Summary | ZeroBOX

1.exe

VMProtect Malicious Library PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6402 Oct. 19, 2021, 4:44 p.m. Oct. 19, 2021, 4:50 p.m.
Size 4.1MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 bfbbb8571fc1d4dbd8053e5154cda305
SHA256 8d3acf2f0ec215aa77026016f145230bf44a3a6c411349f1e49f86561380bb60
CRC32 2397070E
ssdeep 98304:mEzyXcTqaJ9IyyPc2iBZ83hHla+FOuWyVO5mo8/xCV:NzlTq742iBIHllFOhyxXw
Yara
  • VMProtect_Zero - VMProtect packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch
185.121.177.177 Active Moloch
91.136.8.131 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .vmp0
section .vmp1
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 896
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00230000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 896
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00240000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 896
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00250000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 896
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00260000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 896
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00270000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 896
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00280000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 896
region_size: 36864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7efa0000
allocation_type: 1060864 (MEM_COMMIT|MEM_RESERVE|MEM_TOP_DOWN)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 876544
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x77af0000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x00230000
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x0040b800', u'virtual_address': u'0x00291000', u'entropy': 7.916703874966222, u'name': u'.vmp1', u'virtual_size': u'0x0040b760'} entropy 7.91670387497 description A section with a high entropy has been found
entropy 0.97838667769 description Overall entropy of this PE file is high
section .vmp0 description Section name indicates VMProtect
section .vmp1 description Section name indicates VMProtect
host 185.121.177.177
host 91.136.8.131
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
Bkav W32.AIDetect.malware1
Lionic Trojan.Win32.Tasker.4!c
Elastic malicious (high confidence)
DrWeb Trojan.MulDrop18.45087
MicroWorld-eScan Trojan.GenericKD.37820168
McAfee Artemis!BFBBB8571FC1
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 7000001c1 )
Alibaba Trojan:Win32/Tasker.048a54e1
K7GW Trojan ( 7000001c1 )
CrowdStrike win/malicious_confidence_60% (W)
BitDefenderTheta Gen:NN.ZexaF.34218.@F0@aWLuuJoi
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Generik.JHPBIMJ
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan.Win32.Tasker.vho
BitDefender Trojan.GenericKD.37820168
ViRobot Trojan.Win32.Z.Tasker.4336128
Tencent Win32.Trojan.Generik.Pkhf
Ad-Aware Trojan.GenericKD.37820168
Sophos Mal/VMProtBad-A
McAfee-GW-Edition BehavesLike.Win32.Generic.rc
FireEye Generic.mg.bfbbb8571fc1d4db
Ikarus Win32.Outbreak
GData Trojan.GenericKD.37820168
Kingsoft Win32.Troj.Undef.(kcloud)
ZoneAlarm HEUR:Trojan.Win32.Tasker.vho
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Acronis suspicious
MAX malware (ai score=81)
Rising Trojan.Generic@ML.99 (RDML:9k1xlOebjzDuuUGbWT4hXw)
SentinelOne Static AI - Malicious PE
Fortinet W32/PossibleThreat
AVG FileRepMalware
Avast FileRepMalware
MaxSecure Trojan.Malware.300983.susgen