Summary | ZeroBOX

32a1.com

Category Machine Started Completed
FILE s1_win7_x6402 April 12, 2021, 10:40 a.m. April 12, 2021, 10:48 a.m.
Size 2.6MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ec052b150b112e80d0bfb4b8d0ff8eb9
SHA256 fdf6040291d24b0ee18d77d18802624c4ab604962b19878c1f43474296760305
CRC32 B2BEFEF2
ssdeep 49152:mZuLHu8yIGooM9RleBWWWqjmm8A3IwRhrOg5/AO9H/x3EzSTUB5R2rteXPM:mYLO8yqB9TN6jm69VYEFQkWM
PDB Path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Yara
  • escalate_priv - Escalade priviledges
  • screenshot - Take screenshot
  • win_registry - Affect system registries
  • win_token - Affect system token
  • win_files_operation - Affect private profile
  • PE_Header_Zero - PE File Signature Zero
  • OS_Processor_Check_Zero - OS Processor Check Signature Zero
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsPacked - Entropy Check
  • HasOverlay - Overlay Check
  • HasDebugData - DebugData Check
  • HasRichSignature - Rich Signature Check

IP Address Status Action
131.153.76.130 Active Moloch
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleA

buffer: [2021-04-12 13:40:38.140] unable to open "C:\Windows (x86)\config.json".
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: [2021-04-12 13:40:38.140] unable to open "C:\Users\test22\.Windows Explorer.json".
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: [2021-04-12 13:40:38.140] unable to open "C:\Users\test22\.config\Windows Explorer.json".
console_handle: 0x00000007
1 1 0
pdb_path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .gfids
resource name PNG
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 8212
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0
file C:\Windows (x86)\explorer.exe
file C:\Windows (x86)\explorer.exe
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 14
family: 0
111 0
host 172.217.25.14
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Manager reg_value C:\Windows (x86)\explorer.exe
Time & API Arguments Status Return Repeated

WSASend

buffer:  :²yγ ]Y‡SY)ùo£<DgðãõØ°[ÝÝÔ½Ü\+ h\ bn&Ð)ra wOMû€I½XӀ”0³ªª]>À,À0ŸÌ©Ì¨ÌªÀ+À/žÀ$À(kÀ#À'gÀ À9À À3œ=<5/ÿ•  # 0.   + -3&$ ¯; ©Gl’š¿1ØÙÚ  ò©•ïÊMv!}&
socket: 540
0 0

WSASend

buffer: Eï<QÓªw"éøyØ2õº˝œšnÊô‚S/> aù 6Ñng¦•…¬ÊºgñYñ<S JÖdžqž€Jš†¥˜^$0ë"Åt¬º™¨ ¬–­è™d…î\*õ;YÀ+V‡kæ‡eŒ¯J!æ…;‹ÞSó4‘Sؑ7ÎôW}ºS¯÷ À¦Ü쌞ƒ×²›\.£ˆåöÓê‚é(¦7÷֎ÆéÐQ 9!%zV®Ub=É¥žþ1KÅ:M›‡¯¾=ÓrMœšC"ÛúŽä¡`Kà}§ Ž–¨/i¼¬’‚x&ÿN´¦r¾×¸ÛˆŸ atdG@æKJž^Òòø±¬”Ågê ì –˜ýÇùÛ<RLéCF‰¨¡¸ÆòJ!£dcAÓ»ÊàŒÄÛ̎i K>9µ]Îè‚9ôâÆX– ?³ ÙöìV_5¨?&qØó wéó‹ø0_ÿ)Ê÷à|Ú%ÿä†Â|F¥Ü®¤øÞ'6¼—§·ÕeÜÇçÂa¥28wÎ6[bÁ½Òz¹„ýÕæ's´ÿ»ù¬éÀm¾æñƒï"pê ́&SAIùÅhœ´Â4â;­§”ÖÃŸØ ZX½*NƕÈ_énñâ1–ô 1ôç„"<Ý\Ÿi<Â^‹îC©2ÆNÆ žÏ ½%Ïå _`œPÊ¥£ò%²à½G©9æo7&fN¨»™?9Ž—Ej¦MãkP2Ìý؎wþ¨gÕÊ’M¥w+ª™±ßžlÕN=õÌ ?ì›3èÒ +ÛP ÊQXù&ı¬*l‡'˜ÐÐb»à°#8o.íì*ʍÂÀ|Šðpî
socket: 540
0 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 9076
thread_handle: 0x00000260
process_identifier: 4636
current_directory: C:\Windows (x86)
filepath: C:\Windows (x86)\explorer.exe
track: 1
command_line: "C:\Windows (x86)\explorer.exe"
filepath_r: C:\Windows (x86)\explorer.exe
stack_pivoted: 0
creation_flags: 67634196 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_SUSPENDED|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x0000025c
1 1 0

ShellExecuteExW

show_type: 1
filepath_r: C:\Windows (x86)\explorer.exe
parameters:
filepath: C:\Windows (x86)\explorer.exe
1 1 0
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 76 (SystemFirmwareTableInformation)
3221225507 0