Summary | ZeroBOX

2.exe

UPX Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Dec. 23, 2022, 9:30 a.m. Dec. 23, 2022, 9:33 a.m.
Size 401.0KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 19a196e6f3b44ea54ac799f9d3b8bf4c
SHA256 01320b475214dbdfa7782958986b96dfadedbf5d27c708ab3616d3cdf1be9b34
CRC32 7F81C452
ssdeep 6144:sg7O623NOV0G4qfK09ZbuouBi2HaAOL9Y2QqYCpZij33q:st629G0LqfK09jx97ijHq
Yara
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleA

buffer: hghgsGTq
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2644
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x012e3000
process_handle: 0xffffffff
1 0 0