Summary | ZeroBOX

1.exe

UPX Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Dec. 8, 2022, 10:31 a.m. Dec. 8, 2022, 10:48 a.m.
Size 1.4MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ff8b52645b3eb0b891935435db2621a2
SHA256 4fcbc17fc12ecf413b664e52177e48ea66e0e25581f144b4d1c4cac51c8346cf
CRC32 88F9D808
ssdeep 24576:cx0M2zdGz97lh4eb1DXNJ4X6Pi3hlIT6mN1+vjCFHnbfG:cZ1pDXzi3h66mN1+rSbf
PDB Path C:\Boyequi\Fopay\ganod\Xim waho.pdb
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
8dveu1agqsygvx4ejsolmwybvwxz2x4n.3adjp7w3ykb4tut9
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "COMSurrogate" has successfully been created.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Deleted file - C:\Users\test22\AppData\Local\Temp\1.exe
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Active code page: 65001
console_handle: 0x00000013
1 1 0

WriteConsoleA

buffer: Pinging 127.0.0.1
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: with 32 bytes of data:
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Reply from 127.0.0.1:
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: bytes=32
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: time<1ms
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: TTL=128
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Reply from 127.0.0.1:
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: bytes=32
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: time<1ms
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: TTL=128
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Reply from 127.0.0.1:
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: bytes=32
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: time<1ms
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: TTL=128
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Reply from 127.0.0.1:
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: bytes=32
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: time<1ms
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: TTL=128
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ping statistics for 127.0.0.1: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms
console_handle: 0x00000007
1 1 0
pdb_path C:\Boyequi\Fopay\ganod\Xim waho.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 3016
region_size: 524288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007f0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3016
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00830000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 3016
region_size: 1200128
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02500000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 1921024
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0f300000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\1.exe
section {u'size_of_data': u'0x00135e00', u'virtual_address': u'0x00001000', u'entropy': 7.98820458774965, u'name': u'.text', u'virtual_size': u'0x00135d03'} entropy 7.98820458775 description A section with a high entropy has been found
section {u'size_of_data': u'0x00023200', u'virtual_address': u'0x003ff000', u'entropy': 6.876133962478328, u'name': u'.rsrc', u'virtual_size': u'0x000230c4'} entropy 6.87613396248 description A section with a high entropy has been found
entropy 0.974920522783 description Overall entropy of this PE file is high
cmdline chcp 65001
cmdline ping 127.0.0.1
buffer Buffer with sha1: 3aea8f3fdb399505e838806cf38fdb20192ed3fd
Bkav W32.AIDetect.malware2
MicroWorld-eScan Gen:Variant.Fragtor.175196
FireEye Generic.mg.ff8b52645b3eb0b8
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
Alibaba Trojan:Win32/Strab.74ba260d
Arcabit Trojan.Fragtor.D2AC5C
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/GenCBL.DEE
Cynet Malicious (score: 100)
APEX Malicious
Kaspersky HEUR:Trojan.Win32.Strab.gen
BitDefender Gen:Variant.Fragtor.175196
Avast TrojanX-gen [Trj]
Tencent Win32.Trojan.FalseSign.Oqil
Ad-Aware Gen:Variant.Fragtor.175196
VIPRE Gen:Variant.Fragtor.175196
McAfee-GW-Edition Artemis!Trojan
Sophos Mal/Generic-S
MAX malware (ai score=82)
Kingsoft Win32.Troj.Undef.(kcloud)
Microsoft Trojan:Win32/Woreflint.A!cl
GData Gen:Variant.Fragtor.175196
McAfee Artemis!FF8B52645B3E
VBA32 BScope.TrojanDownloader.Zlob
Malwarebytes Spyware.PasswordStealer.Generic
Rising Trojan.GenCBL!8.12138 (CLOUD)
BitDefenderTheta Gen:NN.ZexaF.36106.yvX@aalQcffO
AVG TrojanX-gen [Trj]
CrowdStrike win/malicious_confidence_70% (W)