUBBYABBcLdxQFB1JRQltWWkISBwEXBXMcAXMSAnEXBABTQVxHYVJQWlccBgMSBnIXA3AcAXUSB3AXBABaQUJDWl54Q19JEQMFEABzUFNVR1QSB3AXBABUXVxSYUpCUxcLBhQEdBYABFNJRF1eVlJGX11XEQNxWlBGU0YUR
2024-07-07 09:38:41 UTC5INData Raw: 30 0d 0a 0d 0a
Data Ascii: 0


050100150s020406080100

Click to jump to process

050100150s0.00204060MB

Click to jump to process

  • File
  • Registry
  • Network

Click to dive into process behavior distribution

Target ID:0
Start time:05:38:38
Start date:07/07/2024
Path:C:\Users\user\Desktop\zip-this.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\zip-this.exe"
Imagebase:0x1e3e1d70000
File size:2'126'128 bytes
MD5 hash:8136F91EE26D01A66AE245EE22FB8175
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:13.3%
Dynamic/Decrypted Code Coverage:100%
Signature Coverage:0%
Total number of Nodes:6
Total number of Limit Nodes:0
Show Legend
Hide Nodes/Edges
execution_graph 6339 7ffd9baba9aa 6340 7ffd9babafa0 LoadLibraryW 6339->6340 6342 7ffd9babb02d 6340->6342 6335 7ffd9babaf74 6336 7ffd9babaf7d LoadLibraryW 6335->6336 6338 7ffd9babb02d 6336->6338

Executed Functions

Control-flow Graph

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.3517177988.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ffd9bab0000_zip-this.jbxd
Similarity
  • API ID: LibraryLoad
  • String ID: U
  • API String ID: 1029625771-3372436214
  • Opcode ID: 9c5989a7ee62d7893deb0aa408f20cea946185a106ff05d72b00d149eff61f4b
  • Instruction ID: 11911b04f92e1da456bf0a085a8df30eb9040e35c60872f6ab080f89bf898827
  • Opcode Fuzzy Hash: 9c5989a7ee62d7893deb0aa408f20cea946185a106ff05d72b00d149eff61f4b
  • Instruction Fuzzy Hash: 1131D53190CA1D8FDB58DB98C849BE9BBE0FF59320F00822FD019D3252DF74A4468B91

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 502 7ffd9baba9aa-7ffd9babafef 505 7ffd9babaff9-7ffd9babb02b LoadLibraryW 502->505 506 7ffd9babaff1-7ffd9babaff6 502->506 507 7ffd9babb02d 505->507 508 7ffd9babb033-7ffd9babb05a 505->508 506->505 507->508
APIs
Memory Dump Source
  • Source File: 00000000.00000002.3517177988.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ffd9bab0000_zip-this.jbxd
Similarity
  • API ID: LibraryLoad
  • String ID:
  • API String ID: 1029625771-0
  • Opcode ID: 459a896ed708181766b21e5093c8ffaa537f9cf22155a458609a8bae9341e981
  • Instruction ID: 12835afe925a70b3ac3111af8b19cbc812c70016c419436e92601e91d6f4659e
  • Opcode Fuzzy Hash: 459a896ed708181766b21e5093c8ffaa537f9cf22155a458609a8bae9341e981
  • Instruction Fuzzy Hash: 6821827190CA1C9FDB58DF9CD849BF9BBE0FB69321F00822ED019D3651DB70A4458B91

Non-executed Functions

Strings
Memory Dump Source
  • Source File: 00000000.00000002.3517177988.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ffd9bab0000_zip-this.jbxd
Similarity
  • API ID:
  • String ID: 4N_^
  • API String ID: 0-2516135240
  • Opcode ID: 7133ce070cc364f48a583528b7b90482ee2b6dd6df469cc02c07aad2a2c3c4a3
  • Instruction ID: de3fa85d45fda853267dc01e4ed6c5db97a767213a1619e3a4761d1cfee750a6
  • Opcode Fuzzy Hash: 7133ce070cc364f48a583528b7b90482ee2b6dd6df469cc02c07aad2a2c3c4a3
  • Instruction Fuzzy Hash: BE412613B1E6A607D725A77CA8B60E97B90EF5233E70941BBD4E98F0A7D8086447C780
Memory Dump Source
  • Source File: 00000000.00000002.3517177988.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ffd9bab0000_zip-this.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: b7dff80645fbcff8b49d6c699e41cea973b107b4674d9632f786b681ffb2b02f
  • Instruction ID: 5797b0e322a7e6038c739fc438d50cdebc4880c7e20995d4c1ef01cc311601c1
  • Opcode Fuzzy Hash: b7dff80645fbcff8b49d6c699e41cea973b107b4674d9632f786b681ffb2b02f
  • Instruction Fuzzy Hash: 6202AE17B0816606D326B7BCBC669E96B40DF6537FB0847B7E6ED8D0D78D082086C2D5