Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip

Overview

General Information

Sample name:38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip
Analysis ID:1562189
MD5:c8d64c4bf48d060b7846bf784a3ed8e6
SHA1:6c70e7f472d32b1a87a65d813d1b8dd912c8e5ae
SHA256:0f916bceb39dc84ff6de87d89b0440d2ec44cf8102f806d7374fe70458820e14
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected ZipBomb
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
May sleep (evasive loops) to hinder dynamic analysis

Classification

  • System is w10x64
  • unarchiver.exe (PID: 7480 cmdline: "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip" MD5: 16FF3CC6CC330A08EED70CBC1D35F5D2)
    • 7za.exe (PID: 7504 cmdline: "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\u0djtksr.ouv" "C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip" MD5: 77E556CDFDC5C592F5C46DB4127C6F4C)
      • conhost.exe (PID: 7512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.drJoeSecurity_ZipBombYara detected ZipBombJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\u0djtksr.ouv\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.drJoeSecurity_ZipBombYara detected ZipBombJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results
      Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
      Source: classification engineClassification label: mal48.evad.winZIP@4/2@0/0
      Source: C:\Windows\SysWOW64\unarchiver.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7512:120:WilError_03
      Source: C:\Windows\SysWOW64\unarchiver.exeFile created: C:\Users\user\AppData\Local\Temp\unarchiver.logJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Windows\SysWOW64\unarchiver.exe "C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip"
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\u0djtksr.ouv" "C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip"
      Source: C:\Windows\SysWOW64\7za.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\u0djtksr.ouv" "C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip"Jump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\7za.exeSection loaded: 7z.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: 38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr, type: SAMPLE
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\u0djtksr.ouv\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr, type: DROPPED
      Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: A50000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: 46E0000 memory commit | memory reserve | memory write watchJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exe TID: 7500Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeMemory allocated: page read and write | page guardJump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeProcess created: C:\Windows\SysWOW64\7za.exe "C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\u0djtksr.ouv" "C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip"Jump to behavior
      Source: C:\Windows\SysWOW64\unarchiver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      11
      Process Injection
      1
      Disable or Modify Tools
      OS Credential Dumping32
      Virtualization/Sandbox Evasion
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      32
      Virtualization/Sandbox Evasion
      LSASS Memory2
      System Information Discovery
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Process Injection
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      DLL Side-Loading
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1562189 Sample: 38ee10f0-ac87-4c0c-9d71-652... Startdate: 25/11/2024 Architecture: WINDOWS Score: 48 16 Yara detected ZipBomb 2->16 7 unarchiver.exe 4 2->7         started        process3 process4 9 7za.exe 2 7->9         started        file5 14 38ee10f0-ac87-4c0c...8e337.tmp.0.dr.1.dr, Zip 9->14 dropped 12 conhost.exe 9->12         started        process6

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1562189
      Start date and time:2024-11-25 10:23:34 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 1m 36s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:3
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip
      Detection:MAL
      Classification:mal48.evad.winZIP@4/2@0/0
      Cookbook Comments:
      • Found application associated with file extension: .zip
      • Stop behavior analysis, all processes terminated
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: 38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\7za.exe
      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
      Category:dropped
      Size (bytes):15248
      Entropy (8bit):7.988136031708122
      Encrypted:false
      SSDEEP:384:wW3s5K2V1mcWpbJA7i30kgZhgSupSxVsViJ8y0je8FSG0PbMKmDbYk:wW3s5McWpKGYaGMjpoRg1Yk
      MD5:CB2CA6518405B8DAA870613406D1A758
      SHA1:53C44E092CE11AF44DB09D128C9EB038BE67413F
      SHA-256:3353D8545028C9783DF18FB143B4B0EBEE6DDBDCE11078ED483D4160F109CBA0
      SHA-512:D3C01FCB52099AD4874FAE1F1AC8B83FFC212BA0BD9FC71BC7204C6F34B15B70F0D8D0405EFC41DDDCECC260BC9F421ECCCC2F56F976BAA399DFFBC752662CF6
      Malicious:true
      Yara Hits:
      • Rule: JoeSecurity_ZipBomb, Description: Yara detected ZipBomb, Source: C:\Users\user\AppData\Local\Temp\u0djtksr.ouv\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr, Author: Joe Security
      Reputation:low
      Preview:PK.........jY..k.3.,..0.8....Nulo - Branding Budget 2025.scr..:..w..Qj.S..w.q$E.,-...4.qa..x1*w.(...~...I....3{N.p....6......qnx.....".HZ^.*?../......9......!..4{D...Y&L.iR._.......N.....l.k{L...N......e.....:q.......&.r....,r.#,.../."...0)e..^..~6...;....Q.3L[k...i........ .O..p.`N5.!U.U...q..&>.K.).......!12..P..C...'..hk..Q...K.}OIVU.]....G.lz....|............V,D.u.'1.c\...BQm..b.S.-...".9-..Y.R....g..b....n...(..P..6...Y.~i..tp.d:.....`..4.Zj3/...\.!..x].m+.....D.c...IVM..e.(.Y.$I...+.R..4.@..b.........A~`...)...Q..B...@.4).'.X..G.2.:.Yq.v.h..y.....Q~g...lo.4.r...(..n. B.....n.~...G...A..b.(hU...#.O.R{..D.p.!.9i@..VcP....s...q.C.....H.:&..&kF.M..'.':w..:..#.xW.k....U`.#..=.j..1.eLY.a!.3P.$..}\D.@.L.C.5cG...$..q..l.cX..y.......~.^pV.m.` l.......Y.q..BJ{.r...`..Satm.o.j.>,3./e.8E....Y.L..h.@.7.>.A4.M_.x.%|wc.>.^...........lZ.r..D/tv.B.2.S.E..6_...[.....]+.K<Fgg.O.q.{..*.#...d....f....M..CV..D.8.CD.h.g........@e3........_.x..[.?.....T>
      Process:C:\Windows\SysWOW64\unarchiver.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1444
      Entropy (8bit):5.114599726617491
      Encrypted:false
      SSDEEP:24:z8sloEfn3iJG3iJjWIG3iJG3iJUwg3iJfh3iJG3iJFTAslo3iJbE3iJTslo3iJoF:zT2An3GG3GbG3GG3Gpg3G53GG3GpH23Y
      MD5:EA175AB872ABB24F8FBF2D775109BE1F
      SHA1:4FC8AC4BEE5063A1DCBD77C25A61996EF0AC129C
      SHA-256:4D5357EEF215B762026F9CA2B39A5ADAEC1F38EF2E4F36A813D31AAC291D3D63
      SHA-512:35C93B2EB9E6E1BF50A4A7E8A5CC42EEEED6D2B12D87212C68DC3C5B35F69E4AF4C42ED88BE9D48217E686972AA3E0A597EC46BA1BBFEB38BB3741FBEE5F80BB
      Malicious:false
      Reputation:low
      Preview:11/25/2024 4:24 AM: Unpack: C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip..11/25/2024 4:24 AM: Tmp dir: C:\Users\user\AppData\Local\Temp\u0djtksr.ouv..11/25/2024 4:24 AM: Received from standard out: ..11/25/2024 4:24 AM: Received from standard out: 7-Zip 18.05 (x86) : Copyright (c) 1999-2018 Igor Pavlov : 2018-04-30..11/25/2024 4:24 AM: Received from standard out: ..11/25/2024 4:24 AM: Received from standard out: Scanning the drive for archives:..11/25/2024 4:24 AM: Received from standard out: 1 file, 15494 bytes (16 KiB)..11/25/2024 4:24 AM: Received from standard out: ..11/25/2024 4:24 AM: Received from standard out: Extracting archive: C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip..11/25/2024 4:24 AM: Received from standard out: --..11/25/2024 4:24 AM: Received from standard out: Path = C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip..11/25/2024 4:24 AM: Received from standard out: Type =
      File type:Zip archive data, at least v2.0 to extract, compression method=store
      Entropy (8bit):7.986067276875396
      TrID:
      • ZIP compressed archive (8000/1) 100.00%
      File name:38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip
      File size:15'494 bytes
      MD5:c8d64c4bf48d060b7846bf784a3ed8e6
      SHA1:6c70e7f472d32b1a87a65d813d1b8dd912c8e5ae
      SHA256:0f916bceb39dc84ff6de87d89b0440d2ec44cf8102f806d7374fe70458820e14
      SHA512:dc8994e8b274ed31b53df43946cffb144ee9e3962420983bf915f0413e74db7cf39aeb584dd7f0b2d4a327de41f54905412001d25d968e72d193bddf48f0477c
      SSDEEP:384:pGu4d1GPOOtmSA+HTBCMiIB9vDeMcdBQO1O:ArGPVtT13B9vDeMcnQKO
      TLSH:7862C055514908E025C5EBF7B79DC14509E3580290CFF60A3E51B6E334AAD06BF3AE2B
      File Content Preview:PK.........RyY...2.;...;..2...38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.....hU........9.j.7_.H.F..?1..R.e..2..h].#.c.S..O..D.Qk...U...2.u.c...Z2.wc.R.!..6.*....t..K&....AA...T...I...hn.{J...B.r.....R......N....W.u@:..A...v..w...D($..n......;..=.d
      Icon Hash:90cececece8e8eb0
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:04:24:21
      Start date:25/11/2024
      Path:C:\Windows\SysWOW64\unarchiver.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip"
      Imagebase:0xa0000
      File size:12'800 bytes
      MD5 hash:16FF3CC6CC330A08EED70CBC1D35F5D2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:04:24:22
      Start date:25/11/2024
      Path:C:\Windows\SysWOW64\7za.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\u0djtksr.ouv" "C:\Users\user\Desktop\38ee10f0-ac87-4c0c-9d71-65200cb8e337.tmp.0.dr.1.dr.zip"
      Imagebase:0x310000
      File size:289'792 bytes
      MD5 hash:77E556CDFDC5C592F5C46DB4127C6F4C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:04:24:22
      Start date:25/11/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly