Summary | ZeroBOX

xme.exe

Emotet AntiDebug PE File PE32 .NET EXE AntiVM
Category Machine Started Completed
FILE s1_win7_x6403_us March 30, 2023, 4:27 p.m. March 30, 2023, 4:29 p.m.
Size 339.5KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 48efad145d5274859e353e1cf8018e45
SHA256 25ed1bbd3bf635cd03479e4ec741100f694069c0fe3654d3f2a59c8e2bf6e6fe
CRC32 B6C48A75
ssdeep 6144:Gyn8VQvv8nYJWkTdxSGmSt3d9j5nZeX6XR3ncJeOvLcjP9I/4mZPdpD:b8TEpxfm+5nZeXiR3n5fjV9krD
Yara
  • Is_DotNET_EXE - (no description)
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

IP Address Status Action
154.94.81.137 Active Moloch
164.124.101.2 Active Moloch
165.22.36.197 Active Moloch
198.177.124.57 Active Moloch
206.54.190.30 Active Moloch
208.91.197.27 Active Moloch
45.33.6.223 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49176 -> 198.177.124.57:80 2031413 ET MALWARE FormBook CnC Checkin (POST) M2 Malware Command and Control Activity Detected
TCP 192.168.56.103:49167 -> 165.22.36.197:80 2031413 ET MALWARE FormBook CnC Checkin (POST) M2 Malware Command and Control Activity Detected
TCP 192.168.56.103:49173 -> 154.94.81.137:80 2031413 ET MALWARE FormBook CnC Checkin (POST) M2 Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 165.22.36.197:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 165.22.36.197:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49169 -> 165.22.36.197:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49178 -> 198.177.124.57:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49178 -> 198.177.124.57:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49178 -> 198.177.124.57:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 154.94.81.137:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 154.94.81.137:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49175 -> 154.94.81.137:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49172 -> 208.91.197.27:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49172 -> 208.91.197.27:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49172 -> 208.91.197.27:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49165 -> 206.54.190.30:80 2031412 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49165 -> 206.54.190.30:80 2031449 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected
TCP 192.168.56.103:49165 -> 206.54.190.30:80 2031453 ET MALWARE FormBook CnC Checkin (GET) Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00816560
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x00816560
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x008164e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
suspicious_features GET method with no useragent header suspicious_request GET http://www.carcosainvest.com/lf80/?1nk=U1AfX2eZFZv2hBCTqgPkcuANZ20kgeq2vS8gtcHKe8ZJSs3Oy12xCliJ0zonbRqHTLXay59VdXyZMRRK+Tu2D9w7yrgJnaEu4iBoGU0=&2R8Y=VADnZM1Y
suspicious_features GET method with no useragent header suspicious_request GET http://www.fantasticserver.yachts/lf80/?1nk=C+NRImNoToCD7C+RudibhX2FyNhV6QDK3DTVu5TP5j9xeLMXsFNWcyV4ZKkL/2WNJNyMWiJ/EMH3DJK+HE42s4WyueexzCKRcbRLZww=&2R8Y=VADnZM1Y
suspicious_features GET method with no useragent header suspicious_request GET http://www.toplegalserves.com/lf80/?1nk=iIHSWm9EKbE4LjX243veP2lmBJalZgZwOGqRYCYa0bxTcNU/qsqdO599/0gGzMbmPKZM4KeyGlGsFSkFvsSSZkNMG60YCeVz3NJjEjs=&2R8Y=VADnZM1Y
suspicious_features GET method with no useragent header suspicious_request GET http://www.88vqq.com/lf80/?1nk=MSiiOWab7QGE4OsGqNUf0CjYIOhimWiHfwxthaTSJ8ZN7v6H0tr9Kvwqa+LjvVHLJHijakkDSyn+6AhO4AX19nbBqGYAyzw2LVFYqB4=&2R8Y=VADnZM1Y
suspicious_features GET method with no useragent header suspicious_request GET http://www.fluttering.info/lf80/?1nk=vdUvd4KMcs02oJHOqazuyWeULNYj9ziXLbdaBklN4QZLswKe18yc7gBmli0SaeLYRqNWchuZuJZKel0zJd0sN+qba2pORzREmC/Malw=&2R8Y=VADnZM1Y
request GET http://www.carcosainvest.com/lf80/?1nk=U1AfX2eZFZv2hBCTqgPkcuANZ20kgeq2vS8gtcHKe8ZJSs3Oy12xCliJ0zonbRqHTLXay59VdXyZMRRK+Tu2D9w7yrgJnaEu4iBoGU0=&2R8Y=VADnZM1Y
request GET http://www.sqlite.org/2020/sqlite-dll-win32-x86-3320000.zip
request POST http://www.fantasticserver.yachts/lf80/
request GET http://www.fantasticserver.yachts/lf80/?1nk=C+NRImNoToCD7C+RudibhX2FyNhV6QDK3DTVu5TP5j9xeLMXsFNWcyV4ZKkL/2WNJNyMWiJ/EMH3DJK+HE42s4WyueexzCKRcbRLZww=&2R8Y=VADnZM1Y
request POST http://www.toplegalserves.com/lf80/
request GET http://www.toplegalserves.com/lf80/?1nk=iIHSWm9EKbE4LjX243veP2lmBJalZgZwOGqRYCYa0bxTcNU/qsqdO599/0gGzMbmPKZM4KeyGlGsFSkFvsSSZkNMG60YCeVz3NJjEjs=&2R8Y=VADnZM1Y
request POST http://www.88vqq.com/lf80/
request GET http://www.88vqq.com/lf80/?1nk=MSiiOWab7QGE4OsGqNUf0CjYIOhimWiHfwxthaTSJ8ZN7v6H0tr9Kvwqa+LjvVHLJHijakkDSyn+6AhO4AX19nbBqGYAyzw2LVFYqB4=&2R8Y=VADnZM1Y
request POST http://www.fluttering.info/lf80/
request GET http://www.fluttering.info/lf80/?1nk=vdUvd4KMcs02oJHOqazuyWeULNYj9ziXLbdaBklN4QZLswKe18yc7gBmli0SaeLYRqNWchuZuJZKel0zJd0sN+qba2pORzREmC/Malw=&2R8Y=VADnZM1Y
request POST http://www.fantasticserver.yachts/lf80/
request POST http://www.toplegalserves.com/lf80/
request POST http://www.88vqq.com/lf80/
request POST http://www.fluttering.info/lf80/
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 156
region_size: 720896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003e0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00450000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 156
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73f61000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 156
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73f62000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 1048576
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ab0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x002b2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x002cc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003eb000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003e7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003e5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a8f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a80000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x002d6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x002da000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x002d7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x002ba000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a61000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a62000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a63000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a64000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a65000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a66000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x002ca000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 156
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00a67000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 188416
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000c1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2120
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000c130b
process_handle: 0xffffffff
3221225713 0

NtAllocateVirtualMemory

process_identifier: 2120
region_size: 3158016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x008e0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00053a00', u'virtual_address': u'0x00002000', u'entropy': 7.569758398086796, u'name': u'.text', u'virtual_size': u'0x00053855'} entropy 7.56975839809 description A section with a high entropy has been found
entropy 0.986725663717 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
url http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
url http://www.smartassembly.com/webservices/Reporting/L
url http://www.smartassembly.com/webservices/UploadReportLogin/
url http://www.smartassembly.com/webservices/Reporting/UploadReport2
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2120
region_size: 192512
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000027c
3221225496 0

NtAllocateVirtualMemory

process_identifier: 2120
region_size: 192512
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000c0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000027c
1 0 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZERèXƒè ‹ÈƒÀ<‹ÁƒÀ(ÿáÀº´ Í!¸LÍ!This program cannot be run in DOS mode. $±lÁõ}’õ}’õ}’һ͒ö}’һϒô}’һΒô}’Richõ}’PEL!Ò³Bà  Öàð@ð@.textÔÖ `
base_address: 0x000c0000
process_identifier: 2120
process_handle: 0x0000027c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x7efde008
process_identifier: 2120
process_handle: 0x0000027c
1 1 0
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: MZERèXƒè ‹ÈƒÀ<‹ÁƒÀ(ÿáÀº´ Í!¸LÍ!This program cannot be run in DOS mode. $±lÁõ}’õ}’õ}’һ͒ö}’һϒô}’һΒô}’Richõ}’PEL!Ò³Bà  Öàð@ð@.textÔÖ `
base_address: 0x000c0000
process_identifier: 2120
process_handle: 0x0000027c
1 1 0
Process injection Process 156 called NtSetContextThread to modify thread in remote process 2120
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4199136
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000278
process_identifier: 2120
1 0 0
Process injection Process 156 resumed a thread in remote process 2120
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000278
suspend_count: 1
process_identifier: 2120
1 0 0
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000000e0
suspend_count: 1
process_identifier: 156
1 0 0

NtResumeThread

thread_handle: 0x00000158
suspend_count: 1
process_identifier: 156
1 0 0

NtResumeThread

thread_handle: 0x00000194
suspend_count: 1
process_identifier: 156
1 0 0

CreateProcessInternalW

thread_identifier: 2124
thread_handle: 0x00000278
process_identifier: 2120
current_directory:
filepath: C:\Users\test22\AppData\Local\Temp\xme.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\xme.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\xme.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x0000027c
1 1 0

NtGetContextThread

thread_handle: 0x00000278
1 0 0

NtAllocateVirtualMemory

process_identifier: 2120
region_size: 192512
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000027c
3221225496 0

NtAllocateVirtualMemory

process_identifier: 2120
region_size: 192512
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000c0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000027c
1 0 0

WriteProcessMemory

buffer: MZERèXƒè ‹ÈƒÀ<‹ÁƒÀ(ÿáÀº´ Í!¸LÍ!This program cannot be run in DOS mode. $±lÁõ}’õ}’õ}’һ͒ö}’һϒô}’һΒô}’Richõ}’PEL!Ò³Bà  Öàð@ð@.textÔÖ `
base_address: 0x000c0000
process_identifier: 2120
process_handle: 0x0000027c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x000c1000
process_identifier: 2120
process_handle: 0x0000027c
1 1 0

WriteProcessMemory

buffer:
base_address: 0x7efde008
process_identifier: 2120
process_handle: 0x0000027c
1 1 0

NtSetContextThread

registers.eip: 0
registers.esp: 0
registers.edi: 0
registers.eax: 4199136
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000278
process_identifier: 2120
1 0 0

NtResumeThread

thread_handle: 0x00000278
suspend_count: 1
process_identifier: 2120
1 0 0
Bkav W32.AIDetectNet.01
Lionic Trojan.Win32.Generic.lK3K
DrWeb Trojan.PackedNET.1923
MicroWorld-eScan Gen:Variant.Barys.46763
FireEye Generic.mg.48efad145d527485
ALYac Gen:Variant.Barys.46763
Malwarebytes Trojan.Crypt.MSIL
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
Alibaba TrojanSpy:MSIL/Stealer.fe4b0dcd
Arcabit Trojan.Barys.DB6AB
BitDefenderTheta Gen:NN.ZemsilF.36344.vm0@aWEYoikG
Cyren W32/MSIL_Agent.EZO.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/Kryptik.AGWQ
Cynet Malicious (score: 100)
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan-Spy.MSIL.Stealer.gen
BitDefender Gen:Variant.Barys.46763
Avast Win32:RATX-gen [Trj]
Tencent Msil.Trojan-Spy.Stealer.Htgl
Sophos ML/PE-A
VIPRE Gen:Variant.Barys.46763
McAfee-GW-Edition BehavesLike.Win32.Generic.fc
Trapmine malicious.moderate.ml.score
Emsisoft Gen:Variant.Barys.46763 (B)
Ikarus Win32.Outbreak
Webroot W32.Trojan.MSIL.Stealer
Avira TR/AD.Swotter.ltges
Microsoft Trojan:Win32/Leonem
GData Gen:Variant.Barys.46763
Google Detected
AhnLab-V3 Trojan/Win.Zapchast.C4817909
McAfee Artemis!48EFAD145D52
MAX malware (ai score=87)
TrendMicro-HouseCall TROJ_GEN.F0D1C00CS23
Rising Malware.Obfus/MSIL@AI.86 (RDM.MSIL2:3Q5fkNH92K1XFRSX/N4oxw)
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/Kryptik.AHBB!tr
AVG Win32:RATX-gen [Trj]
Panda Trj/Chgt.AD