Summary | ZeroBOX

test12.exe

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us June 14, 2023, 9:31 a.m. June 14, 2023, 9:46 a.m.
Size 475.1KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 b0b642d21e471002fe600e813ee8a5e4
SHA256 4b42246e573c243f6d1cd35c21ef7d96f2ff9843904191557ed1ae52d531b6d5
CRC32 0E0B238F
ssdeep 12288:Ypi+uXadVjCQ0AybTTEZyI1yzL2FHO/mGXw2:YpDuXa/jCQYTTKy3LMuew
Yara
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

__exception__

stacktrace:
EbGetHandleOfExecutingProject+0x22b3 rtcPackDate-0xba9 msvbvm60+0xd0dcf @ 0x72a10dcf
rtcDoEvents+0x131 __vbaError-0x626 msvbvm60+0xce228 @ 0x72a0e228

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc000008f
exception.offset: 46887
exception.address: 0x7559b727
registers.esp: 1636328
registers.edi: 5587248
registers.eax: 1636328
registers.ebp: 1636408
registers.edx: 0
registers.ebx: 5587248
registers.esi: 5587248
registers.ecx: 2
1 0 0

__exception__

stacktrace:
gapfnScSendMessage+0x332 GetAppCompatFlags2-0x8ea user32+0x162fa @ 0x755f62fa
GetThreadDesktop+0xd7 GetWindowLongW-0x2c4 user32+0x16d3a @ 0x755f6d3a
GetClientRect+0xc5 CallWindowProcW-0xb user32+0x20d27 @ 0x75600d27
CallWindowProcA+0x1b GetClassNameA-0x95 user32+0x2794a @ 0x7560794a
test12+0x1b766 @ 0x41b766
test12+0x1ae35 @ 0x41ae35
test12+0x1b9c6 @ 0x41b9c6
IID_IVbaHost+0x236f3 UserDllMain-0x41bc4 msvbvm60+0x51d33 @ 0x72991d33
test12+0x14930 @ 0x414930
IID_IVbaHost+0x239f4 UserDllMain-0x418c3 msvbvm60+0x52034 @ 0x72992034
IID_IVbaHost+0x23e5b UserDllMain-0x4145c msvbvm60+0x5249b @ 0x7299249b
IID_IVbaHost+0x24027 UserDllMain-0x41290 msvbvm60+0x52667 @ 0x72992667
IID_IVbaHost+0x3b77 UserDllMain-0x61740 msvbvm60+0x321b7 @ 0x729721b7
IID_IVbaHost+0x386d UserDllMain-0x61a4a msvbvm60+0x31ead @ 0x72971ead
IID_IVbaHost+0x36291 UserDllMain-0x2f026 msvbvm60+0x648d1 @ 0x729a48d1
IID_IVbaHost+0x418d8 UserDllMain-0x239df msvbvm60+0x6ff18 @ 0x729aff18
BASIC_CLASS_Release+0xfcaa IID_IVbaHost-0xff3d msvbvm60+0x1e703 @ 0x7295e703
BASIC_CLASS_QueryInterface+0xeca EbLoadRunTime-0x13a4 msvbvm60+0x7b3e @ 0x72947b3e
ThunRTMain+0x3dd EbCreateContext-0x2e36 msvbvm60+0x3981 @ 0x72943981
ThunRTMain+0x156 EbCreateContext-0x30bd msvbvm60+0x36fa @ 0x729436fa
ThunRTMain+0x5c EbCreateContext-0x31b7 msvbvm60+0x3600 @ 0x72943600
test12+0x178e @ 0x40178e
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5

exception.instruction_r: 0f b7 46 14 89 55 fc 89 55 cc 89 45 c8 39 96 a0
exception.instruction: movzx eax, word ptr [esi + 0x14]
exception.exception_code: 0xc0000005
exception.symbol:
exception.address: 0x5ec4f6
registers.esp: 1635204
registers.edi: 0
registers.eax: 0
registers.ebp: 1636276
registers.edx: 0
registers.ebx: 1971191808
registers.esi: 1057177514
registers.ecx: 60162120
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1884
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 24576
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x003f0000
process_handle: 0xffffffff
1 0 0
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Defender reg_value C:\Users\test22\AppData\Local\Temp\test12.exe
Bkav W32.AIDetectMalware
tehtris Generic.Malware
MicroWorld-eScan Gen:Variant.Lazy.350119
FireEye Generic.mg.b0b642d21e471002
McAfee New Malware.d
Cylance unsafe
Sangfor Suspicious.Win32.Save.vb
CrowdStrike win/malicious_confidence_100% (W)
Arcabit Trojan.Lazy.D557A7
BitDefenderTheta Gen:NN.ZevbaF.36250.Dm3@a4O359ei
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
APEX Malicious
Cynet Malicious (score: 100)
Kaspersky VHO:Backdoor.MSIL.Crysan.gen
BitDefender Gen:Variant.Lazy.350119
Avast Win32:RATX-gen [Trj]
Sophos Mal/Trickbot-E
F-Secure Trojan.TR/Dropper.Gen
VIPRE Gen:Variant.Lazy.350119
TrendMicro Ransom_HPCERBER.SMJ
McAfee-GW-Edition New Malware.d
Trapmine suspicious.low.ml.score
Emsisoft Gen:Variant.Lazy.350119 (B)
Avira TR/Dropper.Gen
ZoneAlarm VHO:Backdoor.MSIL.Crysan.gen
GData Gen:Variant.Lazy.350119
Google Detected
MAX malware (ai score=82)
Malwarebytes Malware.AI.3281245526
TrendMicro-HouseCall Ransom_HPCERBER.SMJ
SentinelOne Static AI - Malicious PE
Fortinet W32/Injector.DBRX!tr
AVG Win32:RATX-gen [Trj]
Cybereason malicious.e7bb20
DeepInstinct MALICIOUS