Summary | ZeroBOX

test.exe

Malicious Library PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 June 18, 2021, 10:06 a.m. June 18, 2021, 10:07 a.m.
Size 72.1KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 d57237560c25aff34850ab1980a0fb04
SHA256 e8cf359cbd1253afda0ce97a26843784441d248054e6f4d1e9c7695731577a55
CRC32 57C881C0
ssdeep 1536:IgugxzMtdRFSq5fg+PQI6SL+/Mb+KR0Nc8QsJq39:7xYtdR0Q36pe0Nc8QsC9
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
188.119.113.80 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49205 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49217 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49206 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49213 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49222 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49210 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49226 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49238 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49209 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49214 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49229 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49199 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49221 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49198 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49230 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49233 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49234 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49218 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49237 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic
TCP 192.168.56.101:49225 -> 188.119.113.80:443 2028401 ET JA3 Hash - Possible Malware - Various Trickbot/Kovter/Dridex Unknown Traffic

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1116
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00380000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x0000b000', u'virtual_address': u'0x00001000', u'entropy': 7.085382045385315, u'name': u'.text', u'virtual_size': u'0x0000a966'} entropy 7.08538204539 description A section with a high entropy has been found
entropy 0.647058823529 description Overall entropy of this PE file is high
host 188.119.113.80
Bkav W32.FamVT.RorenNHc.Trojan
Elastic malicious (high confidence)
ClamAV Win.Trojan.Swrort-5710536-0
CAT-QuickHeal Trojan.Swrort.A
ALYac Trojan.CryptZ.Gen
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 004c49f81 )
K7GW Trojan ( 004c49f81 )
CrowdStrike win/malicious_confidence_100% (D)
Arcabit Trojan.CryptZ.Gen
Cyren W32/Swrort.D
Symantec Packed.Generic.347
ESET-NOD32 a variant of Win32/Rozena.CP
APEX Malicious
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Generic
BitDefender Trojan.CryptZ.Gen
NANO-Antivirus Virus.Win32.Gen-Crypt.ccnc
ViRobot Trojan.Win32.Elzob.Gen
SUPERAntiSpyware Trojan.Backdoor-Shell
MicroWorld-eScan Trojan.CryptZ.Gen
Avast Win32:SwPatch [Wrm]
Ad-Aware Trojan.CryptZ.Gen
Sophos ML/PE-A + ATK/EncPk-TZ
Comodo TrojWare.Win32.Rozena.A@4jwdqr
TrendMicro Backdoor.Win32.SWRORT.SMAL01
McAfee-GW-Edition BehavesLike.Win32.Swrort.lh
FireEye Generic.mg.d57237560c25aff3
Emsisoft Trojan.CryptZ.Gen (B)
Ikarus Trojan.Win32.Swrort
Webroot Trojan:Win32/Swrort.A
Avira TR/Patched.Gen2
Gridinsoft Trojan.Win32.Swrort.zv!s2
Microsoft Trojan:Win32/Meterpreter.O
ZoneAlarm HEUR:Trojan.Win32.Generic
GData Win32.Trojan.PSE.1E7D3G0
AhnLab-V3 Trojan/Win32.Shell.R1283
Acronis suspicious
McAfee Swrort.i
MAX malware (ai score=89)
Malwarebytes Trojan.Rozena
TrendMicro-HouseCall Backdoor.Win32.SWRORT.SMAL01
Rising Malware.Heuristic!ET#100% (RDMK:cmRtazrzd7ItU6iR3rla+ks3MQZe)
Yandex Trojan.Rosena.Gen.1
SentinelOne Static AI - Malicious PE
eGambit Unsafe.AI_Score_99%
Fortinet MalwThreat!df3bIV
BitDefenderTheta Gen:NN.ZexaF.34744.eq1@aaQwlCmi
AVG Win32:SwPatch [Wrm]