metaflows logo
Category Started On Completed On Duration Cuckoo Version
FILE 2017-07-04 07:50:14.986138 2017-07-04 07:50:48.774237 33 seconds 2.0-dev
Machine Label Manager Started On Shutdown On
win7cuckoo win7 Clone 1 VirtualBox 2017-07-04 07:50:15 2017-07-04 07:50:47


File Details

File name 3423a4b953243e6f670fdd441e9fd884224df72b.zip
File size 1421 bytes
File type Zip archive data
CRC32 DC66449A
MD5 a043e75daab09e18426714b27e0b6f0d
SHA1 3423a4b953243e6f670fdd441e9fd884224df72b
SHA256 2d5c0c74a4b74b7100616808eadeaed6ebbe65ec808af5b842d182c2943b04e8
SHA512 90652b93783b1718f694a5d10ff0f1dba719e2a49ab62641cc4d14622fa5879dc242979681934cae99122473a9c4d20d245de041351fb3ba893afb03cf4fcb69
Ssdeep None
PEiD None matched
  • PM_Zip_with_js ()
VirusTotal File not found on VirusTotal

MetaFlows Scores

Metaflows Analysis Results (Signatures=0, Anomalies=0, PEiD=0, Yara=2, VT[1499169053]=0): Snort Events=0, AV Events=0
Total Score=2

File intentionally breaks sandbox processing and looks highly suspicious


No signatures matched


No screenshots available.

Static Analysis

Nothing to display.

Dropped Files

Nothing to display.

Network Analysis

Hosts Involved

DNS Requests

Behavior Summary


registry filesystem process services network synchronization

C:\Windows\system32\lsass.exe PID: 456, Parent PID: 352


Nothing to display.