Summary | ZeroBOX

pc-eq.setup.2.0.0.exe

Emotet NSIS UPX Escalate priviledges ScreenShot GIF Format AntiDebug PNG Format PE File DLL OS Processor Check PE32 AntiVM
Category Machine Started Completed
FILE s1_win7_x6402 June 25, 2021, 3:16 p.m. June 25, 2021, 3:21 p.m.
Size 17.6MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 8073587ad2b8cc9882aa1b320ba04c19
SHA256 77890e3304d01af0b665bb2a29039f6675c7ab0c3e5fd31056b4898810f26011
CRC32 A55993C2
ssdeep 393216:RCKmoic/i2IIQ1YhJQw85hjLhVcESy4Y7atNW/+hKEhlJgJRkYFZFZfLWPfC:EKmu/e1IJ23gSFay/+WPZFZfLm6
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
172.217.25.14 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Program Files (x86)\PC Equalizer>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "C:\Program Files (x86)\PC Equalizer\PC-Equalizer.exe"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Program Files (x86)\PC Equalizer>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: if
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: exist "C:\Program Files (x86)\PC Equalizer\PC-Equalizer.exe"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: goto
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Repeat
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Program Files (x86)\PC Equalizer>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\AppData\Local\Temp\7ZSfx000.cmd"
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: The batch file cannot be found.
console_handle: 0x0000000b
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section CODE
section DATA
section BSS
packer BobSoft Mini Delphi -> BoB / BobSoft
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3804
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5656
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02904000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 13277720576
free_bytes_available: 13277720576
root_path: C:\
total_number_of_bytes: 34252779520
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 13259161600
root_path: C:\Program Files (x86)\PC Equalizer
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 13250600960
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Explorer
total_number_of_bytes: 0
1 1 0
file C:\Program Files (x86)\PC Equalizer\PCEqualizer.exe
file C:\Users\test22\AppData\Local\Temp\nsv4145.tmp\nsDialogs.dll
file C:\Program Files (x86)\PC Equalizer\PC-Equalizer.exe
file C:\Program Files (x86)\PC Equalizer\data\Plugins\requ\liceline.exe
file C:\Users\test22\AppData\Local\Temp\EqualizerAPO64-1.2.1.exe
file C:\Program Files (x86)\PC Equalizer\lua5.1.dll
file C:\Program Files (x86)\PC Equalizer\Uninstall.exe
file C:\Users\test22\Desktop\PC Equalizer.lnk
file C:\Users\test22\AppData\Local\Temp\nsv4145.tmp\NSISpcre.dll
file C:\Users\test22\AppData\Local\Temp\nsv4145.tmp\System.dll
file C:\Program Files (x86)\PC Equalizer\PCEqualizer.dll
file C:\Users\test22\AppData\Local\Temp\7ZSfx000.cmd
file C:\Program Files (x86)\PC Equalizer\lua51.dll
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration.lnk
file C:\Users\test22\Desktop\PC Equalizer.lnk
file C:\Program Files (x86)\PC Equalizer\PC-Equalizer.exe
file C:\Users\test22\AppData\Local\Temp\EqualizerAPO64-1.2.1.exe
file C:\Users\test22\AppData\Local\Temp\7ZSfx000.cmd
file C:\Users\test22\AppData\Local\Temp\nsv4145.tmp\nsDialogs.dll
file C:\Users\test22\AppData\Local\Temp\nsv4145.tmp\NSISpcre.dll
file C:\Users\test22\AppData\Local\Temp\nsv4145.tmp\System.dll
file C:\Users\test22\AppData\Local\Temp\EqualizerAPO64-1.2.1.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\7ZSfx000.cmd
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\7ZSfx000.cmd
1 1 0
url http://nsis.sf.net/NSIS_Error
description Escalate priviledges rule Escalate_priviledges
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
host 172.217.25.14
file C:\Users\test22\AppData\Local\Temp\7ZSfx000.cmd
Process injection Process 3804 resumed a thread in remote process 5656
Process injection Process 3804 resumed a thread in remote process 3908
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000002a4
suspend_count: 1
process_identifier: 5656
1 0 0

NtResumeThread

thread_handle: 0x00000328
suspend_count: 1
process_identifier: 3908
1 0 0
MicroWorld-eScan Gen:Heur.SMHeist.3
FireEye Generic.mg.8073587ad2b8cc98
McAfee Artemis!8073587AD2B8
Sangfor Suspicious.Win32.SMHeist.3
Cybereason malicious.ad2b8c
Cyren W32/Trojan.DXXJ-1478
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast FileRepMalware
BitDefender Gen:Heur.SMHeist.3
Ad-Aware Gen:Heur.SMHeist.3
Emsisoft Gen:Heur.SMHeist.3 (B)
McAfee-GW-Edition Artemis
Webroot W32.Malware.Gen
Microsoft Ransom:Win32/Crypmod
Arcabit Trojan.SMHeist.3
GData Gen:Heur.SMHeist.3
MAX malware (ai score=80)
Malwarebytes Malware.AI.4286241904
TrendMicro-HouseCall TROJ_GEN.R002H09FL21
Ikarus Gen.SMHeist
Fortinet W32/PossibleThreat
AVG FileRepMalware
CrowdStrike win/malicious_confidence_60% (W)