Summary | ZeroBOX

conhost.exe

PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6402 Sept. 13, 2021, 8:51 a.m. Sept. 13, 2021, 8:53 a.m.
Size 125.5KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 86ec1c19a29d25b109102faa921c7796
SHA256 a390e37424852274a627183769d43e7015e88fbb02e54d1b2b8367abdc18ec7e
CRC32 77C52025
ssdeep 3072:6S5MV1iKq6X2yFaw98p+jcgkLXYlfr/gmSEYLVi:6SnYFaw98p+AjLYtgmSxM
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
xmr.f2pool.com 203.107.32.162
IP Address Status Action
154.91.1.118 Active Moloch
164.124.101.2 Active Moloch
203.107.32.162 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
suspicious_features Connection to IP address suspicious_request GET http://154.91.1.118/WinRing0x64.sys
suspicious_features Connection to IP address suspicious_request GET http://154.91.1.118/java.exe
request GET http://154.91.1.118/WinRing0x64.sys
request GET http://154.91.1.118/java.exe
description conhost.exe tried to sleep 120 seconds, actually delayed analysis time by 120 seconds
file C:\Users\test22\AppData\Local\Temp\java.exe
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@ິ Í!¸LÍ!This program cannot be run in DOS mode. $5:nüq[¯q[¯q[¯q[¯}[¯V{¯t[¯V}¯p[¯Vm¯r[¯Vq¯p[¯V|¯p[¯Vx¯p[¯Richq[¯PEd†Á&‹Hð"  PpdP<`À@`Ðp  p.textÆ h.rdata|  @H.data0@È.pdata`@@HINIT"P â.rsrcÀ`@B
request_handle: 0x0000000000cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $³u2‰÷\Ú÷\Ú÷\ÚCˆ­Úú\ÚCˆ¯ÚD\ÚCˆ®Ú×\Úi´›Úó\Ú¥|_Ûþ\Ú¥|Yۈ\Ú¥|XÛÒ\ÚR}XÛå\ÚCˆ³Úø\Ú÷]ÚØ\ÚR}UÛ_\ÚR}£Úö\Ú÷ËÚö\ÚR}^Ûö\ÚRich÷\ÚPEd†°•5að" ðP< 9E`<@`E`$UEŒPE$DàÍ°VE€EE(°EEUPX0P<€àUPX1ð`<è@à.rsrcPEì@À3.94UPX! $ sŠß\‚†I×[EŸÙ¨I#2
request_handle: 0x0000000000cc000c
1 1 0
section {u'size_of_data': u'0x0001ee00', u'virtual_address': u'0x00036000', u'entropy': 7.990786737437224, u'name': u'UPX1', u'virtual_size': u'0x0001f000'} entropy 7.99078673744 description A section with a high entropy has been found
entropy 0.991967871486 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x00000000000002c0
process_name: pw.exe
process_identifier: 1616
0 0

Process32NextW

snapshot_handle: 0x00000000000002cc
process_name: java.exe
process_identifier: 2860
0 0

Process32NextW

snapshot_handle: 0x00000000000002d0
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x00000000000002d4
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x00000000000002d8
process_name: pw.exe
process_identifier: 776
0 0

Process32NextW

snapshot_handle: 0x00000000000002dc
process_name: pw.exe
process_identifier: 776
0 0

Process32NextW

snapshot_handle: 0x00000000000002e0
process_name: pw.exe
process_identifier: 776
0 0

Process32NextW

snapshot_handle: 0x00000000000002e4
process_name: pw.exe
process_identifier: 776
0 0

Process32NextW

snapshot_handle: 0x00000000000002e8
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x00000000000002ec
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x00000000000001f0
process_name: pw.exe
process_identifier: 2920
0 0

Process32NextW

snapshot_handle: 0x00000000000002f0
process_name: pw.exe
process_identifier: 2920
0 0

Process32NextW

snapshot_handle: 0x00000000000002f4
process_name: pw.exe
process_identifier: 2920
0 0

Process32NextW

snapshot_handle: 0x00000000000002f8
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x00000000000002fc
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x0000000000000300
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x0000000000000304
process_name: pw.exe
process_identifier: 2924
0 0

Process32NextW

snapshot_handle: 0x0000000000000308
process_name: pw.exe
process_identifier: 2924
0 0

Process32NextW

snapshot_handle: 0x000000000000030c
process_name: pw.exe
process_identifier: 2924
0 0

Process32NextW

snapshot_handle: 0x0000000000000310
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x0000000000000248
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x0000000000000314
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x0000000000000230
process_name: pw.exe
process_identifier: 2112
0 0

Process32NextW

snapshot_handle: 0x0000000000000200
process_name: pw.exe
process_identifier: 2112
0 0

Process32NextW

snapshot_handle: 0x0000000000000204
process_name: pw.exe
process_identifier: 2112
0 0

Process32NextW

snapshot_handle: 0x0000000000000234
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x0000000000000318
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x000000000000031c
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x0000000000000320
process_name: pw.exe
process_identifier: 2608
0 0

Process32NextW

snapshot_handle: 0x0000000000000324
process_name: pw.exe
process_identifier: 2608
0 0

Process32NextW

snapshot_handle: 0x0000000000000328
process_name: pw.exe
process_identifier: 2608
0 0

Process32NextW

snapshot_handle: 0x000000000000032c
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x0000000000000330
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x0000000000000334
process_name: conhost.exe
process_identifier: 1964
0 0

Process32NextW

snapshot_handle: 0x0000000000000338
process_name: pw.exe
process_identifier: 1136
0 0

Process32NextW

snapshot_handle: 0x000000000000033c
process_name: pw.exe
process_identifier: 1136
0 0

Process32NextW

snapshot_handle: 0x0000000000000340
process_name: pw.exe
process_identifier: 1136
0 0

Process32NextW

snapshot_handle: 0x0000000000000344
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x0000000000000348
process_name: taskhost.exe
process_identifier: 2428
0 0

Process32NextW

snapshot_handle: 0x000000000000034c
process_name: conhost.exe
process_identifier: 2296
0 0
section UPX0 description Section name indicates UPX
section UPX1 description Section name indicates UPX
host 154.91.1.118
file C:\Users\test22\AppData\Local\Temp\java.exe
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 76 (SystemFirmwareTableInformation)
-1073741789 0
Lionic Trojan.Win64.Miner.4!c
MicroWorld-eScan Trojan.GenericKD.37564838
McAfee Artemis!86EC1C19A29D
Cylance Unsafe
Alibaba TrojanDownloader:Win64/Generic.33aa8754
Symantec Trojan.Gen.MBT
ESET-NOD32 a variant of Win64/TrojanDownloader.Agent.IY
APEX Malicious
Paloalto generic.ml
Kaspersky Trojan.Win64.Miner.anow
BitDefender Trojan.GenericKD.37564838
Avast Win64:Trojan-gen
Ad-Aware Trojan.GenericKD.37564838
FireEye Generic.mg.86ec1c19a29d25b1
Emsisoft Trojan.GenericKD.37564838 (B)
Ikarus Trojan-Downloader.Win64.Agent
Avira TR/Dldr.Agent.avkgp
MAX malware (ai score=86)
Microsoft Trojan:Win32/Sabsik.FL.B!ml
GData Trojan.GenericKD.37564838
Cynet Malicious (score: 100)
Malwarebytes Trojan.Downloader
Tencent Win64.Trojan-downloader.Agent.Edei
SentinelOne Static AI - Malicious PE
eGambit Unsafe.AI_Score_81%
Fortinet W32/Malicious_Behavior.SBX
AVG Win64:Trojan-gen
Cybereason malicious.58f92e
Panda Trj/CI.A
MaxSecure Trojan.Malware.300983.susgen