Summary | ZeroBOX

adobe.exe

Antivirus PE32 PE File
Category Machine Started Completed
FILE s1_win7_x3201 July 8, 2021, 11:12 a.m. July 8, 2021, 11:14 a.m.
Size 701.4KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 051e7c8022b3f9edbb78c6cc9fb6fb98
SHA256 5b2d2e7727f30c8d5a91f1b7b8efbf61fa511cd64ef31e9a68cfd0948261b8f6
CRC32 BC1F5F55
ssdeep 12288:yVQ66KSyqoGwu5AHFFXcBLy6WHdvUFgHLpBNf6vmKKZdMd0X3Aqz:yVQ66X+Gwu5AHFFXcBLy6WHdvUFgHLpp
Yara
  • Antivirus - Contains references to security software
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
EbGetHandleOfExecutingProject+0x22b3 rtcPackDate-0xba9 msvbvm60+0xd0dcf @ 0x72a10dcf
rtcDoEvents+0x131 __vbaError-0x626 msvbvm60+0xce228 @ 0x72a0e228

exception.instruction_r: c9 c2 10 00 89 45 c0 eb ed 64 a1 18 00 00 00 8b
exception.symbol: RaiseException+0x54 BaseReleaseProcessDllPath-0x100 kernelbase+0xb760
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008f
exception.offset: 46944
exception.address: 0x75d8b760
registers.esp: 1244100
registers.edi: 3102072
registers.eax: 1244100
registers.ebp: 1244180
registers.edx: 0
registers.ebx: 3102072
registers.esi: 3102072
registers.ecx: 2
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72322000
process_handle: 0xffffffff
1 0 0
name RT_STRING language LANG_LITHUANIAN filetype data sublanguage SUBLANG_LITHUANIAN_CLASSIC offset 0x0007c7cc size 0x0000002c
name RT_STRING language LANG_LITHUANIAN filetype data sublanguage SUBLANG_LITHUANIAN_CLASSIC offset 0x0007c7cc size 0x0000002c
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 952
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 24576
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x01940000
process_handle: 0xffffffff
1 0 0
Bkav W32.AIDetect.malware1
Lionic Trojan.MSIL.Crysan.m!c
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Johnnie.358690
Qihoo-360 Win32/Trojan.Generic.HwMAYkAA
ALYac Gen:Variant.Johnnie.358690
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
Arcabit Trojan.Johnnie.D57922
Cyren W32/VBInject.AFJ.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/GenKryptik.FHFO
APEX Malicious
Paloalto generic.ml
ClamAV Win.Malware.Johnnie-9875544-0
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Gen:Variant.Johnnie.358690
Avast Win32:Malware-gen
Rising HackTool.VBInject!1.6481 (CLASSIC)
Ad-Aware Gen:Variant.Johnnie.358690
Sophos Generic ML PUA (PUA)
DrWeb Trojan.VbCrypt.250
McAfee-GW-Edition BehavesLike.Win32.Trojan.bc
FireEye Generic.mg.051e7c8022b3f9ed
Emsisoft Gen:Variant.Johnnie.358690 (B)
SentinelOne Static AI - Suspicious PE
MAX malware (ai score=84)
Microsoft Trojan:Win32/Wacatac.B!ml
GData Gen:Variant.Johnnie.358690
McAfee Artemis!051E7C8022B3
VBA32 Malware-Cryptor.VB.gen.1
Malwarebytes Malware.AI.3800961425
TrendMicro-HouseCall TROJ_GEN.R002H09G521
Ikarus Win32.Outbreak
Fortinet W32/GenKryptik.FHFO!tr
BitDefenderTheta Gen:NN.ZevbaF.34790.Rm3@aG8T@soO
AVG Win32:Malware-gen
CrowdStrike win/malicious_confidence_100% (W)
MaxSecure Trojan.Malware.300983.susgen