Summary | ZeroBOX

task.exe

PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 13, 2021, 9:30 a.m. Sept. 13, 2021, 9:32 a.m.
Size 180.0KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 5120630343cdfdc8698f7ce9d9991894
SHA256 9831ce1230a68322d442ae5732a4974846e7c9ab7318c41d7382a986428fcb8e
CRC32 B2D58846
ssdeep 3072:u7lm+ZrvtFckqaGuI5x5puWpMoSFQ9oToqMrdhHI3IIad69/N:uEIrZBIPfp7Sq9tdZI3IIw6dN
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
xmr.f2pool.com 203.107.32.162
IP Address Status Action
154.91.1.118 Active Moloch
164.124.101.2 Active Moloch
203.107.32.162 Active Moloch

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
resource name EXE
suspicious_features Connection to IP address suspicious_request GET http://154.91.1.118/WinRing0x64.sys
suspicious_features Connection to IP address suspicious_request GET http://154.91.1.118/java.exe
request GET http://154.91.1.118/WinRing0x64.sys
request GET http://154.91.1.118/java.exe
name EXE language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x000230b0 size 0x0001f200
file C:\Windows\System32\nicosoft.exe
section {u'size_of_data': u'0x0002c800', u'virtual_address': u'0x0001a000', u'entropy': 7.996583887711546, u'name': u'UPX1', u'virtual_size': u'0x0002d000'} entropy 7.99658388771 description A section with a high entropy has been found
entropy 0.994413407821 description Overall entropy of this PE file is high
section UPX0 description Section name indicates UPX
section UPX1 description Section name indicates UPX
host 154.91.1.118
service_name NsSvc service_path C:\Windows\System32\nicosoft.exe
Time & API Arguments Status Return Repeated

CreateServiceW

service_start_name:
start_type: 2
password:
display_name: NicoSoft Cloud Service
filepath: C:\Windows\System32\nicosoft.exe
service_name: NsSvc
filepath_r: C:\Windows\System32\nicosoft.exe
desired_access: 2
service_handle: 0x000000000043b8f0
error_control: 1
service_type: 16
service_manager_handle: 0x000000000043b8c0
1 4438256 0
Elastic malicious (high confidence)
CrowdStrike win/malicious_confidence_70% (D)
ESET-NOD32 a variant of Win64/TrojanDownloader.Agent.IW
APEX Malicious
Kaspersky VHO:Trojan-Downloader.Win32.Genome.gen
Avast Win64:CoinminerX-gen [Trj]
Tencent Win64.Trojan-downloader.Agent.Srwq
FireEye Generic.mg.5120630343cdfdc8
SentinelOne Static AI - Malicious PE
Jiangmin Trojan.Bingoml.beh
Cylance Unsafe
eGambit Unsafe.AI_Score_88%
AVG Win64:CoinminerX-gen [Trj]
MaxSecure Trojan.Malware.300983.susgen