Summary | ZeroBOX

cports.exe

Gen1 Generic Malware PE64 PE File DLL OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 June 18, 2021, 4:40 p.m. June 18, 2021, 4:42 p.m.
Size 5.1MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 120dd0fcdbecf5b37b0f6578fc541323
SHA256 27c7af83c87c02b4dc9c0a8d35d42d48f941ff72b2d9ac59971e0127142d084c
CRC32 20501653
ssdeep 98304:VSi2ojtxkoKCd+EAxgi5l+1fTgcKxkqjMZd9:3taoKi+R1rGE9jMZ/
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
section .itext
section .didata
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 745472
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00401000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x004c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 86016
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x004c6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x728b2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2260
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x728b2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2260
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00860000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 13704556544
free_bytes_available: 13704556544
root_path: C:\
total_number_of_bytes: 34252779520
1 1 0
file C:\Users\test22\AppData\Local\Temp\is-2I7AK.tmp\cports.tmp
Time & API Arguments Status Return Repeated

RegOpenKeyExW

regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\{B74F3516-DDA4-4980-B050-F09663135D48}_is1
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00000001
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\{B74F3516-DDA4-4980-B050-F09663135D48}_is1
2 0
Bkav W32.AIDetect.malware2
DrWeb Win32.HLLP.Neshta
Cyren W32/Trojan.CXUC-0174
ESET-NOD32 multiple detections
Avast Win32:Trojan-gen
Kaspersky Virus.Win32.Neshta.a
NANO-Antivirus Trojan.Win32.Winlock.fmobyw
Sophos Generic ML PUA (PUA)
Ikarus Trojan.Win32.Tinukebot
Microsoft Trojan:Win32/Wacatac.B!ml
Cynet Malicious (score: 100)
Rising Win32.Neshta.a (CLASSIC)
Yandex Trojan.Kryptik!IukWsTGVXmw
eGambit PE.Heur.InvalidSig
AVG Win32:Trojan-gen
CrowdStrike win/malicious_confidence_90% (D)