Summary | ZeroBOX

index.jar

Category Machine Started Completed
FILE s1_win7_x6401 July 9, 2021, 9:50 a.m. July 9, 2021, 10:02 a.m.
Size 179.4KB
Type Zip archive data, at least v2.0 to extract
MD5 a53c10a1311d5e77559b0d3a23e24488
SHA256 1a33f3131e502de66b9266f3474e0c71b420f6619671e0414cc3b30e93f28bd6
CRC32 DC27DD51
ssdeep 3072:JrGOdWMxmjIK12v3BuRAtVhahkxRCnPOBP43PyRJQfZb1f2FSsxEJW:JrZdWQmcK8v3BuRCxRCPOBP2fZROQW
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2212
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 2555904
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002430000
process_handle: 0xffffffffffffffff
1 0 0
Alibaba Trojan:JS/Banload.7511d5eb
Cyren JS/Agent.AUY
Kaspersky Trojan.JS.Agent.eiw
NANO-Antivirus Trojan.Script.Heuristic-js.iacgm
McAfee-GW-Edition BehavesLike.Downloader.cc
Avira EXP/JAVA.Banload.MRAF.Gen
ZoneAlarm Trojan.JS.Agent.eiw
Cynet Malicious (score: 99)
McAfee Artemis!A53C10A1311D
count 3493 name heapspray process java.exe total_mb 873 length 262144 protection PAGE_READWRITE