Summary | ZeroBOX

doc75843.exe

PE32 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6402 June 25, 2021, 5:54 p.m. June 25, 2021, 5:56 p.m.
Size 246.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 765b1bb3690c9bacdfa38e18d788efbf
SHA256 a3703cc485d2a99cfec122203ed2d7dd83274af8bd0b3bcfab3fd590dd5c308c
CRC32 1B23E4D6
ssdeep 6144:MTqjFAdWMbSChmll5dKk3jQXzk0KX03SfFnEx:MZdWuS3FBjQXzkVX0OEx
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49812 -> 162.241.24.164:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49812 -> 162.241.24.164:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49812 -> 162.241.24.164:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49810 -> 104.21.56.140:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49810 -> 104.21.56.140:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49810 -> 104.21.56.140:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49813 -> 35.172.94.1:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49813 -> 35.172.94.1:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49813 -> 35.172.94.1:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49811 -> 74.220.199.6:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49811 -> 74.220.199.6:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49811 -> 74.220.199.6:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49814 -> 3.223.115.185:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49814 -> 3.223.115.185:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.102:49814 -> 3.223.115.185:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
suspicious_features GET method with no useragent header suspicious_request GET http://www.pemeroth.com/bk2s/?GvIHh=GDb36sDDKEmkr/XzzySS2pulrkx4ABgigOxBbij1Vs0CF/tMuPSs7pKiKX8WQ2ZP9TLrDc99&TjPx=DVld22s0z
suspicious_features GET method with no useragent header suspicious_request GET http://www.festeringuncle.com/bk2s/?GvIHh=Qb5HWBMFA6UFKvja9tJUNmX2XizwcVqb3HYLuqbhAVeW9x/0+FsX1qcgjPTJOQT3x8z1BApP&TjPx=DVld22s0z
suspicious_features GET method with no useragent header suspicious_request GET http://www.platinumortho.net/bk2s/?GvIHh=P45cDY/oIgPiwv30dNsxlanwSnM83F/c7OYaOeP9n45pqzpfYSS6dxpapG9dw9/YEFt+/uf6&TjPx=DVld22s0z
suspicious_features GET method with no useragent header suspicious_request GET http://www.stainedglasshockessinde.com/bk2s/?GvIHh=cxiJxLkjyWZsbOBww6KRXkK88nBaN4xk1ZFGxJ6Yim0FRHKSsyrEsX1S0KwTxsxMQ32yo6Wi&TjPx=DVld22s0z
suspicious_features GET method with no useragent header suspicious_request GET http://www.employeerelationships.com/bk2s/?GvIHh=dcjCEh6U4DG05TmrBIpig/weXqoRmmYqraj/720r9rrJCymvS/GI53YTvStHeY5pPKbLU/RG&TjPx=DVld22s0z
request GET http://www.pemeroth.com/bk2s/?GvIHh=GDb36sDDKEmkr/XzzySS2pulrkx4ABgigOxBbij1Vs0CF/tMuPSs7pKiKX8WQ2ZP9TLrDc99&TjPx=DVld22s0z
request GET http://www.festeringuncle.com/bk2s/?GvIHh=Qb5HWBMFA6UFKvja9tJUNmX2XizwcVqb3HYLuqbhAVeW9x/0+FsX1qcgjPTJOQT3x8z1BApP&TjPx=DVld22s0z
request GET http://www.platinumortho.net/bk2s/?GvIHh=P45cDY/oIgPiwv30dNsxlanwSnM83F/c7OYaOeP9n45pqzpfYSS6dxpapG9dw9/YEFt+/uf6&TjPx=DVld22s0z
request GET http://www.stainedglasshockessinde.com/bk2s/?GvIHh=cxiJxLkjyWZsbOBww6KRXkK88nBaN4xk1ZFGxJ6Yim0FRHKSsyrEsX1S0KwTxsxMQ32yo6Wi&TjPx=DVld22s0z
request GET http://www.employeerelationships.com/bk2s/?GvIHh=dcjCEh6U4DG05TmrBIpig/weXqoRmmYqraj/720r9rrJCymvS/GI53YTvStHeY5pPKbLU/RG&TjPx=DVld22s0z
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 8024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10004000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 8024
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10004000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 4864
region_size: 3158016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x009e0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\nscFF98.tmp\System.dll
file C:\Users\test22\AppData\Local\Temp\nscFF98.tmp\System.dll
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
host 172.217.25.14
Process injection Process 8024 called NtSetContextThread to modify thread in remote process 4864
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 2000355780
registers.esp: 1638384
registers.edi: 0
registers.eax: 4320176
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x000001e0
process_identifier: 4864
1 0 0
Cylance Unsafe
K7GW Riskware ( 0040eff71 )
Cybereason malicious.57ddec
Cyren W32/Ninjector.J.gen!Camelot
Symantec Trojan.Gen.2
APEX Malicious
Paloalto generic.ml
Kaspersky UDS:Trojan-Spy.Win32.Noon.gen
Avast FileRepMalware
McAfee-GW-Edition BehavesLike.Win32.Dropper.dc
FireEye Generic.mg.765b1bb3690c9bac
Sophos Generic ML PUA (PUA)
Gridinsoft Risk.Win32.CoinMiner.sd!s1
Microsoft TrojanSpy:Win32/Swotter.A!bit
Cynet Malicious (score: 100)
McAfee Artemis!765B1BB3690C
TrendMicro-HouseCall TROJ_GEN.F0D1C00FP21
SentinelOne Static AI - Malicious PE
Fortinet W32/Kryptik.J!tr
AVG FileRepMalware