Summary | ZeroBOX

clean1.exe

PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 June 24, 2021, 7:06 p.m. June 24, 2021, 7:31 p.m.
Size 265.5KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 e5b895e9aa0f2d53b535f968bd05ae7f
SHA256 a760caf7caa25c73f0fb93eb984a1e19efa099739737816024608e33a6c47f2e
CRC32 925CFCBA
ssdeep 3072:77DhdC6kzWypvaQ0FxyNTBfA8RlaKWh4KaWi8Q/6:7BlkZvaF4NTB48LVWhO6
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: The system cannot find the file specified.
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\AppData\Local\Temp\BAD
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\AppData\Local\Temp\BAD
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\AppData\Local\Temp\BAD
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\AppData\Local\Temp\ginotsa.dll
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\AppData\Local\Temp\tt.bat
console_handle: 0x000000000000000b
1 1 0
section .code
packer PureBasic 4.x -> Neil Hodgson
file C:\Users\test22\AppData\Local\Temp\62E9.tmp\62EA.tmp\62FB.bat
section {u'size_of_data': u'0x00003400', u'virtual_address': u'0x00013000', u'entropy': 7.111835561466392, u'name': u'.rdata', u'virtual_size': u'0x000033a5'} entropy 7.11183556147 description A section with a high entropy has been found
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0xffffffff
process_identifier: 1772
process_handle: 0x000000d8
0 0

NtTerminateProcess

status_code: 0xffffffff
process_identifier: 1772
process_handle: 0x000000d8
3221225738 0
cmdline "C:\Windows\sysnative\cmd" /c "C:\Users\test22\AppData\Local\Temp\62E9.tmp\62EA.tmp\62FB.bat C:\Users\test22\AppData\Local\Temp\clean1.exe"
cmdline attrib +s +h +r clean1.exe
cmdline attrib -s -h -r
file C:\Users\test22\AppData\Local\Temp\SandboxieInstall.exe
file C:\Users\test22\AppData\Local\Temp\62E9.tmp
file C:\Users\test22\AppData\Local\Temp\62E9.tmp\62EA.tmp
file C:\Users\test22\AppData\Local\Temp\62E9.tmp\62EA.tmp\62FB.bat
Bkav W32.AIDetect.malware2
Elastic malicious (high confidence)
FireEye Generic.mg.e5b895e9aa0f2d53
CAT-QuickHeal Trojan.GenericPMF.S16976269
Sangfor Trojan.Win32.Save.a
Cyren W32/Delf.MV.gen!Eldorado
Symantec ML.Attribute.HighConfidence
APEX Malicious
Sophos Generic ML PUA (PUA)
SentinelOne Static AI - Suspicious PE
Antiy-AVL Trojan/Generic.ASMalwS.2B9E7F9
Cynet Malicious (score: 100)
BitDefenderTheta Gen:NN.ZexaF.34758.quW@a0USgqh
Rising Malware.Heuristic!ET#100% (RDMK:cmRtazoRWr46e7Sivxf7/JP6a5XK)
eGambit Unsafe.AI_Score_63%
MaxSecure Trojan.Malware.300983.susgen
Panda Trj/Genetic.gen