Summary | ZeroBOX

itaves.exe

Emotet Gen1 Generic Malware Malicious Library UPX Malicious Packer Admin Tool (Sysinternals etc ...) Anti_VM PE File OS Processor Check PE32 DLL
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 15, 2021, 2:28 p.m. Nov. 15, 2021, 2:49 p.m.
Size 2.9MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7b1c3f5010c8703d58a2d0cfa15b3b12
SHA256 879fccdf9b4b09063a6dbf1ac2cc381a1ebcacf6e38f5b8d4889785a4ccde22a
CRC32 0B1EC425
ssdeep 49152:dD1Zo/BXVv2eK9cgiwMv2DKirx9N1eEuNgi4ANahMxByZuRDjdXggke0j4w+vdtV:HZCUegV1x9W7F45grfdXF7dtxIm
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
patacavp+0x2f60cd @ 0xe460cd
patacavp+0x356484 @ 0xea6484

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008e
exception.offset: 46887
exception.address: 0x766fb727
registers.esp: 4060948
registers.edi: 12029952
registers.eax: 4060948
registers.ebp: 4061028
registers.edx: 2130566132
registers.ebx: 0
registers.esi: 1999795243
registers.ecx: 511574016
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 5f f1 0a 00 c3 e9 c6 04 09 00 1d 16 58 22
exception.symbol: patacavp+0x2f8f87
exception.instruction: in eax, dx
exception.module: patacavp.exe
exception.exception_code: 0xc0000096
exception.offset: 3116935
exception.address: 0xe48f87
registers.esp: 4061068
registers.edi: 4206224
registers.eax: 1750617430
registers.ebp: 12029952
registers.edx: 4216918
registers.ebx: 0
registers.esi: 13
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 4c 65 fe ff 6a 78 35 00 20 00 a1 00 ca fd
exception.symbol: patacavp+0x36bd3e
exception.instruction: in eax, dx
exception.module: patacavp.exe
exception.exception_code: 0xc0000096
exception.offset: 3587390
exception.address: 0xebbd3e
registers.esp: 4061068
registers.edi: 4206224
registers.eax: 1447909480
registers.ebp: 12029952
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 13
registers.ecx: 10
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2320
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73a01000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2320
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74d71000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2320
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10001000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2320
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x739f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2420
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00485000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2420
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003c0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2420
region_size: 331776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01f70000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2420
region_size: 278528
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00920000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2420
region_size: 294912
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01fd0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7734f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x772c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b70000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b6a000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b6a000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b6a000
process_handle: 0xffffffff
1 0 0
file C:\Program Files (x86)\foler\olader\acppage.dll
file C:\Program Files (x86)\foler\olader\acledit.dll
file C:\Users\test22\AppData\Local\Temp\nsm8E37.tmp\UAC.dll
file C:\Users\test22\AppData\Local\Temp\darius\patacavp.exe
file C:\Program Files (x86)\foler\olader\adprovider.dll
file C:\Users\test22\AppData\Local\Temp\darius\obolet.exe
file C:\Users\test22\AppData\Local\Temp\nsm8E37.tmp\UAC.dll
file C:\Users\test22\AppData\Local\Temp\darius\patacavp.exe
process system
file C:\ProgramData\AVAST Software
file C:\ProgramData\AVG
Time & API Arguments Status Return Repeated

FindWindowA

class_name: OLLYDBG
window_name:
0 0

FindWindowA

class_name: GBDYLLO
window_name:
0 0

FindWindowA

class_name: pediy06
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: RegmonClass
window_name:
0 0

FindWindowA

class_name: Registry Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: 18467-41
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: FilemonClass
window_name:
0 0

FindWindowA

class_name: File Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0

FindWindowA

class_name: PROCMON_WINDOW_CLASS
window_name:
0 0

FindWindowA

class_name: Process Monitor - Sysinternals: www.sysinternals.com
window_name:
0 0
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
file C:\Users\test22\AppData\Local\Temp\darius\obolet.exe
Process injection Process 2420 manipulating memory of non-child process 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 0
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 0
protection: 103 (PAGE_EXECUTE_READ|PAGE_EXECUTE_READWRITE|PAGE_NOACCESS|PAGE_READONLY|PAGE_READWRITE)
base_address: 0x00000000
process_handle: 0x00000001
3221225541 0

NtProtectVirtualMemory

process_identifier: 0
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 0
protection: 103 (PAGE_EXECUTE_READ|PAGE_EXECUTE_READWRITE|PAGE_NOACCESS|PAGE_READONLY|PAGE_READWRITE)
base_address: 0x00000000
process_handle: 0x00000001
3221225541 0

NtProtectVirtualMemory

process_identifier: 0
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 0
protection: 103 (PAGE_EXECUTE_READ|PAGE_EXECUTE_READWRITE|PAGE_NOACCESS|PAGE_READONLY|PAGE_READWRITE)
base_address: 0x00000000
process_handle: 0x00000001
3221225541 0

NtProtectVirtualMemory

process_identifier: 0
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 0
protection: 103 (PAGE_EXECUTE_READ|PAGE_EXECUTE_READWRITE|PAGE_NOACCESS|PAGE_READONLY|PAGE_READWRITE)
base_address: 0x00000000
process_handle: 0x00000001
3221225541 0

NtProtectVirtualMemory

process_identifier: 0
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 0
protection: 103 (PAGE_EXECUTE_READ|PAGE_EXECUTE_READWRITE|PAGE_NOACCESS|PAGE_READONLY|PAGE_READWRITE)
base_address: 0x00000000
process_handle: 0x00000001
3221225541 0

NtProtectVirtualMemory

process_identifier: 0
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 0
protection: 103 (PAGE_EXECUTE_READ|PAGE_EXECUTE_READWRITE|PAGE_NOACCESS|PAGE_READONLY|PAGE_READWRITE)
base_address: 0x00000000
process_handle: 0x00000001
3221225541 0

NtProtectVirtualMemory

process_identifier: 0
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 0
protection: 103 (PAGE_EXECUTE_READ|PAGE_EXECUTE_READWRITE|PAGE_NOACCESS|PAGE_READONLY|PAGE_READWRITE)
base_address: 0x00000000
process_handle: 0x00000001
3221225541 0

NtProtectVirtualMemory

process_identifier: 0
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 0
protection: 103 (PAGE_EXECUTE_READ|PAGE_EXECUTE_READWRITE|PAGE_NOACCESS|PAGE_READONLY|PAGE_READWRITE)
base_address: 0x00000000
process_handle: 0x00000001
3221225541 0
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 76 (SystemFirmwareTableInformation)
3221225507 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed e9 4c 65 fe ff 6a 78 35 00 20 00 a1 00 ca fd
exception.symbol: patacavp+0x36bd3e
exception.instruction: in eax, dx
exception.module: patacavp.exe
exception.exception_code: 0xc0000096
exception.offset: 3587390
exception.address: 0xebbd3e
registers.esp: 4061068
registers.edi: 4206224
registers.eax: 1447909480
registers.ebp: 12029952
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 13
registers.ecx: 10
1 0 0
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Trojan.Heur.D.DMW@dmI064ji
FireEye Generic.mg.7b1c3f5010c8703d
ALYac Gen:Trojan.Heur.D.DMW@dmI064ji
Cylance Unsafe
Zillya Dropper.Scrop.Win32.1379
Sangfor Trojan.Win32.Save.a
Cybereason malicious.010c87
BitDefenderTheta Gen:NN.ZexaF.34266.er2@aK64ZWii
Cyren W32/Kryptik.FHH.gen!Eldorado
Symantec ML.Attribute.HighConfidence
ESET-NOD32 multiple detections
APEX Malicious
Paloalto generic.ml
ClamAV Win.Packed.Filerepmalware-9864117-0
Kaspersky UDS:Trojan.Win32.AntiVM
BitDefender Gen:Trojan.Heur.D.DMW@dmI064ji
NANO-Antivirus Virus.Win32.Gen-Crypt.ccnc
Avast Win32:CrypterX-gen [Trj]
Tencent Win32.Trojan-qqpass.Qqrob.Ahey
Sophos Mal/Generic-S
VIPRE Trojan.Win32.Generic.pak!cobra
McAfee-GW-Edition BehavesLike.Win32.Generic.vc
Emsisoft Gen:Trojan.Heur.D.DMW@dmI064ji (B)
SentinelOne Static AI - Malicious PE
eGambit Unsafe.AI_Score_98%
Kingsoft Win32.PSWTroj.Undef.(kcloud)
Microsoft Trojan:Win32/Sabsik.TE.B!ml
GData Win32.Trojan.BSE.HLJWVB
Cynet Malicious (score: 100)
McAfee Artemis!7B1C3F5010C8
MAX malware (ai score=89)
VBA32 BScope.TrojanBanker.Ponteiro
Malwarebytes Malware.AI.2672519033
Rising Trojan.Generic@ML.100 (RDML:E6l5VP1vvn9ceOg5rpgHaw)
Ikarus Win32.Outbreak
Webroot W32.Gen.pak
AVG Win32:CrypterX-gen [Trj]
Panda Trj/CI.A
CrowdStrike win/malicious_confidence_100% (W)