Summary | ZeroBOX

April_2016_IMG128315 jpeg.jpeg.exe

ScreenShot KeyLogger AntiDebug PE File PE32 AntiVM
Category Machine Started Completed
FILE s1_win7_x6401 June 25, 2021, 11:35 a.m. June 25, 2021, 11:37 a.m.
Size 109.0KB
Type MS-DOS executable, MZ for MS-DOS
MD5 5647f5ae95b3fe769f47c214d85989ac
SHA256 14c369419759256f0282034b23797c6f279ecbd283ff1b32c930773af9b54b9e
CRC32 D71D6CF9
ssdeep 1536:+1cq2U2JhHk+GoMctoraGH/oBBiaLiP56k6om2zvtAyhRCVjDZndjLRYqYQ:+cs2JhXPkH8BXojRAqR+1nr
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
section driz1
section 4datr1
section .restr1
section tyrz
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1868
region_size: 225280
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 225280
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1868
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1868
region_size: 81920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1868
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02210000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1868
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02220000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1868
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02230000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 53248
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00401000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040e000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 12288
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1868
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00412000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2260
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73d82000
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00018200', u'virtual_address': u'0x0001d000', u'entropy': 7.181275614533558, u'name': u'.restr1', u'virtual_size': u'0x000181f0'} entropy 7.18127561453 description A section with a high entropy has been found
entropy 0.914691943128 description Overall entropy of this PE file is high
description Run a KeyLogger rule KeyLogger
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
wmi SELECT * FROM Win32_Processor
wmi SELECT * FROM Win32_BIOS
wmi SELECT * FROM Win32_ComputerSystem
wmi SELECT * FROM Win32_PhysicalMemory
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer reg_value C:\Users\test22\AppData\Roaming\GUuzajq0tkqRWTX8J2W8ecEfgFcv.exe
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 1 (FILE_OPEN)
file_handle: 0x00000238
filepath: \??\PhysicalDrive0
desired_access: 0x00100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE)
file_attributes: 128 (FILE_ATTRIBUTE_NORMAL)
filepath_r: \??\PhysicalDrive0
create_options: 96 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 0 (FILE_SUPERSEDED)
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
1 0 0

DeviceIoControl

input_buffer:
control_code: 458752 (IOCTL_DISK_GET_DRIVE_GEOMETRY)
device_handle: 0x00000238
output_buffer: Q ÿ?
1 1 0
wmi SELECT * FROM Win32_VideoController
wmi SELECT * FROM AntiVirusProduct
wmi SELECT * FROM Win32_OperatingSystem
wmi SELECT * FROM Win32_PhysicalMemory
wmi SELECT * FROM Win32_ComputerSystem
wmi SELECT * FROM Win32_BIOS
wmi SELECT * FROM Win32_SystemEnclosure
wmi SELECT * FROM Win32_Processor
Process injection Process 1868 called NtSetContextThread to modify thread in remote process 2260
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 1063920
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x0000016c
process_identifier: 2260
1 0 0
Process injection Process 1868 resumed a thread in remote process 2260
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000016c
suspend_count: 1
process_identifier: 2260
1 0 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2680
thread_handle: 0x0000016c
process_identifier: 2260
current_directory:
filepath: C:\Windows\System32\explorer.exe
track: 1
command_line:
filepath_r: C:\Windows\system32\explorer.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x00000164
1 1 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2680
thread_handle: 0x0000016c
process_identifier: 2260
current_directory:
filepath: C:\Windows\System32\explorer.exe
track: 1
command_line:
filepath_r: C:\Windows\system32\explorer.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x00000164
1 1 0

NtGetContextThread

thread_handle: 0x0000016c
1 0 0

NtMapViewOfSection

section_handle: 0x00000174
process_identifier: 2260
commit_size: 0
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
base_address: 0x00100000
allocation_type: 0 ()
section_offset: 0
view_size: 77824
process_handle: 0x00000164
1 0 0

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 1063920
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x0000016c
process_identifier: 2260
1 0 0

NtResumeThread

thread_handle: 0x0000016c
suspend_count: 1
process_identifier: 2260
1 0 0
Bkav W32.AIDetectVM.malware1
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.3181080
FireEye Generic.mg.5647f5ae95b3fe76
CAT-QuickHeal Ransomware.Locky.WR9
McAfee Generic.ys
Cylance Unsafe
Zillya Dropper.Injector.Win32.77125
SUPERAntiSpyware Trojan.Agent/Gen-Malagent
Sangfor Malware
K7AntiVirus Riskware ( 0040eff71 )
Alibaba Trojan:Win32/Agentb.5bd1f908
K7GW Riskware ( 0040eff71 )
Cybereason malicious.e95b3f
Arcabit Trojan.Generic
TrendMicro TROJ_INJECTO.DPZ
Baidu Win32.Trojan.Kryptik.pd
Cyren W32/Trojan.BYJI-4616
Symantec W32.Gosys
APEX Malicious
Avast Win32:Malware-gen
ClamAV Win.Malware.Locky-28209
Kaspersky Trojan.Win32.Agentb.bsgn
BitDefender Trojan.GenericKD.3181080
NANO-Antivirus Trojan.Win32.Fareit.fcgwnn
Paloalto generic.ml
ViRobot Trojan.Win32.Agent.96256.AK
Rising Ransom.Locky!8.1CD4 (TFE:1:CnBJHqPajgI)
Ad-Aware Trojan.GenericKD.3181080
Emsisoft Trojan.GenericKD.3181080 (B)
Comodo TrojWare.Win32.TrojanDownloader.Waski.DYS@6118f4
F-Secure Trojan.TR/Crypt.ZPACK.ewim
DrWeb Trojan.Encoder.3976
VIPRE Trojan.Win32.Generic!BT
Invincea Mal/Generic-R + Troj/Agent-ARMA
McAfee-GW-Edition BehavesLike.Win32.Generic.cc
Sophos Troj/Agent-ARMA
Ikarus Trojan.Win32.Agent
Webroot W32.Trojan.Gen
Avira TR/Crypt.ZPACK.ewim
MAX malware (ai score=100)
Antiy-AVL Trojan/Win32.Agentb
Microsoft Ransom:Win32/Locky
AegisLab Trojan.Win32.Upatre.mCSi
ZoneAlarm Trojan.Win32.Agentb.bsgn
GData Win32.Trojan.Agent.E86EG0
Cynet Malicious (score: 100)
AhnLab-V3 Win-Trojan/Lockycrypt.Gen
Acronis suspicious
BitDefenderTheta Gen:NN.ZexaF.34254.gqW@ayXmQio