Summary | ZeroBOX

ox.exe

Malicious Library UPX OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 March 27, 2023, 10:20 a.m. March 27, 2023, 10:27 a.m.
Size 302.1KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 7b9742c442c28ca29907a0ffcaca47fa
SHA256 6d615929475897b42f7bbc9ae8a5fdc591a15a08ab4696dbabb3ff912fb5cbf9
CRC32 EDE0EE36
ssdeep 6144:/DB9/8sAqMQ107vvjmokAxGnHZIkIx1P7:bB9/8JE1OvCixGnm
Yara
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

__exception__

stacktrace:
ox+0x944e @ 0x40944e
ox+0xc459 @ 0x40c459
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x755c33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x0
registers.esp: 1635960
registers.edi: 156237926
registers.eax: 4404
registers.ebp: 1638144
registers.edx: 262144
registers.ebx: 4294955071
registers.esi: 4138718240
registers.ecx: 4404
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00448000
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x0002e800', u'virtual_address': u'0x0001c000', u'entropy': 7.434132038334633, u'name': u'.data', u'virtual_size': u'0x0002f29c'} entropy 7.43413203833 description A section with a high entropy has been found
entropy 0.63807890223 description Overall entropy of this PE file is high
Lionic Trojan.Win32.Evader.4!c
Elastic malicious (high confidence)
DrWeb Trojan.PWS.Siggen3.28829
MicroWorld-eScan Gen:Variant.Zusy.455268
ALYac Gen:Variant.Jaik.132324
Sangfor Trojan.Win32.Agent.Adh9
Arcabit Trojan.Jaik.D204E4
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Kryptik.HSYN
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan.Win32.Evader.gen
BitDefender Gen:Variant.Zusy.455268
Avast Win32:CrypterX-gen [Trj]
VIPRE Gen:Variant.Jaik.132324
McAfee-GW-Edition Artemis!Trojan
Trapmine malicious.high.ml.score
FireEye Generic.mg.7b9742c442c28ca2
Emsisoft Gen:Variant.Jaik.132324 (B)
Webroot W32.Trojan.Gen
MAX malware (ai score=85)
Microsoft Trojan:Win32/Sabsik.FL.B!ml
GData Win32.Trojan.PSE.21EV88
Google Detected
McAfee Artemis!7B9742C442C2
Cylance unsafe
Rising Trojan.Kryptik!8.8 (TFE:5:GoYKachOE1N)
Ikarus Trojan.Win32.Crypt
AVG Win32:CrypterX-gen [Trj]