Windows
Analysis Report
38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- unarchiver.exe (PID: 7480 cmdline:
"C:\Window s\SysWOW64 \unarchive r.exe" "C: \Users\use r\Desktop\ 38ee10f0-a c87-4c0c-9 d71-65200c b8e337.tmp .0.dr.1.dr .zip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2) - 7za.exe (PID: 7504 cmdline:
"C:\Window s\System32 \7za.exe" x -pinfect ed -y -o"C :\Users\us er\AppData \Local\Tem p\u0djtksr .ouv" "C:\ Users\user \Desktop\3 8ee10f0-ac 87-4c0c-9d 71-65200cb 8e337.tmp. 0.dr.1.dr. zip" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C) - conhost.exe (PID: 7512 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ZipBomb | Yara detected ZipBomb | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_ZipBomb | Yara detected ZipBomb | Joe Security |
Click to jump to signature section
Source: | File opened: | Jump to behavior |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Disable or Modify Tools | OS Credential Dumping | 32 Virtualization/Sandbox Evasion | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 32 Virtualization/Sandbox Evasion | LSASS Memory | 2 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1562189 |
Start date and time: | 2024-11-25 10:23:34 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 1m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 3 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip |
Detection: | MAL |
Classification: | mal48.evad.winZIP@4/2@0/0 |
Cookbook Comments: |
|
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: 38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip
C:\Users\user\AppData\Local\Temp\u0djtksr.ouv\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr
Download File
Process: | C:\Windows\SysWOW64\7za.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15248 |
Entropy (8bit): | 7.988136031708122 |
Encrypted: | false |
SSDEEP: | 384:wW3s5K2V1mcWpbJA7i30kgZhgSupSxVsViJ8y0je8FSG0PbMKmDbYk:wW3s5McWpKGYaGMjpoRg1Yk |
MD5: | CB2CA6518405B8DAA870613406D1A758 |
SHA1: | 53C44E092CE11AF44DB09D128C9EB038BE67413F |
SHA-256: | 3353D8545028C9783DF18FB143B4B0EBEE6DDBDCE11078ED483D4160F109CBA0 |
SHA-512: | D3C01FCB52099AD4874FAE1F1AC8B83FFC212BA0BD9FC71BC7204C6F34B15B70F0D8D0405EFC41DDDCECC260BC9F421ECCCC2F56F976BAA399DFFBC752662CF6 |
Malicious: | true |
Yara Hits: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\unarchiver.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1444 |
Entropy (8bit): | 5.114599726617491 |
Encrypted: | false |
SSDEEP: | 24:z8sloEfn3iJG3iJjWIG3iJG3iJUwg3iJfh3iJG3iJFTAslo3iJbE3iJTslo3iJoF:zT2An3GG3GbG3GG3Gpg3G53GG3GpH23Y |
MD5: | EA175AB872ABB24F8FBF2D775109BE1F |
SHA1: | 4FC8AC4BEE5063A1DCBD77C25A61996EF0AC129C |
SHA-256: | 4D5357EEF215B762026F9CA2B39A5ADAEC1F38EF2E4F36A813D31AAC291D3D63 |
SHA-512: | 35C93B2EB9E6E1BF50A4A7E8A5CC42EEEED6D2B12D87212C68DC3C5B35F69E4AF4C42ED88BE9D48217E686972AA3E0A597EC46BA1BBFEB38BB3741FBEE5F80BB |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.986067276875396 |
TrID: |
|
File name: | 38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip |
File size: | 15'494 bytes |
MD5: | c8d64c4bf48d060b7846bf784a3ed8e6 |
SHA1: | 6c70e7f472d32b1a87a65d813d1b8dd912c8e5ae |
SHA256: | 0f916bceb39dc84ff6de87d89b0440d2ec44cf8102f806d7374fe70458820e14 |
SHA512: | dc8994e8b274ed31b53df43946cffb144ee9e3962420983bf915f0413e74db7cf39aeb584dd7f0b2d4a327de41f54905412001d25d968e72d193bddf48f0477c |
SSDEEP: | 384:pGu4d1GPOOtmSA+HTBCMiIB9vDeMcdBQO1O:ArGPVtT13B9vDeMcnQKO |
TLSH: | 7862C055514908E025C5EBF7B79DC14509E3580290CFF60A3E51B6E334AAD06BF3AE2B |
File Content Preview: | PK.........RyY...2.;...;..2...38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.....hU........9.j.7_.H.F..?1..R.e..2..h].#.c.S..O..D.Qk...U...2.u.c...Z2.wc.R.!..6.*....t..K&....AA...T...I...hn.{J...B.r.....R......N....W.u@:..A...v..w...D($..n......;..=.d |
Icon Hash: | 90cececece8e8eb0 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 04:24:21 |
Start date: | 25/11/2024 |
Path: | C:\Windows\SysWOW64\unarchiver.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa0000 |
File size: | 12'800 bytes |
MD5 hash: | 16FF3CC6CC330A08EED70CBC1D35F5D2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 04:24:22 |
Start date: | 25/11/2024 |
Path: | C:\Windows\SysWOW64\7za.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x310000 |
File size: | 289'792 bytes |
MD5 hash: | 77E556CDFDC5C592F5C46DB4127C6F4C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 04:24:22 |
Start date: | 25/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |