Summary | ZeroBOX

Halkbank.exe

AgentTesla Emotet Generic Malware info stealer browser UPX Chrome Malicious Library Downloader Google User Data Create Service KeyLogger Internet API Socket Escalate priviledges DNS Sniff Audio AntiDebug OS Processor Check PE File AntiVM PE32
Category Machine Started Completed
FILE s1_win7_x6401 May 4, 2023, 5:54 p.m. May 4, 2023, 5:58 p.m.
Size 1.8MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 43da6da02ab057b4b4b100c727b3fc69
SHA256 6b4d0ff0d2bb85c989bd090151a64651f0520709840a0b646168166f5ad5f10a
CRC32 DEA31CB7
ssdeep 49152:LBF4fConfgEO/xmkAdTojvMwtzKCA7aPWU:1OaonfgEbujUwtz3A7aOU
PDB Path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library

IP Address Status Action
164.124.101.2 Active Moloch
178.237.33.50 Active Moloch
185.16.38.253 Active Moloch

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.101:54148 -> 164.124.101.2:53 2042936 ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain Potentially Bad Traffic
UDP 192.168.56.101:54148 -> 164.124.101.2:53 2022918 ET INFO DYNAMIC_DNS Query to *.duckdns. Domain Misc activity
TCP 192.168.56.101:49169 -> 185.16.38.253:3380 2036594 ET JA3 Hash - Remcos 3.x TLS Connection Malware Command and Control Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.101:49169
185.16.38.253:3380
None None None

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
pdb_path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .didat
resource name PNG
suspicious_features GET method with no useragent header suspicious_request GET http://geoplugin.net/json.gp
domain report1.duckdns.org
request GET http://geoplugin.net/json.gp
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2656
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72d62000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2792
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73872000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73662000
process_handle: 0xffffffff
1 0 0
description RegSvcs.exe tried to sleep 328 seconds, actually delayed analysis time by 328 seconds
file C:\eegv\suqw.pdf
file C:\eegv\vxeodm.xls
file C:\eegv\wesaswarpm.xls
file C:\eegv\pxxt.docx
file C:\eegv\gwvkihgbth.ppt
file C:\eegv\fvkctce.pdf
file C:\eegv\mvjxf.xls
file C:\eegv\jolojgkvt.pdf
file C:\eegv\hfdmlkv.xls
file C:\eegv\pcgh.docx
file C:\eegv\oqpg.docx
file C:\eegv\cqmorjr.docx
file C:\eegv\qwquwr.pdf
file C:\eegv\crupx.xls
file C:\eegv\gitpqumj.docx
file C:\eegv\dwktvnq.ppt
file C:\eegv\oked.ppt
file C:\eegv\ncvwgifaxh.pdf
file C:\eegv\eepvjjf.pif
file C:\eegv\Update-ia.c.vbe
file C:\eegv\reujc.dll
file C:\eegv\buge.exe
file C:\Users\test22\temp\nulfijae.exe
file C:\eegv\wcnortcu.exe
file C:\eegv\nulfijae.exe
file C:\eegv\kcuvdpkpmh.dll
file C:\eegv\fmdx.exe
file C:\eegv\eepvjjf.pif
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communications use DNS rule Network_DNS
description Win.Trojan.agentTesla rule Win_Trojan_agentTesla_Zero
description PWS Memory rule Generic_PWS_Memory_Zero
description Record Audio rule Sniff_Audio
description browser info stealer rule infoStealer_browser_Zero
description Google Chrome User Data Check rule Chrome_User_Data_Check_Zero
description Match Windows Inet API call rule Str_Win32_Internet_API
description Escalate priviledges rule Escalate_priviledges
description File Downloader rule Network_Downloader
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description Run a KeyLogger rule KeyLogger
buffer Buffer with sha1: 4ac9fbf738fde247afd4049ae3b4bf8a9a099cf2
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2980
region_size: 5292032
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00470000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000134
1 0 0
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate reg_value c:\eegv\eepvjjf.pif c:\eegv\buge.exe
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: ÿÿÿÿGû~(ü~Pý~€›mèÿÿ jHâý~±
base_address: 0x7efde000
process_identifier: 2980
process_handle: 0x00000134
1 1 0
Time & API Arguments Status Return Repeated

SetWindowsHookExA

thread_identifier: 0
callback_function: 0x004798a7
hook_identifier: 13 (WH_KEYBOARD_LL)
module_address: 0x00470000
1 1376629 0
Process injection Process 2908 called NtSetContextThread to modify thread in remote process 2980
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 1995571652
registers.esp: 4651544
registers.edi: 0
registers.eax: 4862714
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000128
process_identifier: 2980
1 0 0
parent_process wscript.exe martian_process "C:\eegv\eepvjjf.pif" buge.exe
parent_process wscript.exe martian_process eepvjjf.pif buge.exe
Process injection Process 2656 resumed a thread in remote process 2792
Process injection Process 2908 resumed a thread in remote process 2980
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000002c8
suspend_count: 1
process_identifier: 2792
1 0 0

NtResumeThread

thread_handle: 0x00000128
suspend_count: 1
process_identifier: 2980
1 0 0
file C:\Windows\SysWOW64\wscript.exe
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000180
suspend_count: 1
process_identifier: 2656
1 0 0

CreateProcessInternalW

thread_identifier: 2796
thread_handle: 0x000002c8
process_identifier: 2792
current_directory: C:\eegv
filepath: C:\Windows\System32\wscript.exe
track: 1
command_line: "C:\Windows\System32\wscript.exe" Update-ia.c.vbe
filepath_r: C:\Windows\System32\wscript.exe
stack_pivoted: 0
creation_flags: 67634196 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_SUSPENDED|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000002d0
1 1 0

NtResumeThread

thread_handle: 0x000002c8
suspend_count: 1
process_identifier: 2792
1 0 0

CreateProcessInternalW

thread_identifier: 2912
thread_handle: 0x0000037c
process_identifier: 2908
current_directory: C:\eegv
filepath: C:\eegv\eepvjjf.pif
track: 1
command_line: "C:\eegv\eepvjjf.pif" buge.exe
filepath_r: C:\eegv\eepvjjf.pif
stack_pivoted: 0
creation_flags: 67634192 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x00000370
1 1 0

CreateProcessInternalW

thread_identifier: 2984
thread_handle: 0x00000128
process_identifier: 2980
current_directory:
filepath: C:\Users\test22\AppData\Local\Temp\RegSvcs.exe
track: 1
command_line:
filepath_r: C:\Users\test22\AppData\Local\Temp\RegSvcs.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x00000134
1 1 0

NtGetContextThread

thread_handle: 0x00000128
1 0 0

NtAllocateVirtualMemory

process_identifier: 2980
region_size: 5292032
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00470000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000134
1 0 0

WriteProcessMemory

buffer:
base_address: 0x00470000
process_identifier: 2980
process_handle: 0x00000134
1 1 0

WriteProcessMemory

buffer: ÿÿÿÿGû~(ü~Pý~€›mèÿÿ jHâý~±
base_address: 0x7efde000
process_identifier: 2980
process_handle: 0x00000134
1 1 0

NtSetContextThread

registers.eip: 1995571652
registers.esp: 4651544
registers.edi: 0
registers.eax: 4862714
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000128
process_identifier: 2980
1 0 0

NtResumeThread

thread_handle: 0x00000128
suspend_count: 1
process_identifier: 2980
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Lisk.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.66719227
FireEye Generic.mg.43da6da02ab057b4
CAT-QuickHeal Trojan.Sabsik
McAfee Artemis!43DA6DA02AB0
Malwarebytes Delphi.Trojan.Downloader.DDS
VIPRE Trojan.GenericKD.66719227
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005a45ec1 )
Alibaba TrojanDropper:Win32/Runner.241becdf
K7GW Trojan ( 005a45ec1 )
Cybereason malicious.02ab05
Cyren W32/ABRisk.TBRO-2528
ESET-NOD32 VBS/Runner.ODN
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Kaspersky Trojan-Dropper.Win32.Sysn.dahu
BitDefender Trojan.GenericKD.66719227
NANO-Antivirus Trojan.Win32.Autoit.jtxofu
Avast Win32:Malware-gen
Tencent Win32.Trojan-Dropper.Sysn.Ckjl
Emsisoft Trojan.GenericKD.66719227 (B)
F-Secure Trojan.TR/AD.Remcos.sxywh
McAfee-GW-Edition BehavesLike.Win32.Generic.tc
Sophos Mal/Generic-S
Avira TR/AD.Remcos.sxywh
Gridinsoft Ransom.Win32.Wacatac.oa!s1
Arcabit Trojan.Generic.D3FA0DFB
ZoneAlarm Trojan-Dropper.Win32.Sysn.dahu
GData Trojan.GenericKD.66719227
Google Detected
AhnLab-V3 Malware/Win.Generic.C5420483
VBA32 Trojan.Agent
ALYac Trojan.GenericKD.66719227
MAX malware (ai score=82)
Cylance unsafe
Panda Trj/Chgt.AD
TrendMicro-HouseCall TROJ_GEN.R002H0DDS23
Rising Trojan.Generic@AI.92 (RDML:LPIK/WBVvDDWZLFKkkugyg)
Ikarus Trojan.Script
Fortinet W32/Agent.PIF!tr
AVG Win32:Malware-gen
DeepInstinct MALICIOUS