Summary | ZeroBOX

64a1.com

Antivirus
Category Machine Started Completed
FILE s1_win7_x6402 April 12, 2021, 10:40 a.m. April 12, 2021, 10:51 a.m.
Size 2.6MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 829c8b46d2fcfbcb7f5c2e3545a4c4a3
SHA256 fb6ee6d377aac0a4cd0b6d235270b2918936509fe6f738c3bcf0c0153906f0aa
CRC32 7933A1EE
ssdeep 49152:0bHAMSM7p8Zn+KZyTd9NI8iVfLxtLhNES6UjTSxTuTbfr3FWuZnrkmfKiJfkgWd:iSpoKAOV9S6KxTybfr3dn9SqZWd
PDB Path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Yara
  • escalate_priv - Escalade priviledges
  • screenshot - Take screenshot
  • win_registry - Affect system registries
  • win_token - Affect system token
  • win_files_operation - Affect private profile
  • PE_Header_Zero - PE File Signature Zero
  • OS_Processor_Check_Zero - OS Processor Check Signature Zero
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsPacked - Entropy Check
  • HasOverlay - Overlay Check
  • HasDebugData - DebugData Check
  • HasRichSignature - Rich Signature Check

Name Response Post-Analysis Lookup
pool.hashvault.pro 131.153.159.26
IP Address Status Action
131.153.76.130 Active Moloch
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0
pdb_path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .gfids
resource name PNG
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2616
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 4888
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001d30000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 4888
region_size: 262144
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002570000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 4888
region_size: 131072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000029d0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 4888
region_size: 131072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000029b0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0
file C:\Windows (x86)\explorer.exe
file C:\Windows (x86)\explorer.exe
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 14
family: 0
111 0
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x000000000000023c
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000240
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000244
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000248
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x000000000000024c
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000250
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000254
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000258
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x000000000000025c
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000260
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000264
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000230
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x000000000000027c
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000280
process_name: pw.exe
process_identifier: 7772
0 0

Process32NextW

snapshot_handle: 0x0000000000000284
process_name: pw.exe
process_identifier: 7772
0 0

Process32NextW

snapshot_handle: 0x0000000000000288
process_name: pw.exe
process_identifier: 7772
0 0

Process32NextW

snapshot_handle: 0x000000000000028c
process_name: pw.exe
process_identifier: 7772
0 0

Process32NextW

snapshot_handle: 0x0000000000000290
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000294
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000298
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002a0
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x000000000000029c
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002a4
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002a8
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002b0
process_name: pw.exe
process_identifier: 3812
0 0

Process32NextW

snapshot_handle: 0x00000000000002ac
process_name: pw.exe
process_identifier: 3812
0 0

Process32NextW

snapshot_handle: 0x00000000000002b4
process_name: pw.exe
process_identifier: 3812
0 0

Process32NextW

snapshot_handle: 0x00000000000002b8
process_name: pw.exe
process_identifier: 3812
0 0

Process32NextW

snapshot_handle: 0x00000000000002c4
process_name: pw.exe
process_identifier: 3812
0 0

Process32NextW

snapshot_handle: 0x00000000000002cc
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002d0
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002d4
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002c8
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002d8
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002dc
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002e4
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002e8
process_name: pw.exe
process_identifier: 4404
0 0

Process32NextW

snapshot_handle: 0x00000000000002e0
process_name: pw.exe
process_identifier: 4404
0 0

Process32NextW

snapshot_handle: 0x00000000000002ec
process_name: pw.exe
process_identifier: 4404
0 0

Process32NextW

snapshot_handle: 0x00000000000002f0
process_name: pw.exe
process_identifier: 4404
0 0

Process32NextW

snapshot_handle: 0x00000000000002f8
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002f4
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x00000000000002fc
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000300
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000308
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000310
process_name: taskhost.exe
process_identifier: 1160
0 0

Process32NextW

snapshot_handle: 0x0000000000000314
process_name: pw.exe
process_identifier: 6444
0 0

Process32NextW

snapshot_handle: 0x000000000000030c
process_name: pw.exe
process_identifier: 6444
0 0

Process32NextW

snapshot_handle: 0x0000000000000318
process_name: pw.exe
process_identifier: 6444
0 0
host 172.217.25.14
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Manager reg_value C:\Windows (x86)\explorer.exe
Time & API Arguments Status Return Repeated

CreateServiceW

service_start_name:
start_type: 3
password:
display_name: WinRing0_1_2_0
filepath: C:\Windows (x86)\WinRing0x64.sys
service_name: WinRing0_1_2_0
filepath_r: C:\Windows (x86)\WinRing0x64.sys
desired_access: 983551
service_handle: 0x00000000003e3750
error_control: 1
service_type: 1
service_manager_handle: 0x00000000003e35a0
1 4077392 0
Time & API Arguments Status Return Repeated

WSASend

buffer:  uJ?JhÔÇöїѬ )Š_µÒ¦üä7ê@øùݓøÿ Å»k‚/ ¨jNüގ‘mañ 8¡¨ÜäFTÿö{¥R>À,À0ŸÌ©Ì¨ÌªÀ+À/žÀ$À(kÀ#À'gÀ À9À À3œ=<5/ÿ•  # 0.   + -3&$ %(¿ÂR”b›7v-;¨–|îÅÙiúN;ö¦²u®ø)
socket: 540
0 0

WSASend

buffer: E¹®Ò煥ýÞ<y¥™¨Þe–ZÅ.vÏØ#ÄۜŠ¯oÊFpjAÜñuñ]ŒÉ8‚ÔÀµA¦ ßãtþ#h‹ÉFçÛae‚.@zË6ñ-ù¼ÖÞN©¶Î%ƒo=—!&&ÅåøkQ5©?çžùt9 Œ*äO»W ‹6_«V mÆ®FK )Üh¢ÉyeÖ«˜è¡k s5ËÙVyä7ªÎcOŒ’ò«ö@b&.34QZ½tî6h¡ÔÏù½”™Ý<¢v0ÂчN*ÿyˆ§ ý?JC•ûÀ[ðncüA;lõ*0EKܵm¨ó­\*½…Ñ}ƒåÁ³f©u3”BD:êøäþx"œ¥½† …(‰¬»×¨H`!J„a$´Áґ»h̕'>uTûi†úìãŽI8W:si÷ä*ãπ½Š¢O&ã1‹-–RENaJæ¾Òð/Ó(Mí~??Ý—YP8ÀÌÍ£ïù1¢Ç˜#ànLÉmeȲùjrådâ¼€Xššzâ,Ȍ”Éè/Öz1À–ºX©6nú²Väeĥ͵±ìŒ­8Å¿³©q6h «¤HuT3¢«Ù±ë3,Ô_o­C·É|aӊ*;QJIsÛ-m~#9$_ÂáÝ6çG‡vM3 éÔªfÖ&­Ìƒ»R¶ÿh—ºpŸÎì¹çFé˜ðŠ©JÕ³1)<õl4÷x€öS¿,¬L?ù“žd¶ýÆ(Ð*´D­xF¥œ’hÚÿ]Fò(G°Ë"<®5jw¸!ªŽÙÚ»Ñ)f³|!
socket: 540
0 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 6676
thread_handle: 0x0000030c
process_identifier: 4888
current_directory: C:\Windows (x86)
filepath: C:\Windows (x86)\explorer.exe
track: 1
command_line: "C:\Windows (x86)\explorer.exe"
filepath_r: C:\Windows (x86)\explorer.exe
stack_pivoted: 0
creation_flags: 67634196 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_SUSPENDED|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000308
1 1 0

ShellExecuteExW

show_type: 1
filepath_r: C:\Windows (x86)\explorer.exe
parameters:
filepath: C:\Windows (x86)\explorer.exe
1 1 0
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 76 (SystemFirmwareTableInformation)
-1073741789 0
Bkav W32.AIDetect.malware2
MicroWorld-eScan Trojan.GenericKD.36678708
FireEye Generic.mg.829c8b46d2fcfbcb
ALYac Trojan.GenericKD.36678708
Malwarebytes Malware.AI.3021647873
Alibaba Trojan:Win64/Miners.d06317f6
K7GW Adware ( 0055631f1 )
K7AntiVirus Adware ( 0055631f1 )
Arcabit Trojan.Generic.D22FAC34
Cyren W64/Trojan.WMRZ-7299
ESET-NOD32 a variant of Win64/CoinMiner.PO potentially unwanted
APEX Malicious
Avast Win64:CoinminerX-gen [Trj]
Kaspersky HEUR:Trojan.Win32.Miner.gen
BitDefender Trojan.GenericKD.36678708
Paloalto generic.ml
AegisLab Trojan.Win32.Miner.4!c
Ad-Aware Trojan.GenericKD.36678708
Sophos Mal/Generic-S (PUA)
F-Secure Heuristic.HEUR/AGEN.1136970
TrendMicro Coinminer.Win64.MALXMR.SMA
McAfee-GW-Edition BehavesLike.Win32.Generic.vc
Emsisoft Trojan.GenericKD.36678708 (B)
Avira HEUR/AGEN.1136970
Gridinsoft Trojan.Win32.CoinMiner.oa
Microsoft PUA:Win32/CoinMiner
ZoneAlarm HEUR:Trojan.Win32.Miner.gen
GData Win32.Application.CoinMiner.Y
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Miner.C4411496
McAfee Artemis!829C8B46D2FC
MAX malware (ai score=86)
VBA32 Trojan.Miner
Cylance Unsafe
TrendMicro-HouseCall Coinminer.Win64.MALXMR.SMA
Rising HackTool.CoinMiner!1.CB20 (CLOUD)
Ikarus PUA.CoinMiner
Fortinet W64/CoinMiner.PO!tr
AVG Win64:CoinminerX-gen [Trj]
Qihoo-360 Win32/Miner.Coinminer.HwYDZM8A