Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://fat-doc.s3.us-east-2.amazonaws.com/Comprovativo_Abril_KDZlyr_26-04-2024_64.zip?=PGNPUKVOPEHCMOLUMNPIBIKXCKFBEBOPMVCSFREHAACJTZHQQDMNCHWFHRMVUUJNQSRQMTOUIHHAGQCFRPLAPBNDXXJPFJOFRPTBGREXQREVKZKSPGDEIIWPFNUPIKPWUBJRXBKAJOLWXREWZSKWGIZHRDXTZPNQBFBZOIVOHCUUZKSOIVSRKQSLE

Overview

General Information

Sample URL:https://fat-doc.s3.us-east-2.amazonaws.com/Comprovativo_Abril_KDZlyr_26-04-2024_64.zip?=PGNPUKVOPEHCMOLUMNPIBIKXCKFBEBOPMVCSFREHAACJTZHQQDMNCHWFHRMVUUJNQSRQMTOUIHHAGQCFRPLAPBNDXXJPFJOFRPTBGREXQREVKZKS
Analysis ID:1433174
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected ZipBomb
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Found WSH timer for Javascript or VBS script (likely evasive script)
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6788 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://fat-doc.s3.us-east-2.amazonaws.com/Comprovativo_Abril_KDZlyr_26-04-2024_64.zip?=PGNPUKVOPEHCMOLUMNPIBIKXCKFBEBOPMVCSFREHAACJTZHQQDMNCHWFHRMVUUJNQSRQMTOUIHHAGQCFRPLAPBNDXXJPFJOFRPTBGREXQREVKZKSPGDEIIWPFNUPIKPWUBJRXBKAJOLWXREWZSKWGIZHRDXTZPNQBFBZOIVOHCUUZKSOIVSRKQSLE MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6608 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1960,i,8941980370019695632,7496778106780440880,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • rundll32.exe (PID: 7556 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • wscript.exe (PID: 7700 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • wscript.exe (PID: 7916 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • wscript.exe (PID: 8180 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • cleanup
SourceRuleDescriptionAuthorStrings
C:\Users\user\Downloads\596cd038-db66-4afc-815f-ca69191c7893.tmpJoeSecurity_ZipBombYara detected ZipBombJoe Security
    C:\Users\user\Downloads\596cd038-db66-4afc-815f-ca69191c7893.tmpJoeSecurity_ZipBombYara detected ZipBombJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4380, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , ProcessId: 7700, ProcessName: wscript.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4380, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , ProcessId: 7700, ProcessName: wscript.exe
      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4380, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , ProcessId: 7700, ProcessName: wscript.exe
      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4380, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs" , ProcessId: 7700, ProcessName: wscript.exe
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: fat-doc.s3.us-east-2.amazonaws.com
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
      Source: classification engineClassification label: mal60.evad.win@18/8@4/138
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\596cd038-db66-4afc-815f-ca69191c7893.tmp
      Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs"
      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://fat-doc.s3.us-east-2.amazonaws.com/Comprovativo_Abril_KDZlyr_26-04-2024_64.zip?=PGNPUKVOPEHCMOLUMNPIBIKXCKFBEBOPMVCSFREHAACJTZHQQDMNCHWFHRMVUUJNQSRQMTOUIHHAGQCFRPLAPBNDXXJPFJOFRPTBGREXQREVKZKSPGDEIIWPFNUPIKPWUBJRXBKAJOLWXREWZSKWGIZHRDXTZPNQBFBZOIVOHCUUZKSOIVSRKQSLE
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1960,i,8941980370019695632,7496778106780440880,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1960,i,8941980370019695632,7496778106780440880,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Temp1_Comprovativo_Abril_KDZlyr_26-04-2024_64.zip\Comprovativo_Abril_KDZlyr_26-04-2024_64\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs"
      Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs"
      Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs"
      Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: Yara matchFile source: C:\Users\user\Downloads\596cd038-db66-4afc-815f-ca69191c7893.tmp, type: DROPPED
      Source: Yara matchFile source: C:\Users\user\Downloads\596cd038-db66-4afc-815f-ca69191c7893.tmp, type: DROPPED
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
      Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity Information11
      Scripting
      Valid AccountsWindows Management Instrumentation11
      Scripting
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      Virtualization/Sandbox Evasion
      Remote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      LSASS Memory2
      System Information Discovery
      Remote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAt1
      Registry Run Keys / Startup Folder
      1
      Registry Run Keys / Startup Folder
      1
      Rundll32
      Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Process Injection
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      https://fat-doc.s3.us-east-2.amazonaws.com/Comprovativo_Abril_KDZlyr_26-04-2024_64.zip?=PGNPUKVOPEHCMOLUMNPIBIKXCKFBEBOPMVCSFREHAACJTZHQQDMNCHWFHRMVUUJNQSRQMTOUIHHAGQCFRPLAPBNDXXJPFJOFRPTBGREXQREVKZKSPGDEIIWPFNUPIKPWUBJRXBKAJOLWXREWZSKWGIZHRDXTZPNQBFBZOIVOHCUUZKSOIVSRKQSLE0%Avira URL Cloudsafe
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      www.google.com
      142.250.191.100
      truefalse
        high
        s3-r-w.us-east-2.amazonaws.com
        3.5.133.164
        truefalse
          high
          fat-doc.s3.us-east-2.amazonaws.com
          unknown
          unknownfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            3.5.133.164
            s3-r-w.us-east-2.amazonaws.comUnited States
            16509AMAZON-02USfalse
            1.1.1.1
            unknownAustralia
            13335CLOUDFLARENETUSfalse
            142.250.190.14
            unknownUnited States
            15169GOOGLEUSfalse
            142.250.190.99
            unknownUnited States
            15169GOOGLEUSfalse
            142.250.190.67
            unknownUnited States
            15169GOOGLEUSfalse
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            142.250.191.100
            www.google.comUnited States
            15169GOOGLEUSfalse
            142.251.165.84
            unknownUnited States
            15169GOOGLEUSfalse
            142.250.191.110
            unknownUnited States
            15169GOOGLEUSfalse
            IP
            192.168.2.16
            192.168.2.5
            192.168.2.23
            192.168.2.15
            192.168.2.14
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1433174
            Start date and time:2024-04-29 10:38:50 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsinteractivecookbook.jbs
            Sample URL:https://fat-doc.s3.us-east-2.amazonaws.com/Comprovativo_Abril_KDZlyr_26-04-2024_64.zip?=PGNPUKVOPEHCMOLUMNPIBIKXCKFBEBOPMVCSFREHAACJTZHQQDMNCHWFHRMVUUJNQSRQMTOUIHHAGQCFRPLAPBNDXXJPFJOFRPTBGREXQREVKZKSPGDEIIWPFNUPIKPWUBJRXBKAJOLWXREWZSKWGIZHRDXTZPNQBFBZOIVOHCUUZKSOIVSRKQSLE
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:17
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            Analysis Mode:stream
            Detection:MAL
            Classification:mal60.evad.win@18/8@4/138
            • Exclude process from analysis (whitelisted): svchost.exe
            • Excluded IPs from analysis (whitelisted): 142.250.190.99, 142.250.191.110, 142.251.165.84, 34.104.35.123
            • Excluded domains from analysis (whitelisted): clients2.google.com, accounts.google.com, edgedl.me.gvt1.com, clientservices.googleapis.com, clients.l.google.com
            • Not all processes where analyzed, report is missing behavior information
            • Skipping network analysis since amount of network traffic is too extensive
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 07:39:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2673
            Entropy (8bit):3.987300417494384
            Encrypted:false
            SSDEEP:
            MD5:7200F8F24B1071070C0EFFE91F9F29A7
            SHA1:8269D6A28F9ECC415DDEA9B642CB00064E0C0516
            SHA-256:973DC6C0B3D56BCA8CA577FF30C30B8E29BC05828435A9E13F7373FEC70ED658
            SHA-512:458C6617E9088BC3CDB3522E5B5B31BB4EC6DBF8CE554FA296E5C4A62E0B4FC9B7607B94E2271C7CB7D5E855A029667FB3F7D329E5FDC4FAD1B48CBCDD92F1D7
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,......v.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.D....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.D....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.D....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.D..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.D...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........03.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 07:39:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2675
            Entropy (8bit):4.000897570628229
            Encrypted:false
            SSDEEP:
            MD5:43E950AA6217B2E4170F389A9F43D59D
            SHA1:7DE8B2488E3EEA92B0FF05F0865143C64557003C
            SHA-256:C45283C2B3F13FAFDEEFF4A8527A2B689DE7596A95B97C9000D153DE3F8C6823
            SHA-512:CF8371F5F082456B43B228FD8ED3C03DCF6C93BFA8C9DF7B218609E80A1CE1CA80CCAE1F6D52FB840176A57F661150454C29A6E2DFF36DB85044916F5FB8327D
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....E.l.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.D....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.D....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.D....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.D..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.D...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........03.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2689
            Entropy (8bit):4.00848701832791
            Encrypted:false
            SSDEEP:
            MD5:A800B34F827A653CD65750E5A29B4BE5
            SHA1:0C13A4DC62F3B0FA7C66033668763993B52A9530
            SHA-256:8E26DEFA435D275929990823BEC9F221249252B71CD7825FDADB1D770A5F861B
            SHA-512:0FEEC4ED27686F23D840D9EBBD4F294A3D1CBFA67FD56C227F75EB35247D042E8DEA4E6EBCD0150CFF0CB10FCDFD589E7CA9C280EBD5232339D4CE35755DBAFC
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.D....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.D....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.D....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.D..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........03.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 07:39:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9989435479408915
            Encrypted:false
            SSDEEP:
            MD5:9BCE03D068D51C6D343512CBF8057335
            SHA1:B699CBEA43D8F6388A12CD8FAEB7FA6B3D675835
            SHA-256:A55560DF0E40C0A4546B3FA7F61B35816A5DA199F4B8B9E3007EA148BD25B880
            SHA-512:CC658B3A88A224F87BCA0B419FBD8867206EDAE12327E3E4695D58E44A313C1059C0D9F6BDA77CBFE86CC713E6C15C27E52D30A97A48E56D5C0851D003C14CCD
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....Nf.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.D....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.D....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.D....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.D..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.D...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........03.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 07:39:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9900974441144474
            Encrypted:false
            SSDEEP:
            MD5:9C00A0F46CF64E7375D01E8ECB56BC73
            SHA1:E48CD72635B6B354E900EA1C54246DA028C64C96
            SHA-256:2B5044BE8848CA531179FA6FF7375EB46EC2C479672931546DD67F6AD0D1FB44
            SHA-512:23E2747C73C27010666110235AF17162211EF3DFB6504C980847E5A788E499C9C5D85932D19F99EC5D2D69DA644931F998EDC382273101AE1FFD0ABAF1A4E374
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,......q.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.D....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.D....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.D....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.D..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.D...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........03.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 07:39:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2679
            Entropy (8bit):3.9991209619637162
            Encrypted:false
            SSDEEP:
            MD5:53EB8D5DAB562DADC02B255CD2EE190E
            SHA1:8F711A6D8D368E146C7107C9F8F27D2841B00D4B
            SHA-256:0A80CFA0FA5286D519CCEA162294046BF991A2606D4BE32606ED6D6D0BE746D0
            SHA-512:B5F5E9C63B660BEF6A0716A699E21842138AA0537F2E61AB6200C5CE65EA1A5E9364851C3A6ABCA9DD9B17CC2612E9282A5E5C9BE94C3B43C9A7D6F4807526C6
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....D.].....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.D....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.D....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.D....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.D..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.D...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........03.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
            Category:dropped
            Size (bytes):16969
            Entropy (8bit):7.973336412433801
            Encrypted:false
            SSDEEP:
            MD5:ED03C15CD57FAF4BF9094CE55D13E99A
            SHA1:0F9CFC2D78B0EA915353D1C0D7B42B1C128F2417
            SHA-256:CB381972FB40C3D96856DDDEB244A480A279573FAEDA18C68843BCFDCCDFCCF6
            SHA-512:44EB60F32F4D684735F5E56F2910171B2369E9E488AC9C9FF06D3EC7F0EC67877AFCC7E538A683090A76454D9F25615432D8306B070227BCE8C5B8747BF83254
            Malicious:true
            Yara Hits:
            • Rule: JoeSecurity_ZipBomb, Description: Yara detected ZipBomb, Source: C:\Users\user\Downloads\596cd038-db66-4afc-815f-ca69191c7893.tmp, Author: Joe Security
            • Rule: JoeSecurity_ZipBomb, Description: Yara detected ZipBomb, Source: C:\Users\user\Downloads\596cd038-db66-4afc-815f-ca69191c7893.tmp, Author: Joe Security
            Reputation:unknown
            Preview:PK........RE.X.....R..f.,.S...Comprovativo_Abril_KDZlyr_26-04-2024_64/Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs$\..,..wD.CG.G/..T.....N.....7.......!..oH.V.y..5.......;.....JB.}uk..n...=_A.qd....kv.vu@sNuiT}|...b.....x..E..S....7/.<hX..a.h.....<.4%.B\..u...1H..W....#.fc.#C..>.B..m.j.W...=WY...?...b8...)JAd.Y...\.m...j.$.........j.Z.U/..:./+....Z........U...;p....t.kK ..%.'..:C.....#}.d..n..Y..~.-.Y..#L...?.....&..Z...n.+w+....yR.<..e..=.6R..^..y..D..s..}.....y..+4..v....m.o..\fJ6.\a.....0-z..\.....t...l.3{......2lR\..Ni......f/..k.1.X8c@...m."}N..|.>..6.9.hLoN5m....f.\.\..*b:....1....(.p2YE..'.Q...@#.E.=a.....z....P..'.."hk,..j.g....t1........I..3......lo..F...V-c..]W...*..9..........C.....|.)8...Q....{G..)E.....cd..t..B.g..&....e.[._...Oj..]sv(_...\..i.+8.a-...q.T,..|._L~Q.e-...p.5.l.&...).....CA../Vz...lNt..,Fd.S...g.....T.7..(..8d.U....9..Y..b/{P...X..T..X..u.bZ.FkEsL...gniYO..Y...G~......y.. .......n`..v.)*3bG.{...9...v.'H.Q..c@).L.<f..f.t....
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
            Category:dropped
            Size (bytes):0
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:
            MD5:21C6DB1C126E90A2293E70F11718D64B
            SHA1:DFCE67C04701B02A412CCD624407D3A791ED841B
            SHA-256:7DE30905736469D383302807E6DC60C97FD0C23C4AF12049A1851EA5752EC591
            SHA-512:F11E75A950AE259E2A1D69D558BBC2B6544674C5B476A81C43214B5F1ED40DCBC10225751FB2687D18F17AC1675F2096C09008833E2138D836EF4395D1B82CB8
            Malicious:false
            Reputation:unknown
            Preview:PK........RE.X.....R..f.,.S...Comprovativo_Abril_KDZlyr_26-04-2024_64/Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs$\..,..wD.CG.G/..T.....N.....7.......!..oH.V.y..5.......;.....JB.}uk..n...=_A.qd....kv.vu@sNuiT}|...b.....x..E..S....7/.<hX..a.h.....<.4%.B\..u...1H..W....#.fc.#C..>.B..m.j.W...=WY...?...b8...)JAd.Y...\.m...j.$.........j.Z.U/..:./+....Z........U...;p....t.kK ..%.'..:C.....#}.d..n..Y..~.-.Y..#L...?.....&..Z...n.+w+....yR.<..e..=.6R..^..y..D..s..}.....y..+4..v....m.o..\fJ6.\a.....0-z..\.....t...l.3{......2lR\..Ni......f/..k.1.X8c@...m."}N..|.>..6.9.hLoN5m....f.\.\..*b:....1....(.p2YE..'.Q...@#.E.=a.....z....P..'.."hk,..j.g....t1........I..3......lo..F...V-c..]W...*..9..........C.....|.)8...Q....{G..)E.....cd..t..B.g..&....e.[._...Oj..]sv(_...\..i.+8.a-...q.T,..|._L~Q.e-...p.5.l.&...).....CA../Vz...lNt..,Fd.S...g.....T.7..(..8d.U....9..Y..b/{P...X..T..X..u.bZ.FkEsL...gniYO..Y...G~......y.. .......n`..v.)*3bG.{...9...v.'H.Q..c@).L.<f..f.t....
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
            Category:dropped
            Size (bytes):150160258
            Entropy (8bit):7.994797239537333
            Encrypted:true
            SSDEEP:
            MD5:21C6DB1C126E90A2293E70F11718D64B
            SHA1:DFCE67C04701B02A412CCD624407D3A791ED841B
            SHA-256:7DE30905736469D383302807E6DC60C97FD0C23C4AF12049A1851EA5752EC591
            SHA-512:F11E75A950AE259E2A1D69D558BBC2B6544674C5B476A81C43214B5F1ED40DCBC10225751FB2687D18F17AC1675F2096C09008833E2138D836EF4395D1B82CB8
            Malicious:false
            Reputation:unknown
            Preview:PK........RE.X.....R..f.,.S...Comprovativo_Abril_KDZlyr_26-04-2024_64/Comprovativo_Abril_KDZlyr_26-04-2024_64.vbs$\..,..wD.CG.G/..T.....N.....7.......!..oH.V.y..5.......;.....JB.}uk..n...=_A.qd....kv.vu@sNuiT}|...b.....x..E..S....7/.<hX..a.h.....<.4%.B\..u...1H..W....#.fc.#C..>.B..m.j.W...=WY...?...b8...)JAd.Y...\.m...j.$.........j.Z.U/..:./+....Z........U...;p....t.kK ..%.'..:C.....#}.d..n..Y..~.-.Y..#L...?.....&..Z...n.+w+....yR.<..e..=.6R..^..y..D..s..}.....y..+4..v....m.o..\fJ6.\a.....0-z..\.....t...l.3{......2lR\..Ni......f/..k.1.X8c@...m."}N..|.>..6.9.hLoN5m....f.\.\..*b:....1....(.p2YE..'.Q...@#.E.=a.....z....P..'.."hk,..j.g....t1........I..3......lo..F...V-c..]W...*..9..........C.....|.)8...Q....{G..)E.....cd..t..B.g..&....e.[._...Oj..]sv(_...\..i.+8.a-...q.T,..|._L~Q.e-...p.5.l.&...).....CA../Vz...lNt..,Fd.S...g.....T.7..(..8d.U....9..Y..b/{P...X..T..X..u.bZ.FkEsL...gniYO..Y...G~......y.. .......n`..v.)*3bG.{...9...v.'H.Q..c@).L.<f..f.t....
            No static file info