Summary | ZeroBOX

lots.exe

UPX Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Nov. 11, 2021, 12:31 p.m. Nov. 11, 2021, 12:33 p.m.
Size 1.1MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 5575302eba0ea0e5f6b9fda28d1e1eb7
SHA256 650eff421fbfdcd69fac227ac7b9fef214630df8375dc5cb458a200bbabfd589
CRC32 7AEFB932
ssdeep 24576:GIauX7sBRy6WV4CUJ1LSce5vZyUjAfA1rppS4V:9JiRyYwZzAfANp
PDB Path C:\kiriziwu\3.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\kiriziwu\3.pdb
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2780
region_size: 974848
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01fb0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2780
region_size: 1069056
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x020a0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_ICON language LANG_LATVIAN filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x0011d4a0 size 0x00000468
name RT_GROUP_ICON language LANG_LATVIAN filetype data sublanguage SUBLANG_DEFAULT offset 0x001170e0 size 0x00000068
name RT_GROUP_ICON language LANG_LATVIAN filetype data sublanguage SUBLANG_DEFAULT offset 0x001170e0 size 0x00000068
name RT_GROUP_ICON language LANG_LATVIAN filetype data sublanguage SUBLANG_DEFAULT offset 0x001170e0 size 0x00000068
section {u'size_of_data': u'0x000fb800', u'virtual_address': u'0x00001000', u'entropy': 7.990987341112037, u'name': u'.text', u'virtual_size': u'0x000fb700'} entropy 7.99098734111 description A section with a high entropy has been found
entropy 0.905490549055 description Overall entropy of this PE file is high
Elastic malicious (high confidence)
FireEye Generic.mg.5575302eba0ea0e5
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
K7GW Hacktool ( 700007861 )
Cyren W32/Kryptik.FOQ.gen!Eldorado
Symantec Packed.Generic.528
APEX Malicious
ClamAV Win.Malware.Fragtor-9907126-0
Kaspersky VHO:Backdoor.Win32.Agent.gen
Sophos ML/PE-A
McAfee-GW-Edition BehavesLike.Win32.Lockbit.tc
Emsisoft Trojan.Crypt (A)
Ikarus Trojan-Ransom.StopCrypt
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Cynet Malicious (score: 100)
Acronis suspicious
VBA32 Malware-Cryptor.2LA.gen
Malwarebytes MachineLearning/Anomalous.100%
Rising Malware.Heuristic!ET#96% (RDMK:cmRtazqTiih+BiP1F/68q/GD311q)
SentinelOne Static AI - Malicious PE
eGambit Unsafe.AI_Score_99%
BitDefenderTheta Gen:NN.ZexaF.34266.fr0@a0eTFGoc
CrowdStrike win/malicious_confidence_100% (D)
MaxSecure Trojan.Malware.300983.susgen