Summary | ZeroBOX

s2s.exe

Discord Keylogger UPX Downloader Admin Tool (Sysinternals etc ...) Malicious Library PE32 PE File OS Processor Check MZP Format
Category Machine Started Completed
FILE s1_win7_x6401 April 16, 2023, 4:14 p.m. April 16, 2023, 4:33 p.m.
Size 5.4MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 19b50e116e3708c663672d9c6e5a02f7
SHA256 a9b3a6990f77252738e89a4880dba0f331cb151c0dfda1ddd0d5002aa907479e
CRC32 595816F0
ssdeep 98304:S7B3hoDTBYPaLo4HgOeBdLEIkIT4p2yESDVGo6BImDQxeuEq:S7JC3AGHgOebIIJT4p2yhDVOymDCE
Yara
  • mzp_file_format - MZP(Delphi) file format
  • UPX_Zero - UPX packed file
  • Malicious_Library_Zero - Malicious_Library
  • OS_Processor_Check_Zero - OS Processor Check
  • Network_Downloader - File Downloader
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • Keylogger_Discord - Suspicious keylogging script

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
176.113.115.21 Active Moloch
86.197.207.96 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

CryptGenKey

crypto_handle: 0x0105ea88
algorithm_identifier: 0x00000001 ()
flags: 67108865
key:
provider_handle: 0x01047300
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 7
1 1 0

CryptExportKey

buffer: ¤RSA2ñjÌP8ÄÊOîGå·©¥¸Þ”J€õ4ì³[tÙÜ>À¯U᎟ç­Ì+˜Š\OþBrAÜþÌBD ЏT­džâ‚Û‘°Íu²é²c ìýe @šE*2ƒ‘ÿ'‰ñ­ÛeïSÃõlÀUµ§¨ÝǏ5r~I÷ë¡»c}7Âv•a³Úh¬Ç¬ÀÏó]4}Û§Nnó}…€NKÉÃNxW@C®¨pžB£š–ÝðÒë l܋µúX¤ W;ö:ž‚ÄåíıbG nèË,òxùÀå¶$×c6Äcb•ÑÏ´¢ÌFD nR5Ögœ;âWÒ4Ù¡Åá¥dÌäjªØ-seÈ[Û ÕF"\‚B[¼å¶¯•€ÖVÅ‹UvXþZ’«²nÝ£pøŽy´p°Hnö2ù0T°˜Ðy†Åè㬍üÃ`hAý•@§«•ýˆÎqÅÒ -hÓ×å/ȉYæâý‘U©ê¸¼æ…9öÛ®R/ÁŒè?6vw °Ç^Ô ¯(@„+';®¶²Žc <úéúˆ{pø™Ôùj‚!Å6¢vàwGMÒ•W£aÄ$8õ;vp'‹#Ì)¤zó^ë“\à4QìM í>¿-§¿÷³In7X81f£6ÈkmOõ5ž¥aïѝ}_xfÍòêNô *®˜'dH»K£ ¶ÝyämŒËýӂØ™‚jßJP6Œ^ŒÜ)N6ÎÒÿ½pb!rÛõ-£å4UÆ†—]®˜é#
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 7
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: ¤RSA1ñjÌP8ÄÊOîGå·©¥¸Þ”J€õ4ì³[tÙÜ>À¯U᎟ç­Ì+˜Š\OþBrAÜþÌBD ЏT­džâ‚Û‘°Íu²é²c ìýe @šE*2ƒ‘ÿ'‰ñ­ÛeïSÃõlÀUµ§¨ÝǏ5r~I÷ë¡»c}7ÂvÂ
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptGenKey

crypto_handle: 0x0105eac8
algorithm_identifier: 0x00006610 ()
flags: 1
key: f $]T›Ž1¦wU»ÛõÇ®û®Ñ$Ì'B°çC”ßiy'-
provider_handle: 0x01047388
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105eac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptExportKey

buffer: f $]T›Ž1¦wU»ÛõÇ®û®Ñ$Ì'B°çC”ßiy'-
crypto_handle: 0x0105eac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptGenKey

crypto_handle: 0x0105eb08
algorithm_identifier: 0x00006610 ()
flags: 1
key: f U(:¬W „LÁMÁ{yÌó ËÖþ^¹‚Qf¼‚Y
provider_handle: 0x01047388
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105eb08
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptExportKey

buffer: f U(:¬W „LÁMÁ{yÌó ËÖþ^¹‚Qf¼‚Y
crypto_handle: 0x0105eb08
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptGenKey

crypto_handle: 0x0105ea88
algorithm_identifier: 0x00000001 ()
flags: 67108865
key:
provider_handle: 0x01047410
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 7
1 1 0

CryptExportKey

buffer: ¤RSA2iÁº-ל³i€.½xR“qâ=ÆÈkÓ ºËT+ªÉ®€1M4Ùõ§ÕhÝNëÚ{9û‰Šß…-Ÿßü 2w Ëj$/b^w)ýÉÒí2¯Þpyvõ“€ áößúz]ãAßb!€‹“h|µ·Ïo9ÕˆÎnDë1Á#;÷[îÄÿ2ö(ªn‹`f±´£šal~x5Ÿ€ô¹â‰Õ³ÃfãïEŽ?áÇ48ËN˜Z¬%©~;µ¤ø`ø6e¨óð—ÜEëé¨:ißµ&w‡ïàE$ùÙβ%úÁO—ÀXÚ¿öƒ °W1¢ ªÀµã#èú!äpC9y¾%Êå:Ñ?M]ä $,8[vA½[~Ó¶ðˆb“;Ên´jþ 3y1<3ûí½Ôýù‰íóQF±_|¶j/ÓÚÕBCßy>¯¡ü;Œ\þ=óýøu†ý°üÙ¨J ‚ÓËò ÍÛ>¿+"kÂA$ÁÒgëÄnÜ7-¤Övþd¶HøúöE†û<˜@üŠâÓå MìÒ8æ•#Õë%¿T …¯Jxœ¢?<ˆ­¸WêÄ­Â÷Ø”Ã]×}óÙ &„±õñ ÿ Ož¨›)Dš¦Ms¸“7†vEªN& Ùà½r@Ý9*n<fV—z•ó£Eyú J>öžã·»ØKNµ –Âõ€vŽ[šŒÔÌ`€Qï^–Œ`ÿ ´µ©™Xç°ê‰"ìÖApðšNcþ‡Þ}ì°2R;htz»_ŽÈ=
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 7
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: ¤RSA1iÁº-ל³i€.½xR“qâ=ÆÈkÓ ºËT+ªÉ®€1M4Ùõ§ÕhÝNëÚ{9û‰Šß…-Ÿßü 2w Ëj$/b^w)ýÉÒí2¯Þpyvõ“€ áößúz]ãAßb!€‹“h|µ·Ïo9ÕˆÎnDë1Á#;÷[îÄ
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptGenKey

crypto_handle: 0x0105eac8
algorithm_identifier: 0x00006610 ()
flags: 1
key: f ú¿½J×y·_̝Ãòú'_CØךkÏâüi°Àbv
provider_handle: 0x01047498
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105eac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptExportKey

buffer: f ú¿½J×y·_̝Ãòú'_CØךkÏâüi°Àbv
crypto_handle: 0x0105eac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptGenKey

crypto_handle: 0x0105eb08
algorithm_identifier: 0x00006610 ()
flags: 1
key: f ƒìyDlQ<â~üYvtO¼ø¸²>ú¹R¡ñ
provider_handle: 0x01047498
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105eb08
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptExportKey

buffer: f ƒìyDlQ<â~üYvtO¼ø¸²>ú¹R¡ñ
crypto_handle: 0x0105eb08
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptGenKey

crypto_handle: 0x0105ea88
algorithm_identifier: 0x00000001 ()
flags: 67108865
key:
provider_handle: 0x01047520
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 7
1 1 0

CryptExportKey

buffer: ¤RSA2iȾšj8¹JfvîÒÞmåárQåûÉå£ÎÓRa÷!½|t’cfmW©::F—êÊ%Þhc 1„ßñÅ’q›;¹þf>ď§Ð6öpF›qº[U’Ã"°5A¼N÷õ©6Ïs]cyNY/€B`BåÕ~×y>£†‰IÄG ¤O`ÕÍO;ÉôœL®~ŒNK`ºÞ>Ë¥t+&ª¨ärûRŠÉc§) _úÝ¥|ñ²ßwpºñяÅ~‹ð 9ˆ†É¹Šø ÎÆdÿÜ0$¦UøB£E±*·½§q“è9¾ lˆ“qy Ÿtœï· ϘWŽÐÓµiGW„Ú_ÐKYœü1rÇÛ]ðy|Mƒ²(TîþÀü#«O8ï©À•ÅD‘@Òp35/M`Œ0 !Ï.­ãÐbÎn•¨*ò<ñXe(?™µ]?˜kS{‘?úÜßÚ`9Ï. tH¬lŠ¾‡€ê€ðîo¤”·3ÒÕ¹X¯¯”1À$™½î'Ú ºDº“Ç1ñ3²Ç-Û¿j\»€òŋävK&—ì3Käv•N2iߪ˜í»³¢ß’È<(\>.XKû`\Ãd±kælv’lt PK–@ü2Ö±)ÊGyJn`s úT»¢ a²½ÈÙ£eÓç–Ìñ±ßÒ/8Ã*IôW n4´?]”:WoìÖàO\—NJGÛ´Ë”§¤0ˆÕŸˆÙ’<oÝ8­wԚ êyp” rAQÞåaßLˆ
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 7
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: ¤RSA1iȾšj8¹JfvîÒÞmåárQåûÉå£ÎÓRa÷!½|t’cfmW©::F—êÊ%Þhc 1„ßñÅ’q›;¹þf>ď§Ð6öpF›qº[U’Ã"°5A¼N÷õ©6Ïs]cyNY/€B`BåÕ~×y>£†‰IÄG ¤O`Õ
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptGenKey

crypto_handle: 0x0105eac8
algorithm_identifier: 0x00006610 ()
flags: 1
key: f 2k߆‹I´ä}¼ç MIM‚ùüô@óú"TK´¼$ô0
provider_handle: 0x010475a8
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105eac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptExportKey

buffer: f 2k߆‹I´ä}¼ç MIM‚ùüô@óú"TK´¼$ô0
crypto_handle: 0x0105eac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptGenKey

crypto_handle: 0x0105eb08
algorithm_identifier: 0x00006610 ()
flags: 1
key: f Ž¡s…yžáÚÍ ©áÝAQŒIS"‘_D•|w®¿7
provider_handle: 0x010475a8
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105eb08
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptExportKey

buffer: f Ž¡s…yžáÚÍ ©áÝAQŒIS"‘_D•|w®¿7
crypto_handle: 0x0105eb08
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptGenKey

crypto_handle: 0x0105ea88
algorithm_identifier: 0x00000001 ()
flags: 67108865
key:
provider_handle: 0x010475a8
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 7
1 1 0

CryptExportKey

buffer: ¤RSA29A‰¶rmªJÆoõ£]Ä6>êÐM3øÂû›¼‹C4_ãßáàÉSÀ?ì6¹+0[D†ÊÖy⠞ƒ™oék^š,ÊqœÅo‚ʯ…ép㢁EÔh™µ†ñ=C pÎ"—»hnÝ0KçP*Ж7W½$ mk”Ó-‘û›€-4ªºRºÀ/:Kp¸xŽ×+ÉÒt¿¢3PŒ]̾KþhrŽð€sJ1œð`Wxâñþú°¯:,ü½\}I†¢( [Ö¡gKQ±Ìn°ê[iL‘“¡È%g%•UQ?R+Ù÷ L ¶ÔÂ1?dm,È¡HyÊÖ Æµ¶× ö©R®QUXœi<™p™žÇՋñp?ù45í3-Çסáv~T‚Ü`׍- š€œsÇëíOŠÑÎWtî¢m”êdP„¼¢¢Öâ¶d× ˆºfì®Q×àH$nc¬·—BS¡rßPj[£®mÆU3ƒeYøKCvÞŒ<áE*›8cfQOåßI¹ýý“ävárc ØïbË¢lt\Ódéú˸¨§(_‹ïNÿí¾a³ÈB5,À :Ø ðԃ²GD=]b‡U‹GØYB'õÐúá» Ó¯ÕIŽ‡iŸS猲Y¢`‚Aî‘ J¼ 72T©ñ=N¨ †Ó½ÓËÊôÊ`6kª^KÓî ÓÈèÉ@/‘5wˆ0# Ø££$suß|âUh
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 7
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: ¤RSA19A‰¶rmªJÆoõ£]Ä6>êÐM3øÂû›¼‹C4_ãßáàÉSÀ?ì6¹+0[D†ÊÖy⠞ƒ™oék^š,ÊqœÅo‚ʯ…ép㢁EÔh™µ†ñ=C pÎ"—»hnÝ0KçP*Ж7W½$ mk”Ó
crypto_handle: 0x0105ea88
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptGenKey

crypto_handle: 0x0105eac8
algorithm_identifier: 0x00006610 ()
flags: 1
key: f KÒGòq«þYUÇ£=ƒ†Ï “©³¢*e ˆ}3}ò yà
provider_handle: 0x01047520
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105eac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptExportKey

buffer: f KÒGòq«þYUÇ£=ƒ†Ï “©³¢*e ˆ}3}ò yà
crypto_handle: 0x0105eac8
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptGenKey

crypto_handle: 0x0105eb08
algorithm_identifier: 0x00006610 ()
flags: 1
key: f èÀ›Ÿ:díÔHqˆ!T¨±ÑŠú¼ƒ¹NM31/
provider_handle: 0x01047520
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0105eb08
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0

CryptExportKey

buffer: f èÀ›Ÿ:díÔHqˆ!T¨±ÑŠú¼ƒ¹NM31/
crypto_handle: 0x0105eb08
flags: 0
crypto_export_handle: 0x00000000
blob_type: 8
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Cryptography\MachineGuid
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\InstallDate
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section CODE
section DATA
section BSS
resource name AG
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlUlonglongByteSwap+0x7a9 RtlFreeOemString-0x21131 ntdll+0x7db99 @ 0x76f8db99
EtwGetTraceEnableFlags+0x605 RtlEqualString-0x9e ntdll+0x61d2e @ 0x76f71d2e
RtlDecodePointer+0xf7 LdrInitializeThunk-0x1d ntdll+0x39e2c @ 0x76f49e2c
LdrInitializeThunk+0x10 RtlInitializeExceptionChain-0x16 ntdll+0x39e59 @ 0x76f49e59

exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xc7ada0aa
registers.esp: 136969148
registers.edi: 11610120
registers.eax: 0
registers.ebp: 136969176
registers.edx: 1996562560
registers.ebx: 3350044842
registers.esi: 136969164
registers.ecx: 17
1 0 0

__exception__

stacktrace:
RtlUlonglongByteSwap+0x7a9 RtlFreeOemString-0x21131 ntdll+0x7db99 @ 0x76f8db99
EtwGetTraceEnableFlags+0x605 RtlEqualString-0x9e ntdll+0x61d2e @ 0x76f71d2e
RtlDecodePointer+0xf7 LdrInitializeThunk-0x1d ntdll+0x39e2c @ 0x76f49e2c
LdrInitializeThunk+0x10 RtlInitializeExceptionChain-0x16 ntdll+0x39e59 @ 0x76f49e59

exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xc7ada0aa
registers.esp: 139328444
registers.edi: 11610120
registers.eax: 0
registers.ebp: 139328472
registers.edx: 1996562560
registers.ebx: 3350044842
registers.esi: 139328460
registers.ecx: 17
1 0 0

__exception__

stacktrace:
RtlUlonglongByteSwap+0x7a9 RtlFreeOemString-0x21131 ntdll+0x7db99 @ 0x76f8db99
EtwGetTraceEnableFlags+0x605 RtlEqualString-0x9e ntdll+0x61d2e @ 0x76f71d2e
RtlDecodePointer+0xf7 LdrInitializeThunk-0x1d ntdll+0x39e2c @ 0x76f49e2c
LdrInitializeThunk+0x10 RtlInitializeExceptionChain-0x16 ntdll+0x39e59 @ 0x76f49e59

exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xc7ada0aa
registers.esp: 142474172
registers.edi: 11610120
registers.eax: 0
registers.ebp: 142474200
registers.edx: 1996562560
registers.ebx: 3350044842
registers.esi: 142474188
registers.ecx: 17
1 0 0

__exception__

stacktrace:
RtlUlonglongByteSwap+0x7a9 RtlFreeOemString-0x21131 ntdll+0x7db99 @ 0x76f8db99
RtlValidRelativeSecurityDescriptor+0x23d DbgPrintEx-0x123 ntdll+0x759d0 @ 0x76f859d0
RtlExitUserProcess+0x74 LdrShutdownProcess-0x1d ntdll+0x58e5c @ 0x76f68e5c
ExitProcess+0x15 TerminateThread-0xa kernel32+0x17a25 @ 0x755c7a25
0x7c7e66e
s2s+0x4231b7 @ 0x8231b7
s2s+0x43f020 @ 0x83f020
s2s+0x43f31e @ 0x83f31e

exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0xc7ada0aa
registers.esp: 1631064
registers.edi: 11610120
registers.eax: 0
registers.ebp: 1631092
registers.edx: 1996562560
registers.ebx: 3350044842
registers.esi: 1631080
registers.ecx: 17
1 0 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00370000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73662000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4698112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03790000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4698112
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03c10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4599808
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04790000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4612096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f40000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 11743232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x073c0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76f2f000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08010000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x07e71000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08670000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x755c7000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08670000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x080ce000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08144000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08680000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75857000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08680000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x080ce000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08144000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08690000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75899000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08690000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x080ce000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08144000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2560
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08c00000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x736f2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08c00000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x080cf000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2560
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x08144000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2676
region_size: 11743232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02c90000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73921000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73281000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73261000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73251000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75bf1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75d41000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75e61000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76161000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c81000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x764b1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c51000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c01000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72b41000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72b21000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72a21000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x729e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x729b1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2676
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74181000
process_handle: 0xffffffff
1 0 0
description rundll32.exe tried to sleep 942 seconds, actually delayed analysis time by 942 seconds
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: 111111111111111
parameters:
filepath: 111111111111111
0 0
section {u'size_of_data': u'0x00480800', u'virtual_address': u'0x000e1000', u'entropy': 7.943917247183398, u'name': u'.rsrc', u'virtual_size': u'0x00480800'} entropy 7.94391724718 description A section with a high entropy has been found
entropy 0.839861541264 description Overall entropy of this PE file is high
process rundll32.exe
host 176.113.115.21
host 86.197.207.96
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString
dead_host 86.197.207.96:443
Lionic Trojan.Win32.Tedy.4!c
MicroWorld-eScan Gen:Variant.Tedy.340565
ALYac Gen:Variant.Tedy.340565
VIPRE Gen:Variant.Tedy.340565
Sangfor Trojan.Win32.Save.a
Arcabit Trojan.Tedy.D53255
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Generik.PNAWNO
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Agentb.gen
BitDefender Gen:Variant.Tedy.340565
Emsisoft Gen:Variant.Tedy.340565 (B)
F-Secure Trojan.TR/AD.Nekark.bcmwk
DrWeb Trojan.PWS.DanaBot.460
McAfee-GW-Edition BehavesLike.Win32.ObfuscatedPoly.tc
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.19b50e116e3708c6
Sophos Mal/Generic-S
SentinelOne Static AI - Suspicious PE
Avira TR/AD.Nekark.bcmwk
MAX malware (ai score=83)
Antiy-AVL Trojan/Script.Phonzy
Gridinsoft Trojan.Win32.Agent.cl
Microsoft Trojan:Win32/Woreflint.A!cl
ZoneAlarm HEUR:Trojan.Win32.Agentb.gen
GData Gen:Variant.Tedy.340565
Google Detected
AhnLab-V3 Trojan/Win.Agent.C5224738
McAfee Artemis!19B50E116E37
DeepInstinct MALICIOUS
Cylance unsafe
TrendMicro-HouseCall TROJ_GEN.R002H0CDE23
Rising Trojan.Generic@AI.88 (RDML:lB6N3EMmvvuXSZ1UKmHX2g)
Ikarus Trojan.SuspectCRC
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/PossibleThreat
BitDefenderTheta Gen:NN.ZelphiCO.36132.@JW@aq8xFypi
AVG Win32:PWSX-gen [Trj]
Avast Win32:PWSX-gen [Trj]