Summary | ZeroBOX

autosubplayer.exe

PE32 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6401 July 7, 2021, 10:27 a.m. July 7, 2021, 10:29 a.m.
Size 12.5MB
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, Nullsoft Installer self-extracting archive
MD5 df2b42645e6baf88259767f9ddbd2afc
SHA256 533d71561ae54fc4c3e621b417c1e511d762d4b42b1688ceffefed21f46d6044
CRC32 B3514358
ssdeep 393216:ayWW4YCKg7jsCvn7asvbPGFYKXl6QpPTcFQblF:kx8Cv7asLsXl5cOF
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2388
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72a12000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2388
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6e5c7000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\nso64A0.tmp\nsDialogs.dll
file C:\Users\test22\AppData\Local\Temp\nso64A0.tmp\System.dll
file C:\Users\test22\AppData\Local\Temp\nso64A0.tmp\System.dll
file C:\Users\test22\AppData\Local\Temp\nso64A0.tmp\nsDialogs.dll
section {u'size_of_data': u'0x00006a00', u'virtual_address': u'0x0000b000', u'entropy': 7.299408808107717, u'name': u'.rdata', u'virtual_size': u'0x000069d8'} entropy 7.29940880811 description A section with a high entropy has been found
Bkav W32.AIDetect.malware1
Cynet Malicious (score: 99)
Kaspersky HEUR:Trojan-Downloader.Win32.Bitser.gen
DrWeb Trojan.Wdfload.508
McAfee-GW-Edition BehavesLike.Win32.Dropper.rc
Avira HEUR/AGEN.1138824
Microsoft Trojan:Win32/Wacatac.B!ml
Rising Trojan.PSRunner/NSIS!1.D5F9 (CLASSIC)
Fortinet NSIS/Bitser.BD3!tr
AVG Win32:Evo-gen [Susp]
Avast Win32:Evo-gen [Susp]
Qihoo-360 HEUR/QVM20.1.69AD.Malware.Gen