Summary | ZeroBOX

s.exe

Malicious Library UPX OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 June 13, 2023, 8:28 a.m. June 13, 2023, 8:33 a.m.
Size 241.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7d726c8be35f9e9f010363c050ee86b3
SHA256 b2c3517bb90933390df4eb01c6ba36f2a519a69b5bcee703f4889b8336cb7027
CRC32 8780E391
ssdeep 3072:O98WPLTgdxkBH8ZQYTr6DQ6v+UT4i0JKIMuFes7P:XWzcdxkFhCwQC8bMuF
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 73728
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0053c000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2544
region_size: 36864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00013600', u'virtual_address': u'0x00015000', u'entropy': 7.791371137280521, u'name': u'.data', u'virtual_size': u'0x00087298'} entropy 7.79137113728 description A section with a high entropy has been found
entropy 0.322245322245 description Overall entropy of this PE file is high