Summary | ZeroBOX

uqiwang.exe

Gen1 Emotet Generic Malware ASPack Malicious Library Malicious Packer VMProtect MPRESS UPX ScreenShot KeyLogger Anti_VM Socket Escalate priviledges AntiDebug OS Processor Check GIF Format PE64 PE File DLL AntiVM PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 12, 2021, 11:03 a.m. Nov. 12, 2021, 11:06 a.m.
Size 23.5MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2fa17055cbe751f03a57d8b8ec3c6cd4
SHA256 a6c9370b43fdff11eae35f61bc7d8f89ab817685a6157359eaf52496fcc949a2
CRC32 0F608FE6
ssdeep 393216:ejVFxACaeIi4i3B57+vyYTnrcbshWgQnzlFp1F5x2oWX2u7/:ejTISxknrcbshZUj/7WX2I
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file

IP Address Status Action
116.132.219.184 Active Moloch
120.76.246.204 Active Moloch
140.206.225.232 Active Moloch
157.255.225.49 Active Moloch
164.124.101.2 Active Moloch
39.100.9.39 Active Moloch
47.115.157.13 Active Moloch
47.92.195.246 Active Moloch
47.92.99.221 Active Moloch
47.97.7.140 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleA

buffer: pid=2440;app_id=yqsxtzjds_udisk;main_file_name=C:\Users\test22\AppData\Local\Temp\uqiwang.exe;ver=12.6.48.1850;update_style=f;notify_wnd=003a0028;notify_msg=2032;updated_run=1;server=zhu.wuyouxitong.com:8091|bei.wuyouxitong.com:8091
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Á¬½Ó·þÎñÆ÷ 120.76.246.204:8091 ³É¹¦¡£
console_handle: 0x0000000b
1 1 0

WriteConsoleA

buffer: ´Ó·þÎñÆ÷»ñÈ¡µ½¼ÓÃÜÃÜÔ¿£ºnlMHS6c6ss
console_handle: 0x0000000b
1 1 0

WriteConsoleA

buffer: Ô¶³Ì°æ±¾£º0.0.0.0£»±¾µØ°æ±¾£º12.6.48.1850
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: ÒѾ­ÊÇ×îеİ汾
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .vmp0
resource name FILE
resource name GIF
resource name PNG
resource name STYLE_XML
resource name None
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://47.97.7.140:80/
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://116.132.219.184:80/
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://47.92.195.246:80/
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://140.206.225.232:80/
request POST http://47.97.7.140:80/
request POST http://116.132.219.184:80/
request POST http://47.92.195.246:80/
request POST http://140.206.225.232:80/
request POST http://47.97.7.140:80/
request POST http://116.132.219.184:80/
request POST http://47.92.195.246:80/
request POST http://140.206.225.232:80/
ip 120.76.246.204
ip 47.115.157.13
ip 157.255.225.49
ip 39.100.9.39
ip 47.92.99.221
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2440
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 753664
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x71c43000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2440
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 458752
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x71bb1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1236
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004db0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2912
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6fff0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76897000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76860000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2224
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 753664
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x71c43000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2224
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 458752
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x71bb1000
process_handle: 0xffffffff
1 0 0
description uqiwang.exe tried to sleep 365 seconds, actually delayed analysis time by 365 seconds
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10210553856
free_bytes_available: 10210553856
root_path: C:
total_number_of_bytes: 34252779520
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 75309056
free_bytes_available: 75309056
root_path: \\?\Volume{c2d901c3-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 104853504
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10155327488
free_bytes_available: 10155327488
root_path: \\?\Volume{c2d901c4-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 34252779520
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10155327488
free_bytes_available: 10155327488
root_path: \\?\Volume{c2d901c7-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 34252779520
0 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 75309056
free_bytes_available: 75309056
root_path: \\?\Volume{c2d901c3-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 104853504
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10157125632
free_bytes_available: 10157125632
root_path: \\?\Volume{c2d901c4-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 34252779520
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10157125632
free_bytes_available: 10157125632
root_path: \\?\Volume{c2d901c7-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 34252779520
0 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 75309056
free_bytes_available: 75309056
root_path: \\?\Volume{c2d901c3-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 104853504
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10155311104
free_bytes_available: 10155311104
root_path: \\?\Volume{c2d901c4-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 34252779520
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10155311104
free_bytes_available: 10155311104
root_path: \\?\Volume{c2d901c7-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 34252779520
0 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 75309056
free_bytes_available: 75309056
root_path: \\?\Volume{c2d901c3-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 104853504
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10155311104
free_bytes_available: 10155311104
root_path: \\?\Volume{c2d901c4-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 34252779520
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 10155311104
free_bytes_available: 10155311104
root_path: \\?\Volume{c2d901c7-0706-11e8-912e-806e6f6e6963}\
total_number_of_bytes: 34252779520
0 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 10155577344
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Explorer
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 10157125632
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Explorer
total_number_of_bytes: 0
1 1 0
name FILE language LANG_CHINESE filetype PE32 executable (DLL) (GUI) Intel 80386, for MS Windows sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x004c0c28 size 0x01128400
name GIF language LANG_CHINESE filetype GIF image data, version 89a, 200 x 170 sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x015e9028 size 0x0001b0f3
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
name PNG language LANG_CHINESE filetype PNG image data, 16 x 16, 8-bit/color RGBA, interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x01727c9c size 0x000003fb
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\bootice\BOOTICE.EXE
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\qemu\SDL.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\uninstall.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\qemu\libpdcurses.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\pe\PECmd.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\dos\bootsect.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\oscdimg\etfsboot.com
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Dependency\InsNet.dll
file C:\Users\Public\Desktop\云骑士装机大师(U盘版).lnk
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\XLBugHandler.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\atl71.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\MiniTPFw.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\qemu\myqemu.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\cpio\libiconv2.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\msvcp71.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\xldl.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\fnt\mkblfont.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\fbinst\fbinst.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\zlib1.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\dos\bcdedit.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Dependency\Zlib.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\minizip.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\MiniThunderPlatform.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\gdisk32\gdisk32.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\cpio\cpio.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\dos\bcdboot.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\fnt\freetype6.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\ConfigRes.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\qemu\libz-1.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\dl_peer_id.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\ThunderFW.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\download_engine.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\qemu\libssp-0.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\cpio\libintl3.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\oscdimg\oscdimg.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\msvcr71.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\fnt\libiconv2.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\fnt\zlib1.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Dependency\Propsys.dll
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\XLBugReport.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\update.exe
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\云骑士装机大师(U盘版)\卸载.lnk
file C:\ProgramData\Microsoft\Windows\Start Menu\Programs\云骑士装机大师(U盘版)\云骑士装机大师(U盘版).lnk
file C:\Users\Public\Desktop\云骑士装机大师(U盘版).lnk
file C:\Users\test22\Desktop\云骑士装机大师(U盘版).lnk
cmdline C:\windows\sysnative\bcdedit.exe /enum {BBA53588-9FEC-4BE1-9FF8-51BF7E088918}
cmdline C:\windows\sysnative\bcdedit.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\MiniTPFw.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\update.exe
file C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\ThunderFW.exe
wmi select * from Win32_VideoController
wmi select * from Win32_OperatingSystem
wmi select * from Win32_PhysicalMemory
wmi select * from Win32_ComputerSystem
wmi select * from Win32_SystemEnclosure
wmi select * from win32_DiskDrive
wmi select * from Win32_DesktopMonitor
wmi select * from win32_baseboard
wmi select * from Win32_NetworkAdapter WHERE NetConnectionID != null
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: MiniTPFw.exe
parameters:
filepath: MiniTPFw.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: update.exe
parameters: 4FB7D25268E0F658802D8CA493C76FC9B24AC78C469520FCCD2BF6CB7E35B270BED50E2600463B6EE69C35FA2008A41EAF0EAB8968667939D3ED1E6EC3C3D5C27A2C97F8B0DB381B9A9A2CD6C994C848F7E57C82CF93E05E21B2B7729FDD26E29806D5D8B67BD066EA41908218A47771E3EEADEB3C33EEEA8198C76F309C79EB59CB7011D6CA67820901496CD331EC7241162DA82D773F6B8B37B799C286A46CF86761CDDB2754E2B549FE965F43FE893766A51AB4788DA3811517F9C4E477E308BA8BB78C7C740CF3196DA35496895E5C438F16EC4A8FF5647E22013C053EA2D9D97401BDF0CDA8
filepath: update.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: ThunderFW.exe
parameters: MiniThunderPlatform2021-11-1217:23:59 "C:\Users\test22\Documents\YunQiShiUSBDrive\Work\Tools\download\download\MiniThunderPlatform.exe"
filepath: ThunderFW.exe
1 1 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 1158
family: 0
1 0 0
section {u'size_of_data': u'0x012d8e00', u'virtual_address': u'0x004ac000', u'entropy': 7.971870441736988, u'name': u'.rsrc', u'virtual_size': u'0x012d8c18'} entropy 7.97187044174 description A section with a high entropy has been found
entropy 0.803325771608 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeBackupPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeBackupPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeBackupPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeBackupPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description Communications over RAW Socket rule Network_TCP_Socket
description Run a KeyLogger rule KeyLogger
description Escalate priviledges rule Escalate_priviledges
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
base_handle: 0x80000002
key_handle: 0x0000028c
options: 0
access: 0x000f013f
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
1 0 0

RegOpenKeyExW

regkey_r: {06FDF43F-E581-4834-ADDF-02FDA1E63F40}
base_handle: 0x0000028c
key_handle: 0x00000000
options: 0
access: 0x000f013f
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{06FDF43F-E581-4834-ADDF-02FDA1E63F40}
2 0

RegOpenKeyExW

regkey_r: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
base_handle: 0x80000002
key_handle: 0x00000284
options: 0
access: 0x000f013f
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
1 0 0

RegOpenKeyExW

regkey_r: {06FDF43F-E581-4834-ADDF-02FDA1E63F40}
base_handle: 0x00000284
key_handle: 0x00000290
options: 0
access: 0x000f013f
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{06FDF43F-E581-4834-ADDF-02FDA1E63F40}
1 0 0
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0x00000000
process_identifier: 0
process_handle: 0x00000280
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 0
process_handle: 0x00000280
3221225480 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2528
process_handle: 0x0000027c
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2528
process_handle: 0x0000027c
3221225738 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 0
process_handle: 0x00000288
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 0
process_handle: 0x00000288
3221225480 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2588
process_handle: 0x00000280
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2588
process_handle: 0x00000280
3221225738 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 0
process_handle: 0x00000278
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 0
process_handle: 0x00000278
3221225480 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2532
process_handle: 0x000004c4
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2532
process_handle: 0x000004c4
3221225738 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 0
process_handle: 0x0000058c
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 0
process_handle: 0x0000058c
3221225480 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2644
process_handle: 0x00000278
0 0

NtTerminateProcess

status_code: 0x00000000
process_identifier: 2644
process_handle: 0x00000278
3221225738 0
section .vmp0 description Section name indicates VMProtect
wmi select * from Win32_ComputerSystem
wmi select * from Win32_PhysicalMemory
file C:\Users\test22\Documents\YunQiShiUSBDrive\update.exe
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 1 (FILE_OPEN)
file_handle: 0x00000274
filepath: \??\PhysicalDrive0
desired_access: 0x80100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE)
file_attributes: 0 ()
filepath_r: \??\PhysicalDrive0
create_options: 96 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 1 (FILE_OPENED)
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
1 0 0

NtCreateFile

create_disposition: 1 (FILE_OPEN)
file_handle: 0x00000274
filepath: \??\PhysicalDrive0
desired_access: 0x80100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE)
file_attributes: 0 ()
filepath_r: \??\PhysicalDrive0
create_options: 96 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 1 (FILE_OPENED)
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
1 0 0

NtCreateFile

create_disposition: 1 (FILE_OPEN)
file_handle: 0x00000560
filepath: \??\PhysicalDrive0
desired_access: 0xc0100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 0 ()
filepath_r: \??\PhysicalDrive0
create_options: 96 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 1 (FILE_OPENED)
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
1 0 0

NtCreateFile

create_disposition: 1 (FILE_OPEN)
file_handle: 0x00000560
filepath: \??\PhysicalDrive0
desired_access: 0xc0100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 0 ()
filepath_r: \??\PhysicalDrive0
create_options: 96 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 1 (FILE_OPENED)
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
1 0 0

NtCreateFile

create_disposition: 1 (FILE_OPEN)
file_handle: 0x00000560
filepath: \??\PhysicalDrive0
desired_access: 0xc0100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 0 ()
filepath_r: \??\PhysicalDrive0
create_options: 96 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 1 (FILE_OPENED)
share_access: 3 (FILE_SHARE_READ|FILE_SHARE_WRITE)
1 0 0

DeviceIoControl

input_buffer: ìæ
control_code: 2954240 ()
device_handle: 0x00000540
output_buffer:
1 1 0
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Application.Ursu.936182
Cybereason malicious.5cbe75
Arcabit Trojan.Application.Ursu.DE48F6
Cyren W32/Trojan.HCVX-1071
APEX Malicious
Paloalto generic.ml
BitDefender Gen:Variant.Application.Ursu.936182
Avast Win32:TrojanX-gen [Trj]
McAfee-GW-Edition Artemis
Emsisoft Gen:Variant.Application.Ursu.936182 (B)
Webroot W32.Trojan.Gen
GData Gen:Variant.Application.Ursu.936182
McAfee Artemis!2FA17055CBE7
MAX malware (ai score=71)
Rising Malware.Heuristic!ET#79% (RDMK:cmRtazoBoUbMjPfl2fAL5jRRUXuB)
eGambit Unsafe.AI_Score_100%
AVG Win32:TrojanX-gen [Trj]
Process injection Process 2440 resumed a thread in remote process 2840
Process injection Process 2440 resumed a thread in remote process 2224
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000003f8
suspend_count: 1
process_identifier: 2840
1 0 0

NtResumeThread

thread_handle: 0x0000056c
suspend_count: 1
process_identifier: 2224
1 0 0