Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip

Overview

General Information

Sample name:MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip
Analysis ID:1428806
MD5:d643c338c5433325d7eb951dcdbdd49e
SHA1:ff9b656a93c29be4d27c5c7a84fbad6745bd645e
SHA256:01dab660885e34c8ff340193ddbe08aedacf75e4636e2a794e32c860ca47a2c7
Infos:

Detection

Score:21
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

PE file has a writeable .text section
Drops PE files
Queries the volume information (name, serial number etc) of a device

Classification

Analysis Advice

Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample searches for specific file, try point organization specific fake files to the analysis machine
  • System is w10x64_ra
  • rundll32.exe (PID: 6420 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • rhc.exe (PID: 6968 cmdline: "C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exe" MD5: ABC6379205DE2618851C4FCBF72112EB)
  • cmd.exe (PID: 448 cmdline: "C:\Windows\system32\cmd.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • 7zG.exe (PID: 3264 cmdline: "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\" -an -ai#7zMap13122:172:7zEvent2168 MD5: 50F289DF0C19484E970849AAC4E6F977)
  • rhc.exe (PID: 6816 cmdline: "C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exe" MD5: ABC6379205DE2618851C4FCBF72112EB)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

System Summary

barindex
Source: rhc.exe.20.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: rhc.exe.20.drStatic PE information: Section .text
Source: classification engineClassification label: sus21.winZIP@6/1@0/0
Source: C:\Program Files\7-Zip\7zG.exeFile created: C:\Users\user\Desktop\rhc.exeJump to behavior
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exe "C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exe"
Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Program Files\7-Zip\7zG.exe "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\" -an -ai#7zMap13122:172:7zEvent2168
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exe "C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exe"
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files\7-Zip\7zG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\7-Zip\7zG.exeFile created: C:\Users\user\Desktop\rhc.exeJump to dropped file
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeFile Volume queried: C:\Users\user FullSizeInformationJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\conhost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping2
File and Directory Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Rundll32
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1428806 Sample: MDE_File_Sample_1ed7b1e965e... Startdate: 19/04/2024 Architecture: WINDOWS Score: 21 19 PE file has a writeable .text section 2->19 6 7zG.exe 1 2->6         started        9 cmd.exe 1 2->9         started        11 rundll32.exe 2->11         started        13 2 other processes 2->13 process3 file4 17 C:\Users\user\Desktop\rhc.exe, PE32 6->17 dropped 15 conhost.exe 1 9->15         started        process5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Users\user\Desktop\rhc.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428806
Start date and time:2024-04-19 16:33:19 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 51s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:25
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip
Detection:SUS
Classification:sus21.winZIP@6/1@0/0
EGA Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .zip
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, TextInputHost.exe
  • Excluded domains from analysis (whitelisted): fp.msedge.net, www.bing.com, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, b-ring.msedge.net, t-ring.msedge.net, fe3cr.delivery.mp.microsoft.com, c-ring.msedge.net, login.live.com, r.bing.com, evoke-windowsservices-tas.msedge.net, browser.pipe.aria.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\Desktop\rhc.exehttps://xvideocallgirl.top/fullclip/?fbclid=IwAR0XXaMl8JkF9Vu7G_kLWBmwu9V39Q_f-Hr-2hYk3ee4AVoPInF4pmx9flAGet hashmaliciousUnknownBrowse
    X270IE48_2023-10-16_14_24_38.742.zipGet hashmaliciousUnknownBrowse
      data1.exeGet hashmaliciousUnknownBrowse
        NewCPhong.exeGet hashmaliciousUnknownBrowse
          hu_HU.zipGet hashmaliciousUnknownBrowse
            yspx-v3.2.25-setup.exeGet hashmaliciousBazaLoaderBrowse
              ContentCloud.zipGet hashmaliciousUnknownBrowse
                Album_One_Night_Stand_Jing_Len.zipGet hashmaliciousUnknownBrowse
                  AVATAR2_THE_WAY_OF_WATER_FULL_HIGH_DEFINITION_WITH_SUBTITLES.exeGet hashmaliciousUnknownBrowse
                    AVATAR2_THE_WAY_OF_WATER_FULL_HIGH_DEFINITION_WITH_SUBTITLES.exeGet hashmaliciousUnknownBrowse
                      Process:C:\Program Files\7-Zip\7zG.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):1536
                      Entropy (8bit):4.3050049770072105
                      Encrypted:false
                      SSDEEP:24:eFGSPZMexrSoVjAL5jhsUnqzQhVJx+y/F/mnSBgZpwA:iJr7jALHqzPgESBg
                      MD5:ABC6379205DE2618851C4FCBF72112EB
                      SHA1:1ED7B1E965EAB56F55EFDA975F9F7ADE95337267
                      SHA-256:22E7528E56DFFAA26CFE722994655686C90824B13EB51184ABFE44D4E95D473F
                      SHA-512:180C7F400DD13092B470E3A91BF02E98EF6247C1193BF349E3710E8D1E9003F3BC9B792BB776EACB746E9C67B3041F2333CC07F28C5F046D59274742230FB7C1
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 5%
                      Joe Sandbox View:
                      • Filename: , Detection: malicious, Browse
                      • Filename: X270IE48_2023-10-16_14_24_38.742.zip, Detection: malicious, Browse
                      • Filename: data1.exe, Detection: malicious, Browse
                      • Filename: NewCPhong.exe, Detection: malicious, Browse
                      • Filename: hu_HU.zip, Detection: malicious, Browse
                      • Filename: yspx-v3.2.25-setup.exe, Detection: malicious, Browse
                      • Filename: ContentCloud.zip, Detection: malicious, Browse
                      • Filename: Album_One_Night_Stand_Jing_Len.zip, Detection: malicious, Browse
                      • Filename: AVATAR2_THE_WAY_OF_WATER_FULL_HIGH_DEFINITION_WITH_SUBTITLES.exe, Detection: malicious, Browse
                      • Filename: AVATAR2_THE_WAY_OF_WATER_FULL_HIGH_DEFINITION_WITH_SUBTITLES.exe, Detection: malicious, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&..IG..IG..IG...d..LG..IG..NG...c..HG...c..HG..RichIG..................PE..L....$.B..................................... ....@.......................... ..................................................<.......................................................................................$............................text............................... ...........................p.......................................About:..hidec hides console window of started program & waits (opt.) for its termination..Usage:...hidec [/w] <filename>..Where:../w.wait for program termination.filename.executable file name.Error: Incorrect usage....TSUV3.3.. ....@...:"u.."...I..B.B:.t...u....:.t..B.B..t.< t.<.t...u.Uh..@.h(.@.U....@.U....@.</u..B.. <wu..z. u.............t.< t.<.u..B.B..u.W3.......|$ .L$.Q.D$$PUUj.UUURU.D$HD....D$t....f.l$x....@..._t';.t..L$.j.Q....@..T$..
                      File type:Zip archive data, at least v2.0 to extract, compression method=deflate
                      Entropy (8bit):7.5388134749031614
                      TrID:
                      • ZIP compressed archive (8000/1) 100.00%
                      File name:MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip
                      File size:953 bytes
                      MD5:d643c338c5433325d7eb951dcdbdd49e
                      SHA1:ff9b656a93c29be4d27c5c7a84fbad6745bd645e
                      SHA256:01dab660885e34c8ff340193ddbe08aedacf75e4636e2a794e32c860ca47a2c7
                      SHA512:2cd723b854328037e52c25874a5de9eb295746a1228aac90558f79eacffe890ca9652cb2b64459eb93df5224e21c5c3ae79e8341fa0772f036ed1c8812d66e1d
                      SSDEEP:24:9E3KkdvWZkFgxlqLc4UkEgjVDLB87Dv+yVb5lcePh3K3N:9uQjrqLcO1DFMDv+2b5+eP0N
                      TLSH:3111BB584DEF830DE214C8FFAD55AD18C6F4F5D0F225BC0B19D6A1506C061E1194D2AD
                      File Content Preview:PK.........r.X..............$.rhc.exe.. .........U...e...T...e...I...e.....HYw.......e...).q. ,...3Zo"..@...f....S..1.8!...L..H.~".*x.....LoI......242.X#E.&....E...U..=;...}.!p=U.b..wfH..1m_.S.m...aZ..^'.=6j.v.W.q...spn.Dxf9AKT......./8y.X"9.$...l...6k..9
                      Icon Hash:1c1c1e4e4ececedc
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:16:33:57
                      Start date:19/04/2024
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                      Imagebase:0x7ff6d6260000
                      File size:71'680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:16:34:12
                      Start date:19/04/2024
                      Path:C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exe"
                      Imagebase:0x400000
                      File size:1'536 bytes
                      MD5 hash:ABC6379205DE2618851C4FCBF72112EB
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:false

                      Target ID:14
                      Start time:16:34:22
                      Start date:19/04/2024
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\system32\cmd.exe"
                      Imagebase:0x7ff7dd030000
                      File size:289'792 bytes
                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:15
                      Start time:16:34:22
                      Start date:19/04/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff772470000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:20
                      Start time:16:35:11
                      Start date:19/04/2024
                      Path:C:\Program Files\7-Zip\7zG.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\user\Desktop\" -an -ai#7zMap13122:172:7zEvent2168
                      Imagebase:0x480000
                      File size:700'416 bytes
                      MD5 hash:50F289DF0C19484E970849AAC4E6F977
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:24
                      Start time:16:35:28
                      Start date:19/04/2024
                      Path:C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\Temp2_MDE_File_Sample_1ed7b1e965eab56f55efda975f9f7ade95337267.zip\rhc.exe"
                      Imagebase:0x400000
                      File size:1'536 bytes
                      MD5 hash:ABC6379205DE2618851C4FCBF72112EB
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:false

                      No disassembly