Summary | ZeroBOX

s.exe

Malicious Library UPX OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us April 10, 2023, 9:37 a.m. April 10, 2023, 9:44 a.m.
Size 301.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e2c2cc0564de85a2ffd91ad3b66e5f4d
SHA256 47f31d88232cae805439e6b7633ac233a20bd57295b2e4e80142f7eadc9a6992
CRC32 7A14E391
ssdeep 3072:6A/VrFaTvdDC5mEOYr0zTOc1VFHb7ZwLzN61QziB1hkf3G9zO2tlKDDsS6:5/xkDnp+XDziHhk72mDDsS
Yara
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

resource name None
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1680
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 77824
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00c4e000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1680
region_size: 36864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00330000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0