Summary | ZeroBOX

csrss.exe

UPX Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6402 Oct. 20, 2021, 8:05 a.m. Oct. 20, 2021, 8:10 a.m.
Size 289.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 a6cf11855cd106ea4fcc35c40906331b
SHA256 4f28f8460abcaaf087c8f7ac3980916768846e60a096763429bc66bed1e62f57
CRC32 3B8753C8
ssdeep 6144:EF+Fetc/IzSIKu9vM2BMwnggzqX7tNfVXVHQLIiu8cfo0/pW:EFketAI3KevzPzwZGEX8cA0/M
PDB Path C:\rewi\mac30.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\rewi\mac30.pdb
section .doye
section .veyi
resource name AFX_DIALOG_LAYOUT
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 61440
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0029e000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2072
region_size: 110592
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02fc0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x0001c200', u'virtual_address': u'0x00001000', u'entropy': 7.6213781244557985, u'name': u'.text', u'virtual_size': u'0x0001c150'} entropy 7.62137812446 description A section with a high entropy has been found
entropy 0.389948006932 description Overall entropy of this PE file is high
Bkav W32.AIDetect.malware1
Lionic Trojan.Multi.Generic.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.47212647
FireEye Generic.mg.a6cf11855cd106ea
McAfee Packed-GDV!A6CF11855CD1
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005890361 )
Alibaba Backdoor:Win32/Androm.4fd05b3a
K7GW Trojan ( 005890361 )
Cybereason malicious.8aec2f
BitDefenderTheta Gen:NN.ZexaF.34218.sy0@aa7b2rcG
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HMYZ
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Backdoor.Win32.Androm.gen
Avast Win32:Trojan-gen
Sophos Mal/Generic-R + Troj/Krypt-BO
Comodo TrojWare.Win32.UMal.ywycz@0
McAfee-GW-Edition BehavesLike.Win32.Generic.dh
Emsisoft Trojan.GenericKD.47212647 (B)
Ikarus Trojan.Win32.Crypt
MaxSecure Trojan.Malware.300983.susgen
Kingsoft Win32.Hack.Undef.(kcloud)
Microsoft Ransom:Win32/StopCrypt.PH!MTB
GData Win32.Trojan-Stealer.LokiBot.4LQ5DU
Cynet Malicious (score: 100)
Acronis suspicious
VBA32 Malware-Cryptor.2LA.gen
Malwarebytes Trojan.MalPack.GS
TrendMicro-HouseCall TrojanSpy.Win32.CRYPTINJECT.USMANJJ21
Rising Trojan.Kryptik!1.DA21 (CLASSIC)
SentinelOne Static AI - Malicious PE
eGambit Unsafe.AI_Score_73%
Fortinet W32/Kryptik.HMYZ!tr
Webroot W32.Malware.Gen
AVG Win32:Trojan-gen
CrowdStrike win/malicious_confidence_100% (W)