Summary | ZeroBOX

cleanmgr.exe

Malicious Library PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us June 13, 2023, 11:18 p.m. June 13, 2023, 11:24 p.m.
Size 243.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 45d9ba24d4ec07e09cd3c0d0c59b46b3
SHA256 64385f2a90a4309f8d627590638596f07969d75d1895c770e9f800eecbe79387
CRC32 4B64275B
ssdeep 3072:kHkpgF/c7FalTWRnOpVZMHfFvNacReTTq3:o+M/aclTW1Ojy/9N4f
PDB Path C:\xemipa\reje.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path C:\xemipa\reje.pdb
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 184
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 86016
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01b6f000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 184
region_size: 110592
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003b0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00022e00', u'virtual_address': u'0x00001000', u'entropy': 7.652835222257189, u'name': u'.text', u'virtual_size': u'0x00022dd2'} entropy 7.65283522226 description A section with a high entropy has been found
entropy 0.575257731959 description Overall entropy of this PE file is high
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Androm.4!c
tehtris Generic.Malware
MicroWorld-eScan Trojan.GenericKDZ.100429
FireEye Generic.mg.45d9ba24d4ec07e0
CAT-QuickHeal Ransom.Stop.P5
Malwarebytes Trojan.MalPack.GS
Sangfor Suspicious.Win32.Save.a
Alibaba Backdoor:Win32/Androm.56ea416e
Cybereason malicious.16fa11
Cyren W32/ABRisk.NLWQ-4868
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Kryptik.HTUC
APEX Malicious
ClamAV Win.Packer.pkr_ce1a-9980177-0
Kaspersky HEUR:Backdoor.Win32.Androm.gen
BitDefender Trojan.GenericKDZ.100429
Avast Win32:PWSX-gen [Trj]
Tencent Trojan.Win32.Obfuscated.gen
Emsisoft Trojan.GenericKDZ.100429 (B)
F-Secure Trojan.TR/Crypt.Agent.wohjt
DrWeb Trojan.PWS.Stealer.23680
VIPRE Trojan.GenericKDZ.100429
TrendMicro TROJ_GEN.R002C0DFC23
McAfee-GW-Edition BehavesLike.Win32.Lockbit.dh
Trapmine malicious.high.ml.score
Sophos Troj/Krypt-VZ
SentinelOne Static AI - Malicious PE
Webroot W32.Trojan.Gen
Avira TR/Crypt.Agent.wohjt
MAX malware (ai score=80)
Microsoft Trojan:Win32/Redline.VVI!MTB
Gridinsoft Ransom.Win32.LokiBot.bot
Arcabit Trojan.Generic.D1884D
ZoneAlarm HEUR:Backdoor.Win32.Androm.gen
GData Trojan.GenericKDZ.100429
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win.PWSX-gen.R586387
Acronis suspicious
McAfee Artemis!45D9BA24D4EC
VBA32 BScope.TrojanPSW.RedLine
Cylance unsafe
Panda Trj/GdSda.A
TrendMicro-HouseCall TROJ_GEN.R002C0DFC23
Rising Trojan.Generic@AI.90 (RDML:lMfcHhNRZalvHK7HPlRSJg)
Ikarus Win32.Outbreak
Fortinet W32/GenKryptik.ERHN!tr
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS