Summary | ZeroBOX

3688_1636106995_4191.exe

UPX Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Nov. 7, 2021, 10:16 a.m. Nov. 7, 2021, 10:39 a.m.
Size 341.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 36a3976a7678715fffe2300f0ae8a21a
SHA256 27098e89b511cd37b5aad597d2e3875d5f6ca232b6bc057cef67adc24243d33e
CRC32 F8017EB1
ssdeep 6144:CgwHSPx1JKp0WJrIWwo7Somlb/e4Re8Kg:CPyPpK6WJrIWwo7SoL4RTp
PDB Path C:\yasasinuzonuhu33\dapilopusar\pibuxesacegera\rikenocesas.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\yasasinuzonuhu33\dapilopusar\pibuxesacegera\rikenocesas.pdb
section .fug
resource name None
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2756
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 65536
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x009fe000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2756
region_size: 36864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00040000', u'virtual_address': u'0x00001000', u'entropy': 6.965108393608228, u'name': u'.text', u'virtual_size': u'0x0003ffda'} entropy 6.96510839361 description A section with a high entropy has been found
entropy 0.751835535977 description Overall entropy of this PE file is high
Lionic Trojan.Win32.Strab.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.37960291
FireEye Generic.mg.36a3976a7678715f
McAfee GenericRXQP-VT!36A3976A7678
Cylance Unsafe
Sangfor Trojan.Win32.Strab.ky
K7AntiVirus Trojan ( 00589f621 )
Alibaba Trojan:Win32/Kryptik.9cb0d83b
K7GW Trojan ( 00589f621 )
Arcabit Trojan.Generic.D2433A63
Baidu Win32.Trojan.Kryptik.jm
Cyren W32/Kryptik.FRX.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HNFD
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan.Win32.DiskWriter.gen
BitDefender Trojan.GenericKD.37960291
Avast Win32:DropperX-gen [Drp]
Ad-Aware Trojan.GenericKD.37960291
Emsisoft Trojan.GenericKD.37960291 (B)
DrWeb Trojan.DownLoader43.57619
TrendMicro Ransom.Win32.LOCKBITCRYPT.USMANK621
McAfee-GW-Edition BehavesLike.Win32.Trojan.fh
Sophos Mal/Generic-S
SentinelOne Static AI - Suspicious PE
eGambit Unsafe.AI_Score_95%
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Ransom.Win32.STOP.sa
Microsoft Ransom:Win32/LockbitCrypt.SV!MTB
ViRobot Trojan.Win32.Z.Stopcrypt.349696
GData Trojan.GenericKD.37960291
Cynet Malicious (score: 100)
AhnLab-V3 Infostealer/Win.SmokeLoader.R448815
Acronis suspicious
ALYac Trojan.GenericKD.37960291
MAX malware (ai score=80)
VBA32 BScope.Trojan.Sabsik.FL
Malwarebytes Trojan.MalPack.GS
TrendMicro-HouseCall Ransom.Win32.LOCKBITCRYPT.USMANK621
Ikarus Trojan.Agent
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Kryptik.HNFD!tr
Webroot W32.Strab
AVG Win32:DropperX-gen [Drp]
Panda Trj/Genetic.gen
CrowdStrike win/malicious_confidence_100% (W)