Summary | ZeroBOX

vbc.exe

HermeticWiper Malicious Library UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 May 19, 2022, 11:10 a.m. May 19, 2022, 11:13 a.m.
Size 330.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0ee2a81aae42ac9b413f02979c6ce6f9
SHA256 dae867c4b385b3ac246fa3daa68654af32d8bb89af7eb5b7164480fd3b40ccfc
CRC32 BC60DAA4
ssdeep 6144:WWIaU2PEnXv/V0XS7/llyWFaokehxhmZQ2WiN+X0Ok9/Io:WW54/90C7/llzMehLmei
PDB Path C:\fuwu.pdb
Yara
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • HermeticWiper_Zero - HermeticWiper
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\fuwu.pdb
resource name AFX_DIALOG_LAYOUT
resource name HEPIYIWENIMOMACAMAKA
resource name MIMELA
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2788
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 65536
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005ca000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2788
region_size: 110592
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00011000', u'virtual_address': u'0x00035000', u'entropy': 7.778465246465828, u'name': u'.data', u'virtual_size': u'0x0004ff28'} entropy 7.77846524647 description A section with a high entropy has been found
entropy 0.206686930091 description Overall entropy of this PE file is high
Bkav W32.AIDetect.malware2
Lionic Trojan.Multi.Generic.4!c
tehtris Generic.Malware
DrWeb Trojan.PWS.Siggen3.16481
MicroWorld-eScan Trojan.GenericKD.39663884
FireEye Generic.mg.0ee2a81aae42ac9b
CAT-QuickHeal Ransom.Stop.P5
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
Alibaba Trojan:Application/Kryptik.b3d7681f
Arcabit Trojan.Generic.D25D390C
Cyren W32/Agent.EMH.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Kryptik.HPPY
TrendMicro-HouseCall TROJ_GEN.R002C0PEH22
Paloalto generic.ml
ClamAV Win.Packed.Generic-9950062-0
Kaspersky HEUR:Trojan-Spy.Win32.Stealer.gen
BitDefender Trojan.GenericKD.39663884
Avast Win32:PWSX-gen [Trj]
Tencent Win32.Trojan-spy.Stealer.Kpu
Ad-Aware Trojan.GenericKD.39663884
Emsisoft Trojan.GenericKD.39663884 (B)
McAfee-GW-Edition BehavesLike.Win32.Generic.fh
Sophos ML/PE-A
SentinelOne Static AI - Malicious PE
Avira TR/AD.LokiBot.pjtut
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Ransom.Win32.STOP.sa
Microsoft Trojan:Win32/Lokibot.JHK!MTB
GData Win32.Trojan.PSE.1400VVW
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.MalPE.R492824
McAfee Packed-GEE!0EE2A81AAE42
MAX malware (ai score=87)
VBA32 TrojanPSW.RedLine
Malwarebytes Trojan.MalPack.GS
APEX Malicious
Rising Ransom.Stop!8.10810 (CLOUD)
Ikarus Win32.Outbreak
MaxSecure Trojan.Malware.300983.susgen
AVG Win32:PWSX-gen [Trj]
Panda Trj/RnkBend.A
CrowdStrike win/malicious_confidence_100% (W)