Summary | ZeroBOX

Setup2.exe

Emotet Gen1 UPX ASPack Malicious Library Malicious Packer PE64 PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 30, 2021, 6:57 p.m. Aug. 30, 2021, 6:59 p.m.
Size 1.6MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 308da60a9996a07824a1a1ce3a994d05
SHA256 1a1bf81f4a5d156c4c4ad16bd5f8ea3b2ea8c759b3e1fcbb47945f5c9039ff94
CRC32 71BE19D6
ssdeep 24576:pAT8QE+krxuiBQZ0pzvtIej9zXs3a/reJkSA3ZeoI5fiq3DMR9HC+QKHHIVqPJ7A:pAI+gV22RjuK/YtLeJQ4IVqPJ7uT
Yara
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
iplogger.org 88.99.66.31
IP Address Status Action
164.124.101.2 Active Moloch
186.2.171.3 Active Moloch
88.99.66.31 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49205 -> 88.99.66.31:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.101:49205
88.99.66.31:443
C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA CN=*.iplogger.org 55:1e:13:99:46:1c:67:40:a3:48:7f:38:0d:16:e7:51:f4:c4:43:cb

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
file c:\program files (x86)\Google\Chrome\application\chrome.exe
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section CODE
section DATA
section BSS
packer BobSoft Mini Delphi -> BoB / BobSoft
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x773d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x773d9ea5

exception.instruction_r: 89 08 50 45 43 6f 6d 70 61 63 74 32 00 c8 ef f0
exception.symbol: md8_8eus+0x9b82c
exception.instruction: mov dword ptr [eax], ecx
exception.module: md8_8eus.exe
exception.exception_code: 0xc0000005
exception.offset: 636972
exception.address: 0x49b82c
registers.esp: 1638276
registers.edi: 0
registers.eax: 0
registers.ebp: 1638292
registers.edx: 4831254
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
1 0 0
suspicious_features Connection to IP address suspicious_request GET http://186.2.171.3/seemorebty/il.php?e=md8_8eus
request GET http://186.2.171.3/seemorebty/il.php?e=md8_8eus
request GET https://iplogger.org/ZhiS4
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 620
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73702000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2072
region_size: 12288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00300000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1772
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00340000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1772
region_size: 61440
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00350000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1772
region_size: 73728
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00360000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 13722144768
free_bytes_available: 13722144768
root_path: C:\
total_number_of_bytes: 34252779520
1 1 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies
file C:\Program Files (x86)\Company\NewProduct\Uninstall.exe
file C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
file C:\Program Files (x86)\Company\NewProduct\inst1.exe
file C:\Program Files (x86)\Company\NewProduct\cutm3.exe
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Welcome Center.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Windows Explorer.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\System Configuration.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Snipping Tool.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Fax and Scan.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Calculator.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Paint.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\displayswitch.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Internet Explorer.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Sticky Notes.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\XPS Viewer.lnk
file C:\Program Files (x86)\Company\NewProduct\cutm3.exe
file C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
file C:\Program Files (x86)\Company\NewProduct\inst1.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Program Files (x86)\Company\NewProduct\cutm3.exe
parameters:
filepath: C:\Program Files (x86)\Company\NewProduct\cutm3.exe
0 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
parameters:
filepath: C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Program Files (x86)\Company\NewProduct\inst1.exe
parameters:
filepath: C:\Program Files (x86)\Company\NewProduct\inst1.exe
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeShutdownPrivilege
1 1 0
host 186.2.171.3
Time & API Arguments Status Return Repeated

RegSetValueExA

key_handle: 0x000004d4
regkey_r: ProxyEnable
reg_type: 4 (REG_DWORD)
value: 0
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable
1 0 0
Lionic Trojan.Win32.Upatre.a!c
Elastic malicious (high confidence)
DrWeb Trojan.MulDrop16.31196
MicroWorld-eScan Trojan.GenericKD.37502524
FireEye Trojan.GenericKD.37502524
McAfee Artemis!308DA60A9996
Cylance Unsafe
Sangfor Trojan.Win32.Upatre.izhi
K7AntiVirus Password-Stealer ( 005760bf1 )
Alibaba TrojanDownloader:Win32/Upatre.1085f083
K7GW Password-Stealer ( 005760bf1 )
Arcabit Trojan.Mikey.D1EF45
BitDefenderTheta Gen:NN.ZexaF.34110.5iWaaK94sCpb
Cyren W64/Upatre.MT.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 multiple detections
APEX Malicious
Kaspersky Trojan-Downloader.Win32.Upatre.izhi
BitDefender Trojan.GenericKD.37502524
NANO-Antivirus Virus.Win32.Gen-Crypt.ccnc
SUPERAntiSpyware Trojan.Agent/Gen-Dropper
Avast Win64:Malware-gen
Ad-Aware Trojan.GenericKD.37502524
McAfee-GW-Edition BehavesLike.Win32.Dropper.tc
Emsisoft Trojan.GenericKD.37502524 (B)
SentinelOne Static AI - Malicious PE
Jiangmin TrojanDownloader.Upatre.ancr
Webroot W32.Trojan.Gen
Avira TR/Dldr.Agent.vkaxa
MAX malware (ai score=86)
Antiy-AVL Trojan/Generic.ASMalwS.347D6EF
Gridinsoft Trojan.Win32.CoinMiner.vb!s8
Microsoft TrojanDownloader:Win32/Upatre!MSR
GData Win32.Trojan-Stealer.Predator.O7N5IO
Cynet Malicious (score: 99)
AhnLab-V3 Malware/Win.Generic.C4613211
ALYac Gen:Variant.Zusy.397443
Tencent Win32.Trojan-downloader.Upatre.Lhxd
Yandex Trojan.Blocker!OH3Aj8L7MuI
Ikarus Trojan.Win32.Crypt
eGambit Unsafe.AI_Score_99%
Fortinet W32/multiple_detections
AVG Win64:Malware-gen
Panda Trj/CI.A
CrowdStrike win/malicious_confidence_70% (W)
MaxSecure Trojan-Ransom.Win32.Crypmod.zfq