Summary | ZeroBOX

2

UPX Malicious Library AntiDebug PE File DLL OS Processor Check PE32 AntiVM
Category Machine Started Completed
FILE s1_win7_x6401 April 26, 2023, 7:41 a.m. April 26, 2023, 7:43 a.m.
Size 494.3KB
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 fca51c45c88a92f340faaca0a8e832c8
SHA256 41770017c9f44ef476ba05e44fbd19b0df70a21156ff7fa9c9b5b7f4f07a3705
CRC32 9F2AF542
ssdeep 6144:GzsetYQi0K8xwAXr/fUT7td4HCp6hInogO5cJN2W3MnBJW2WraDOhTKnOF8QAZaR:FeaIfiP3O2sK2WraDOhel0WVvKX5H5N
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library

IP Address Status Action
164.124.101.2 Active Moloch
98.137.11.163 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .gfids
resource name None
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73660000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x735e0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73561000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x734d1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73494000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73562000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73c01000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 266240
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00940000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 147456
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01db0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x732a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01dca000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01dca000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73be1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73bd1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73bb1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73961000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73921000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75bf1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x735f2000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2840
thread_handle: 0x0000013c
process_identifier: 2836
current_directory:
filepath:
track: 1
command_line: ping -n 3 yahoo.com
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 1
process_handle: 0x00000140
1 1 0
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x000001fc
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x000001fc
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x000001fc
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x00000204
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0

Process32NextW

snapshot_handle: 0x0000011c
process_name: l
process_identifier: 1947926528
0 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
cmdline ping -n 3 yahoo.com
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000f1000
process_handle: 0x0000016c
1 0 0
Process injection Process 2556 resumed a thread in remote process 2760
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000168
suspend_count: 1
process_identifier: 2760
1 0 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2764
thread_handle: 0x00000168
process_identifier: 2760
current_directory:
filepath:
track: 1
command_line: C:\Windows\SysWOW64\wermgr.exe
filepath_r:
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x0000016c
1 1 0

NtMapViewOfSection

section_handle: 0x00000174
process_identifier: 2760
commit_size: 0
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
base_address: 0x000f0000
allocation_type: 0 ()
section_offset: 0
view_size: 147456
process_handle: 0x0000016c
1 0 0

NtAllocateVirtualMemory

process_identifier: 2760
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 4 (PAGE_READWRITE)
base_address: 0x00120000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0x0000016c
1 0 0

WriteProcessMemory

buffer:
base_address: 0x00120000
process_identifier: 2760
process_handle: 0x0000016c
1 1 0

NtGetContextThread

thread_handle: 0x00000168
1 0 0

NtResumeThread

thread_handle: 0x00000168
suspend_count: 1
process_identifier: 2760
1 0 0

NtResumeThread

thread_handle: 0x00000110
suspend_count: 1
process_identifier: 2760
1 0 0

CreateProcessInternalW

thread_identifier: 2840
thread_handle: 0x0000013c
process_identifier: 2836
current_directory:
filepath:
track: 1
command_line: ping -n 3 yahoo.com
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 1
process_handle: 0x00000140
1 1 0