Summary | ZeroBOX

TinyTake_v_5_2_19.exe

VMProtect
Category Machine Started Completed
FILE s1_win7_x6401 April 16, 2021, 6:01 p.m. April 16, 2021, 6:07 p.m.
Size 6.3MB
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 6f6ef1b4659a3e4724c20f551541161b
SHA256 1323a36dcdb2fb1d4b3db599aae14d129abb52ab35f92c1b63cae9eda4c143bb
CRC32 5E8EA80B
ssdeep 196608:5KWsXRNhZ2kwvBuworNg7US1iuFjo5/dGTFdMS6:knRcg0d7MS6
Yara
  • PE_Header_Zero - PE File Signature Zero
  • VMProtect_Zero - VMProtect packed file
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsPacked - Entropy Check
  • HasOverlay - Overlay Check
  • HasDigitalSignature - DigitalSignature Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
45.138.27.125 Active Moloch
45.85.90.7 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
section .vmp0
section .vmp1
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2648
region_size: 69632
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01750000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 61440
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01751000
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00636400', u'virtual_address': u'0x00b91000', u'entropy': 7.965513471427617, u'name': u'.vmp1', u'virtual_size': u'0x00636210'} entropy 7.96551347143 description A section with a high entropy has been found
entropy 0.989653831194 description Overall entropy of this PE file is high
section .vmp0 description Section name indicates VMProtect
section .vmp1 description Section name indicates VMProtect
host 45.138.27.125
host 45.85.90.7
Elastic malicious (high confidence)
Cylance Unsafe
Cybereason malicious.6db594
APEX Malicious
Avast Win32:MdeClass
Rising Malware.Heuristic!ET#77% (RDMK:cmRtazrfphQBIiuXBGJXy8DkQRfP)
FireEye Generic.mg.6f6ef1b4659a3e47
SentinelOne Static AI - Malicious PE
Cynet Malicious (score: 100)
BitDefenderTheta Gen:NN.ZexaF.34678.@VX@aWW3dae
Malwarebytes Malware.Heuristic.1003
eGambit PE.Heur.InvalidSig
AVG Win32:MdeClass
process TinyTake_v_5_2_19.exe useragent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.75 Safari/537.36
process TinyTake_v_5_2_19.exe useragent c25iK3H8PkGDL6X614f7
dead_host 45.138.27.125:80
dead_host 192.168.56.101:49216