Summary | ZeroBOX

sisifo_setup.exe

PE32 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6402 May 19, 2021, 1:47 p.m. May 19, 2021, 1:53 p.m.
Size 3.2MB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 cc224b39caa09c3cae712578fe07530e
SHA256 37058c3d95f44dca073c2fd901f3dc1cc627f42840366ed7d493688af8b81a50
CRC32 C260A813
ssdeep 98304:ZzqXXC79pjuyKZMgKtZGOLGqoTZu4FA8osfc:QXS7/u3ZMgKqampFHC
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 8768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73dd1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 8768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74e51000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 8768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74451000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 8768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73771000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 8768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72da4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 8768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 8768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x756a1000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\nsqFF59.tmp\InstallOptions.dll
file C:\Users\test22\AppData\Local\Temp\nsqFF59.tmp\InstallOptions.dll
host 172.217.25.14
MicroWorld-eScan Trojan.GenericKD.41750562
FireEye Trojan.GenericKD.41750562
CAT-QuickHeal Trojan.Wacatac
McAfee Artemis!CC224B39CAA0
Cylance Unsafe
Zillya Trojan.Stealer.Win32.7351
K7GW Riskware ( 0040eff71 )
K7AntiVirus Riskware ( 0040eff71 )
BitDefenderTheta Gen:NN.ZemsilCO.34128.ciW@aOSXh4o
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:Malware-gen
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Trojan.GenericKD.41750562
Emsisoft Trojan.GenericKD.41750562 (B)
Comodo Malware@#6xbqexae93na
TrendMicro TROJ_GEN.R03BC0PD620
Microsoft Trojan:Win32/Wacatac.C!ml
Arcabit Trojan.MSILPerseus.D32547
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Gen:Variant.MSILPerseus.206151
MAX malware (ai score=87)
TrendMicro-HouseCall TROJ_GEN.R03BC0PD620
MaxSecure Trojan.Malware.300983.susgen
AVG Win32:Malware-gen
Panda Trj/CI.A