Summary | ZeroBOX

3RdYB0yFDbNXezPE.jpg

Category Machine Started Completed
FILE s1_win7_x6402 July 9, 2021, 8:04 p.m. July 9, 2021, 8:06 p.m.
Size 497.6KB
Type ASCII text, with very long lines, with CRLF line terminators
MD5 b08c1bc14e305a050747155ef13e14fe
SHA256 57218d0c8c6a70d873ebd6f1b656b4bf51ce0741693ff733e18eff8ca4df38bf
CRC32 6C8D2D32
ssdeep 12288:58vcOju3mvgZSriIm4N/SKf2zsJ3KKbBJpL7Lb+QQQQQVQSSSSSSSknhbN1F1kJv:avcOju3mvgZSriIm4N/SKf2zsJ3KKbBH
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
117.18.232.200 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2412
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73452000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2412
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72f63000
process_handle: 0xffffffff
1 0 0
Symantec Backdoor.ASync!gm
DrWeb PowerShell.Dropper.31
Rising Trojan.Injector/PS!1.D2AD (CLASSIC)
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2412
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef90000
process_handle: 0xffffffff
1 0 0
host 117.18.232.200