Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OneDrive_1_25-11-2024.zip

Overview

General Information

Sample name:OneDrive_1_25-11-2024.zip
Analysis ID:1562266
MD5:35f5af664863b514eea4870ad0b3a493
SHA1:8c8630bbba23d64dd1b63fe726982ea2e0fed098
SHA256:fa9e09e1cc1e240440ca21d233841eb0611bc9664bedc9e27f55fc30573dfbb1

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64_ra
  • rundll32.exe (PID: 5416 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: OneDrive_1_25-11-2024.zipString found in binary or memory: http://www.eci.org/eci/en/eciRGB.php
Source: OneDrive_1_25-11-2024.zipString found in binary or memory: http://www.eci.org/eci/en/eciRGB.phpdesc
Source: OneDrive_1_25-11-2024.zipBinary or memory string: OriginalFilenameKRoMX2011.exep( vs OneDrive_1_25-11-2024.zip
Source: OneDrive_1_25-11-2024.zipBinary or memory string: OriginalFilenameKRoMX2018.exep( vs OneDrive_1_25-11-2024.zip
Source: classification engineClassification label: clean1.winZIP@1/0@0/0
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: KRoMX2011.exeString found in binary or memory: NATS-SEFI-ADD
Source: KRoMX2011.exeString found in binary or memory: NATS-DANO-ADD
Source: KRoMX2011.exeString found in binary or memory: JIS_C6229-1984-b-add
Source: KRoMX2011.exeString found in binary or memory: jp-ocr-b-add
Source: KRoMX2011.exeString found in binary or memory: JIS_C6229-1984-hand-add
Source: KRoMX2011.exeString found in binary or memory: jp-ocr-hand-add
Source: KRoMX2011.exeString found in binary or memory: ISO_6937-2-add
Source: KRoMX2011Test.exeString found in binary or memory: NATS-SEFI-ADD
Source: KRoMX2011Test.exeString found in binary or memory: NATS-DANO-ADD
Source: KRoMX2011Test.exeString found in binary or memory: JIS_C6229-1984-b-add
Source: KRoMX2011Test.exeString found in binary or memory: jp-ocr-b-add
Source: KRoMX2011Test.exeString found in binary or memory: JIS_C6229-1984-hand-add
Source: KRoMX2011Test.exeString found in binary or memory: jp-ocr-hand-add
Source: KRoMX2011Test.exeString found in binary or memory: ISO_6937-2-add
Source: OneDrive_1_25-11-2024.zipStatic file information: File size 53451478 > 1048576
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
Path InterceptionPath Interception1
Rundll32
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.eci.org/eci/en/eciRGB.phpdescOneDrive_1_25-11-2024.zipfalse
    high
    http://www.eci.org/eci/en/eciRGB.phpOneDrive_1_25-11-2024.zipfalse
      high
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1562266
      Start date and time:2024-11-25 12:40:45 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 20s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsinteractivecookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:11
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:OneDrive_1_25-11-2024.zip
      Detection:CLEAN
      Classification:clean1.winZIP@1/0@0/0
      Cookbook Comments:
      • Found application associated with file extension: .zip
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: OneDrive_1_25-11-2024.zip
      No simulations
      No context
      No context
      No context
      No context
      No context
      No created / dropped files found
      File type:Zip archive data, at least v2.0 to extract, compression method=store
      Entropy (8bit):6.728250496491997
      TrID:
      • ZIP compressed archive (8000/1) 100.00%
      File name:OneDrive_1_25-11-2024.zip
      File size:53'451'478 bytes
      MD5:35f5af664863b514eea4870ad0b3a493
      SHA1:8c8630bbba23d64dd1b63fe726982ea2e0fed098
      SHA256:fa9e09e1cc1e240440ca21d233841eb0611bc9664bedc9e27f55fc30573dfbb1
      SHA512:f26ffce90c726ca255849f0884168867f5d055cab38d194335479abd7585fe09b38c0ba8c8f3c34233c1c1073649e1986a1779ac8c7d2fda845501a6730ff124
      SSDEEP:393216:vwwj5VFiDqRGPaOV5+r9ejQfTt4+wQ+h2TgMK0PX+BLsrl6ocdDWuxH353J:vwyQKGPa7EjQfTmb4TgMKDLsYhtXxHp5
      TLSH:BDC78D16B6459439C0261B328D2BAB55643BBFB1AA318447BBF83F0D5FF0641BD3924B
      File Content Preview:PK.........VyY................KRoMX2011.exeMZP.....................@......Pjr......................................!..L.!..This program must be run under Win32..$7............................................................................................
      Icon Hash:1c1c1e4e4ececedc
      No network behavior found

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:06:41:13
      Start date:25/11/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      Imagebase:0x7ff743830000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:false
      Has administrator privileges:false
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      No disassembly