'
metaflows logo
Category Started On Completed On Duration Cuckoo Version
FILE 2016-09-13 09:10:06.289399 2016-09-13 09:11:29.736628 83 seconds 2.0-dev
Machine Label Manager Started On Shutdown On
win7cuckoo2 win7 Clone 2 VirtualBox 2016-09-13 09:10:07 2016-09-13 09:11:29

File Details

File name 1a155a962541b7ba6747588ad97ec4a458b18b55.zip
File size 10551615 bytes
File type Zip archive data, at least v1.0 to extract
CRC32 23E29895
MD5 8a98f07f6c4fecc5909dc22229a4122d
SHA1 1a155a962541b7ba6747588ad97ec4a458b18b55
SHA256 2a935451a35f05254eb730fdc7942fa4b1707107501b30cc38df94ff7a55fd83
SHA512 63deef75fb3231b6799270d7794b695ac99954d272f0e6c686246a9c827f79413165a610445363e83f336006d38148e518760b574d65153e852bd7ac84de85e9
Ssdeep 196608:Uvt6FSpLkEZm6omlrYXPVKTvHJ0WVbHDvm3kKozvQDgnji/jCd7TyQ4ipXPpgaoe:zIpdZmz0rYfVKvHJPm38vogwjCd7Tyo7
PEiD None matched
Yara
  • shellcode (Matched shellcode byte patterns)
VirusTotal File not found on VirusTotal

MetaFlows Scores

Metaflows Analysis Results (Signatures=0, Anomalies=0, PEiD=0, Yara=2, VT[1473757897]=0): Snort Events=0, AV Events=12
Total Score=25

CLAMAV DETECTED:
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND
PhishTank.Phishing.4031174.UNOFFICIAL FOUND

Dropped File/Buffer Yara Signatures:
STDeployerCore.dll: Str_Win32_Winsock2_Library


Zipped File Yara Signatures:
metaData/products.xml: vmdetect
metaData/patchBulletinMetaData.xml: embedded_win_api
deployment/vendorCertificates.xml: vmdetect
deployment/STDeployerCore.dll: Str_Win32_Winsock2_Library
metaData/cvePatches.xml: embedded_win_api
assessment/bulletins.obf: shellcode

Signatures

No signatures matched

Screenshots

No screenshots available.

Static Analysis

Nothing to display.

Dropped Files

STDeployerCore.dll

Network Analysis

Hosts Involved

DNS Requests

HTTP Requests

Behavior Summary

File-Opened
  • C:\Windows\System32\en-US\KERNELBASE.dll.mui
Registry Key-Read
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\WMR\Disable
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles

Processes

registry filesystem process services network synchronization

C:\Windows\system32\lsass.exe PID: 460, Parent PID: 364

"C:\Windows\System32\rundll32.exe" C : \ U s e r s \ H A R R Y D ~ 1 \ A p p D a t a \ L o c a l \ T e m p \ d e p l o y m e n t / S T D e p l o y e r C o r e . d l l , D l l M a i n PID: 3548, Parent PID: 5568

Volatility

Nothing to display.