Summary | ZeroBOX

Server.txt

Anti_VM ScreenShot AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6402 May 23, 2021, 5:10 p.m. May 23, 2021, 5:12 p.m.
Size 939.3KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 68a0c1efdcd6fa5a6f08327b40afa394
SHA256 1b0556e1919d4ef54097eca0ce67941b9865728fdc3e850971cc7a6a80efbae4
CRC32 049E7377
ssdeep 6144:ZWG30D0btNi7GUMC0a4dqWzYnx6fLRNmgvlFw9GMC68jDnyZT1JUOCN3N4mGNY/U:LZtnNqOpwDZtnNqOs1eR+u
Yara
  • anti_vm_detect - Possibly employs anti-virtualization techniques

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
172.217.25.14 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 7724
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0
Symantec W32.Spyrat
ESET-NOD32 PowerShell/Agent.TI
Ikarus Trojan.JS.Crypt
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
host 172.217.25.14