Summary | ZeroBOX

%E8%BD%AF%E4%BB%B6%E6%8E%88%E6%9D%83%E7%A8%8B%E5%BA%8F.exe

Generic Malware Malicious Library UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6402 Aug. 13, 2021, 8:03 p.m. Aug. 13, 2021, 8:12 p.m.
Size 376.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ca0bfb0e149468f828793f18cd1db393
SHA256 323ea92408f9dfb0598cea001209880501388393ed76e9f20974b2819141ca9a
CRC32 87C26252
ssdeep 6144:MkyLEbWaR5CcUdoVjOU7i2P2P25rrrrDL:dUaWaR5vUKsUeQQ0rrrrD
Yara
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
103.229.126.73 Active Moloch
144.48.240.173 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.102:49163 -> 144.48.240.173:29106 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.102:49164 -> 144.48.240.173:29106 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected
TCP 192.168.56.102:49163 -> 144.48.240.173:29106 2016698 ET HUNTING Suspicious services.exe in URI Potentially Bad Traffic
TCP 192.168.56.102:49164 -> 144.48.240.173:29106 2016698 ET HUNTING Suspicious services.exe in URI Potentially Bad Traffic
TCP 144.48.240.173:29106 -> 192.168.56.102:49164 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 144.48.240.173:29106 -> 192.168.56.102:49163 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 144.48.240.173:29106 -> 192.168.56.102:49164 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 144.48.240.173:29106 -> 192.168.56.102:49164 2020500 ET EXPLOIT_KIT DRIVEBY Likely Evil EXE with no referer from HFS webserver (used by Unknown EK) Exploit Kit Activity Detected
TCP 144.48.240.173:29106 -> 192.168.56.102:49164 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 144.48.240.173:29106 -> 192.168.56.102:49164 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 144.48.240.173:29106 -> 192.168.56.102:49164 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 144.48.240.173:29106 -> 192.168.56.102:49163 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 144.48.240.173:29106 -> 192.168.56.102:49163 2020500 ET EXPLOIT_KIT DRIVEBY Likely Evil EXE with no referer from HFS webserver (used by Unknown EK) Exploit Kit Activity Detected
TCP 144.48.240.173:29106 -> 192.168.56.102:49163 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 144.48.240.173:29106 -> 192.168.56.102:49163 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 144.48.240.173:29106 -> 192.168.56.102:49163 2014520 ET INFO EXE - Served Attached HTTP Misc activity

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
packer InstallShield 2000
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10932813824
free_bytes_available: 10932813824
root_path: C:\
total_number_of_bytes: 34252779520
1 1 0
file c:\services.exe
Time & API Arguments Status Return Repeated

CreateServiceA

service_start_name:
start_type: 2
password:
display_name: Muykuy ekcaccgm
filepath: C:\Program Files (x86)\Ajtydum.exe
service_name: Rstrtb fnvpfsvi
filepath_r: C:\Program Files (x86)\Ajtydum.exe
desired_access: 983551
service_handle: 0x008dc2d0
error_control: 1
service_type: 272
service_manager_handle: 0x008ac438
1 9290448 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1764
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 45056
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x10001000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

recv

buffer: HTTP/1.1 200 OK Content-Type: application/octet-stream Content-Length: 88420 Accept-Ranges: bytes Server: HFS 2.3g Set-Cookie: HFS_SID_=0.846038175281137; path=/; HttpOnly Last-Modified: Fri, 02 Jul 2021 03:56:08 GMT Content-Disposition: attachment; filename="services.exe"; MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $ %^gäD04äD04äD04ŸX<4åD04'Km4êD04gX>4åD04‹[;4åD04‹[:4ïD04‹[44æD04Òb;4æD04äD14=D04Òb44çD04 [;4íD04#B64åD04RichäD04PEL\ï*Wà D¼N`@0uȐܒ`D`|.text’CD `.rdataŒ` H@@.dataÄ€h@À.rsrc ”n@@
received: 1024
socket: 700
1 1024 0
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0

Process32NextW

snapshot_handle: 0x000003d8
process_name: Ajtydum.exe
process_identifier: 7929972
0 0
host 103.229.126.73
host 144.48.240.173
service_name Rstrtb fnvpfsvi service_path C:\Program Files (x86)\Ajtydum.exe
process %e8%bd%af%e4%bb%b6%e6%8e%88%e6%9d%83%e7%a8%8b%e5%ba%8f.exe
process: potential process injection target explorer.exe
Bkav W32.AIDetect.malware1
Lionic Trojan.Win32.Farfli.m!c
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Trojan.Malware.xmW@a8KOUHe
FireEye Generic.mg.ca0bfb0e149468f8
CAT-QuickHeal Backdoor.Farfli
Qihoo-360 Win32/Backdoor.Farfli.HwIAzAsA
ALYac Gen:Trojan.Malware.xmW@a8KOUHe
Cylance Unsafe
Zillya Backdoor.Farfli.Win32.9121
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005631771 )
Alibaba Backdoor:Win32/Kryptik.acfe42dd
K7GW Trojan ( 005631771 )
CrowdStrike win/malicious_confidence_100% (W)
Cyren W32/Farfli.CW.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HCAH
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Backdoor.Win32.Farfli.gen
BitDefender Gen:Trojan.Malware.xmW@a8KOUHe
NANO-Antivirus Trojan.Win32.Fugrafa.gsuiii
Avast Win32:BackdoorX-gen [Trj]
Tencent Malware.Win32.Gencirc.10ce3d7f
Ad-Aware Gen:Trojan.Malware.xmW@a8KOUHe
Emsisoft Gen:Trojan.Malware.xmW@a8KOUHe (B)
Comodo Backdoor.Win32.Farfli.FK@7jqjxo
DrWeb Trojan.Siggen11.63246
VIPRE Trojan.Win32.Generic!BT
TrendMicro TROJ_GEN.R002C0PH621
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.fz
Sophos Mal/Generic-S
Ikarus Trojan.Win32.Injector
Jiangmin Backdoor.Farfli.eqx
Avira HEUR/AGEN.1133195
Antiy-AVL Trojan/Generic.ASMalwS.2FBD4CE
Kingsoft Win32.Hack.Undef.(kcloud)
Gridinsoft Trojan.Win32.Kryptik.oa!s1
Microsoft Trojan:Win32/Multiverze
ViRobot Trojan.Win32.Z.Farfli.385024.A
GData Gen:Trojan.Malware.xmW@a8KOUHe
Cynet Malicious (score: 99)
AhnLab-V3 Malware/Win32.RL_Generic.R299466
McAfee GenericRXLP-OX!CA0BFB0E1494
MAX malware (ai score=89)
VBA32 BScope.Backdoor.Farfli
Malwarebytes Backdoor.Farfli
TrendMicro-HouseCall TROJ_GEN.R002C0PH621
Rising Trojan.Generic@ML.100 (RDML:DJMH8sHhmyUpPg6hCfv5Eg)