Summary | ZeroBOX

build.exe

Category Machine Started Completed
FILE s1_win7_x6401 April 23, 2021, 6:40 p.m. April 23, 2021, 6:47 p.m.
Size 636.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 6635fb0d8619a28254c14f16c8f52bc3
SHA256 a0f86b221315031395511a0f54f29a14af07426c325a17c655bdca52e446e61c
CRC32 44A38693
ssdeep 12288:goXEuOj+fsDPJid8HoLCBLQO0C8pf/HFO7YNpbxWwd2hSRwh7mcC:ggExqfsD0OHICVCdvFO7YVh06wh7mc
Yara
  • PE_Header_Zero - PE File Signature Zero
  • OS_Processor_Check_Zero - OS Processor Check Signature Zero
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsPacked - Entropy Check
  • win_files_operation - Affect private profile
  • Library_Malware_Zero - Library Malware

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .jiyi
section .vegatan
section .new
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1108
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 397312
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03faa000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1108
region_size: 610304
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03e10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00087800', u'virtual_address': u'0x00001000', u'entropy': 7.833535938604968, u'name': u'.text', u'virtual_size': u'0x0008767d'} entropy 7.8335359386 description A section with a high entropy has been found
entropy 0.853543307087 description Overall entropy of this PE file is high