Summary | ZeroBOX

fcrtrtosk.exe

PE32 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6402 June 25, 2021, 9:57 a.m. June 25, 2021, 10:54 a.m.
Size 524.3KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 5a4161dea2860628bfb4498095861d2a
SHA256 9ffd17a68654d3474794940762417fe1bc39a5ea87ce5877daa135ac783273e8
CRC32 8D68B06E
ssdeep 3072:jLk395hYXJ3eTPVrgtmiok+HmdrdoMHMVbrHfNW8aBtnH9iOS+V1zPtfaBlkPhHR:jQqULVrgNJ1sRHfNzaBy41z1fbjP1tt
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
houseluxury-re.ch 80.88.87.243
IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
80.88.87.243 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
suspicious_features POST method with no referer header suspicious_request POST http://houseluxury-re.ch/toskulo/PL341/index.php
request POST http://houseluxury-re.ch/toskulo/PL341/index.php
request GET http://houseluxury-re.ch/cgi-sys/suspendedpage.cgi
request POST http://houseluxury-re.ch/toskulo/PL341/index.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 7180
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x745e4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 7180
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x745d4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 7180
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 56385
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00676fd8
process_handle: 0xffffffff
3221225477 0
file C:\Users\test22\AppData\Local\Temp\nstFE20.tmp\System.dll
file C:\Users\test22\AppData\Local\Temp\nstFE20.tmp\System.dll
host 172.217.25.14
Process injection Process 7180 called NtSetContextThread to modify thread in remote process 2864
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 2000355780
registers.esp: 1638384
registers.edi: 0
registers.eax: 4302468
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x000001e4
process_identifier: 2864
1 0 0
DrWeb Trojan.Loader.843
MicroWorld-eScan Gen:Variant.Bulz.522931
FireEye Gen:Variant.Bulz.522931
CAT-QuickHeal Trojan.Injects
ALYac Gen:Variant.Bulz.522931
Cylance Unsafe
Sangfor Riskware.Win32.Agent.ky
K7AntiVirus Trojan ( 0057e2dc1 )
Alibaba Trojan:Win32/FormBook.5a31e2a5
K7GW Trojan ( 0057e2dc1 )
Cyren W32/Ninjector.J.gen!Camelot
Symantec Packed.Generic.610
ESET-NOD32 NSIS/Injector.AMJ
APEX Malicious
Avast Win32:Malware-gen
ClamAV Win.Trojan.Tnega-9874034-0
Kaspersky HEUR:Trojan.Win32.Injects.gen
BitDefender Gen:Variant.Bulz.522931
Ad-Aware Gen:Variant.Bulz.522931
Emsisoft Gen:Variant.Bulz.522931 (B)
Comodo Malware@#dd96r0bpc22x
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R049C0DFK21
McAfee-GW-Edition RDN/Generic Dropper
Sophos Mal/Generic-S
Avira TR/AD.MoksSteal.fkvqr
MAX malware (ai score=88)
Kingsoft Win32.Troj.Undef.(kcloud)
Microsoft Trojan:Win32/FormBook.AM!MTB
Gridinsoft Trojan.Win32.Downloader.sa
Arcabit Trojan.Bulz.D7FAB3
AegisLab Trojan.Win32.Injects.4!c
GData Gen:Variant.Bulz.522931
Cynet Malicious (score: 99)
AhnLab-V3 Trojan/Win.Tnega.R426262
McAfee RDN/Generic Dropper
VBA32 BScope.Trojan-Dropper.Injector
Malwarebytes Spyware.LokiBot
TrendMicro-HouseCall TROJ_GEN.R049C0DFK21
Rising Trojan.Injector/NSIS!1.D743 (CLASSIC)
Fortinet W32/Kryptik.J!tr
Webroot W32.Malware.Gen
AVG Win32:Malware-gen
Panda Trj/CI.A
CrowdStrike win/malicious_confidence_100% (W)