Summary | ZeroBOX

97e6dac4.exe

Netfilter rootkit AntiDebug PE64 PE File PE32 AntiVM
Category Machine Started Completed
FILE s1_win7_x6401 June 29, 2021, 10:42 a.m. June 29, 2021, 10:42 a.m.
Size 9.5KB
Type PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
MD5 8bf00ef4dd6bb308c76849901b03ccbd
SHA256 a5c873085f36f69f29bb8895eb199d42ce86b16da62c56680917149b97e6dac4
CRC32 0EF9DF7E
ssdeep 192:oCaQ3qaG3GO/pfg9m3CJ3Mc+YeZBkvmKI7H:o5Nt/Vg9m3CJ3qZ0jI7
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • MAL_Netfilter_Dropper_Jun_2021_1 - Detect the dropper of Netfilter rootkit

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
45.113.202.180 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 45.113.202.180:608 -> 192.168.56.101:49198 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 45.113.202.180:608 -> 192.168.56.101:49198 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleA

buffer: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\netfilter
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: ErrorControl
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: REG_DWORD 0x00000001
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: ImagePath
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: \??\C:\Users\test22\AppData\Roaming\netfilter.sys
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Start
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: REG_DWORD 0x00000003
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Type
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: REG_DWORD 0x00000001
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: regini
parameters: c.xalm
filepath: regini
1 1 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@𺴠Í!¸LÍ!This program cannot be run in DOS mode. $yW¾D=6Ð=6Ð=6Ð4NX>6Ð4NC?6Ð)]Ö<6Ð)]Ó96Ð)]Ô86Ð)]Ñ:6Ð=6ÑM6ÐäBÕ/6ÐäBÒ<6ÐRich=6ÐPEd†®ÂŸ`ð" vÖ @ €Ø°`Ad`dP0¾€!p(¨„8à„€h.text"gh h.rdataü€l@H.data»*|@È.pdata0P¦@HINIT¸ `® b.reloc(p¼@BHƒì(H µ§èÀL‹á8H¢§H ³8HƒÄ(éaÌÌéËÿÿÿÌÌÌÌÌÌÌÌÌÌÌHƒì(H‹8H…ÀtHéÿÿÿH;ÂtÿÐHƒÄ(é™ÿÿÿÌÌÌÌÌÌÌÌÌH‰\$H‰l$H‰t$WHƒì 3íH‹òH‹ùH;Íu 3Éè¸éà¸H‰ W8H (8f‰#8HR8f‰-8H‰8ÿfrL 8Là¦Hñ7H‹Ïèa`;ÅŒ†H ¦èM;ŋØ|mèÒH‹ÖH‹Ïè7;ŋØ|WH‹Ò7@8h0t$H‹µ7H9ohHEGhH‰¥7HöþÿÿH‰Ghë"ö@tH‹[1H‰Œ7HÅþÿÿH‰F13Àëè…þÿÿ‹ÃH‹\$0H‹l$8H‹t$@HƒÄ _ÃÌÌÌÌÌÌÌÌÌÌÌÌÌÌH‰\$WHƒì H‹ÚH‹ùèKNH‹ÓH‹ÏH‹\$0HƒÄ _é¦þÿÿÌÌÌÌÌÌH‰\$WHƒì H‹'¦H‹ùH ¦H¦H;ÁtEH;Øw@H‹C@H…ÀtL‹ì6H ]_L‹ËH‹×ÿÐëH‹Ô6L‹ÃH‹ÏèA_HƒÃPH;Î¥vÀH‹\$0HƒÄ _ÃÌÌÌÌÌÌÌÌÌH‰\$H‰t$WHƒì H‹ù3ÀH•¥H5Ž¥H;ÞsNƒ;PuDH‹C8H‰¥H…ÀtL‹e6H Æ^L‹ËH‹×ÿÐëH‹M6L‹ÃH‹Ïèª^…Àx HƒÃP벸ÀH‹\$0H‹t$8HƒÄ _ÃÌÌÌÌÌÌÌÌÌÌÌH‰\$WHƒì H/¥H (¥H;Ás<H+ÈH¸ÍÌÌÌÌÌÌÌH/¥HÿÉH÷áH‹úHÁïHÿÇH‹H…ÀtÿÐH‰CøHƒÃ(HƒïuèH‹\$0HƒÄ _ÃÌÌÌÌÌÌÌÌÌÌÌÌ@UH¬$°ûÿÿHìPH‹H¤H3ÄH‰…@3ÒHM@A¸èý`3ÒHL$@A¸ÿèë`WÀHM@ºD$0轄ÀtnHU@HL$0ÿŠoLD$ HT$(HL$0è’ …Àx4H‹L$(H…Ét=‹T$ LD$@è.H‹L$(ºQaxXÿBoH
request_handle: 0x00cc000c
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeLoadDriverPrivilege
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
host 45.113.202.180
reg_key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\netfilter\ImagePath reg_value \??\C:\Users\test22\AppData\Roaming\netfilter.sys
Time & API Arguments Status Return Repeated

NtLoadDriver

driver_service_name: \Registry\Machine\System\CurrentControlSet\Services\netfilter
3221226536 0
Process injection Process 3024 resumed a thread in remote process 596
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000368
suspend_count: 1
process_identifier: 596
1 0 0
service netfilter (regkey HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\netfilter\Start)
Elastic malicious (high confidence)
DrWeb Trojan.DownLoader40.4568
MicroWorld-eScan Gen:Variant.Doina.16943
FireEye Generic.mg.8bf00ef4dd6bb308
CAT-QuickHeal TrojanDownloader.Stantinko
McAfee RDN/Generic Downloader.x
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
Sangfor Trojan.Win32.Save.a
Alibaba TrojanDownloader:Win32/Stantinko.c178e677
CrowdStrike win/malicious_confidence_100% (W)
Arcabit Trojan.Doina.D422F
BitDefenderTheta AI:Packer.D462FD1F1E
Cyren W32/Trojan.NOPC-7236
Symantec Trojan.Gen.2
ESET-NOD32 a variant of Win32/TrojanDownloader.Agent.FSE
APEX Malicious
Avast Win32:TrojanX-gen [Trj]
Kaspersky Trojan-Downloader.Win32.Stantinko.gjwx
BitDefender Gen:Variant.Doina.16943
NANO-Antivirus Trojan.Win32.Stantinko.iwcpys
Paloalto generic.ml
AegisLab Trojan.Win32.Generic.kYXw
Tencent Win32.Trojan-downloader.Stantinko.Efky
Ad-Aware Gen:Variant.Doina.16943
Sophos Mal/Generic-S
Comodo Malware@#bsi9vm83cw79
Zillya Downloader.Stantinko.Win32.29873
TrendMicro Trojan.Win32.FETNILTER.A
McAfee-GW-Edition RDN/Generic Downloader.x
Emsisoft Gen:Variant.Doina.16943 (B)
Webroot W32.Trojan.Gen
Avira TR/Dldr.Stantinko.ejntd
MAX malware (ai score=83)
Antiy-AVL Trojan/Generic.ASMalwS.339A434
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Trojan.Win32.Downloader.sa
Microsoft TrojanDownloader:Win32/Retliften.B
ViRobot Trojan.Win32.Z.Undef.9728
ZoneAlarm Trojan-Downloader.Win32.Stantinko.gjwx
GData Gen:Variant.Doina.16943
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win.Generic.C4513081
VBA32 suspected of Trojan.Downloader.gen
ALYac Trojan.Downloader.Stantinko
Malwarebytes Rootkit.NetFilter
TrendMicro-HouseCall Trojan.Win32.FETNILTER.A
Rising Downloader.Agent!1.D6F8 (CLASSIC)
Yandex Trojan.DL.Stantinko!HtkSy/U/qyY
Ikarus Trojan-Downloader.Stantinko