Summary | ZeroBOX

1.exe

UPX OS Processor Check PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us March 13, 2023, 9:48 a.m. March 13, 2023, 9:51 a.m.
Size 185.5KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 ef57f8d8a632b8cf2b89021e2a7be68e
SHA256 504eeed5061605b464f6dd44aa72d78efaed7d8ec0704d6db6595c977b7dd68a
CRC32 89CFE514
ssdeep 3072:Lm1ReRExqa3HodDUMTW3FCh3tnigcQnbMbAvmppijpV:kReREl34DhqoJigcpbUpV
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
103.114.163.134 Active Moloch
101.43.108.14 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeTcbPrivilege
1 1 0
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x00000000000001e8
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x00000000000001ec
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x00000000000001f0
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x00000000000001f4
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x00000000000001f8
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x00000000000001fc
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x0000000000000200
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x0000000000000204
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x0000000000000208
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x000000000000020c
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x0000000000000210
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x0000000000000214
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x0000000000000218
process_name: conhost.exe
process_identifier: 2104
0 0

Process32NextW

snapshot_handle: 0x000000000000021c
process_name: conhost.exe
process_identifier: 2104
0 0
host 103.114.163.134
host 101.43.108.14
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.65888220
FireEye Generic.mg.ef57f8d8a632b8cf
Malwarebytes Generic.Malware/Suspicious
Sangfor Trojan.Win32.Agent.Vhcy
CrowdStrike win/malicious_confidence_90% (W)
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Generik.ECRJPKD
APEX Malicious
Cynet Malicious (score: 100)
BitDefender Trojan.GenericKD.65888220
Avast Win64:DropperX-gen [Drp]
Rising Trojan.Undefined!8.1327C (CLOUD)
Emsisoft Trojan.GenericKD.65888220 (B)
DrWeb Trojan.ClipSpy.83
McAfee-GW-Edition BehavesLike.Win64.NetLoader.ch
MAX malware (ai score=82)
Microsoft Trojan:Script/Wacatac.H!ml
Arcabit Trojan.Generic.D3ED5FDC
GData Trojan.GenericKD.65888220
McAfee Artemis!EF57F8D8A632
Cylance unsafe
Fortinet W32/PossibleThreat
AVG Win64:DropperX-gen [Drp]