Summary | ZeroBOX

119.exe

PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6402 July 7, 2021, 10:53 a.m. July 7, 2021, 10:58 a.m.
Size 1.9MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 13cf6e639bd4d6c7478f438e001beec7
SHA256 548aeca63c758e896a8959a1f0a4dccd5fc87ae57af14916e54a7f4758808db0
CRC32 A772940A
ssdeep 49152:p528wME4n6U/COuRMdt/8zexPwT0zZb9Im/xnGi5GvJs:bdFuzelA01si5CJs
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
172.217.25.14 Active Moloch
31.44.184.119 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section fta3
section .fta2
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 8212
region_size: 1777664
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02010000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 8212
region_size: 1773568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x021d0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 8212
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 1871872
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
process_handle: 0xffffffff
1 0 0
description 119.exe tried to sleep 302 seconds, actually delayed analysis time by 302 seconds
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 1158
family: 0
1 0 0
section {u'size_of_data': u'0x001c5800', u'virtual_address': u'0x00007000', u'entropy': 7.408173389150699, u'name': u'.fta2', u'virtual_size': u'0x001c560f'} entropy 7.40817338915 description A section with a high entropy has been found
entropy 0.943317732709 description Overall entropy of this PE file is high
host 172.217.25.14
host 31.44.184.119
service_name s3svc service_path C:\Users\test22\AppData\Local\Temp\119.exe -r
Time & API Arguments Status Return Repeated

CreateServiceA

service_start_name:
start_type: 2
password:
display_name: Enterprise Mailing Service
filepath: C:\Users\test22\AppData\Local\Temp\119.exe -r
service_name: s3svc
filepath_r: C:\Users\test22\AppData\Local\Temp\119.exe -r
desired_access: 983551
service_handle: 0x007094b8
error_control: 1
service_type: 16
service_manager_handle: 0x00709468
1 7378104 0
Bkav W32.AIDetect.malware2
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
Malwarebytes Malware.AI.960227836
Sangfor Trojan.Win32.Save.a
Cybereason malicious.8bdb94
Symantec Packed.Generic.459
APEX Malicious
Kaspersky VHO:Trojan.Win32.Bsymem.gen
FireEye Generic.mg.13cf6e639bd4d6c7
Sophos Generic ML PUA (PUA)
Ikarus Trojan.Win32.Generic
eGambit PE.Heur.InvalidSig
Antiy-AVL Trojan/Generic.ASCommon.1BE
Microsoft Program:Win32/Wacapew.C!ml
Gridinsoft Trojan.Heur!.00012131
Cylance Unsafe
Rising Trojan.Kryptik!1.C73F (CLASSIC)
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Ursnif.CZ!tr.spy
BitDefenderTheta Gen:NN.ZexaF.34790.4z1@a8wOM2gi
Qihoo-360 HEUR/QVM20.1.68E7.Malware.Gen