Summary | ZeroBOX

steamrepairnet.exe

UPX Malicious Library Malicious Packer PE64 PE File DLL OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us June 17, 2023, 6:06 p.m. June 17, 2023, 6:12 p.m.
Size 1.0MB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 77d6c227485a414fd6676dc5a006a9cf
SHA256 61c9a03a1d0603b58bfc58651c06825acdb62afc621d1ed9ef2c6b73d0da5cdf
CRC32 8677FBA9
ssdeep 24576:EPjEdvLuFy/c4Ka75kH+EXGwDLzC4lt4woWYRemb3/C:Ujo2yDKa75kH+gvzz/4w9Y3
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49165 -> 113.207.69.188:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49169 -> 14.0.113.205:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49165
113.207.69.188:443
C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 DV TLS CA 2020 CN=*.biliapi.net ce:3f:f7:0a:8d:37:1c:cb:b4:10:53:29:c8:51:cd:3b:7e:4e:5a:ed
TLS 1.2
192.168.56.103:49169
14.0.113.205:443
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 CN=*.wmpvp.com 7a:33:5f:6b:95:b3:9f:fa:cc:e0:8f:ee:6e:f9:c8:b9:1a:7e:1b:ac

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
section _RDATA
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 220
port: 0
1 0 0

listen

socket: 220
backlog: 1
1 0 0

accept

ip_address:
socket: 220
port: 0
1 228 0

bind

ip_address: 127.0.0.1
socket: 220
port: 0
1 0 0

listen

socket: 220
backlog: 1
1 0 0

accept

ip_address:
socket: 220
port: 0
1 236 0

bind

ip_address: 127.0.0.1
socket: 492
port: 0
1 0 0

listen

socket: 492
backlog: 1
1 0 0

accept

ip_address:
socket: 492
port: 0
1 496 0
suspicious_features GET method with no useragent header suspicious_request GET https://new-service.biliapi.net/picture/chatres/update/version.txt
suspicious_features GET method with no useragent header suspicious_request GET https://cdn.wmpvp.com/steamWeb/F24DCA1346594DF3B954684015A7C50F-1686833838173.pdf
request GET https://new-service.biliapi.net/picture/chatres/update/version.txt
request GET https://cdn.wmpvp.com/steamWeb/F24DCA1346594DF3B954684015A7C50F-1686833838173.pdf
name RT_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x000fffc8 size 0x000010a8
name RT_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x000fffc8 size 0x000010a8
name RT_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x000fffc8 size 0x000010a8
name RT_RCDATA language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00101070 size 0x0000db6b
name RT_GROUP_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0010ebdc size 0x00000030
name RT_VERSION language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0010ec0c size 0x0000027c
file C:\hid.dll
CrowdStrike win/grayware_confidence_60% (D)
APEX Malicious
McAfee-GW-Edition BehavesLike.Win64.Generic.th
DeepInstinct MALICIOUS
section {u'size_of_data': u'0x00010200', u'virtual_address': u'0x000ff000', u'entropy': 7.867571231363807, u'name': u'.rsrc', u'virtual_size': u'0x00010165'} entropy 7.86757123136 description A section with a high entropy has been found
Time & API Arguments Status Return Repeated

LdrGetProcedureAddress

ordinal: 0
function_address: 0x0000000000379a08
function_name: wine_get_version
module: ntdll
module_address: 0x00000000776c0000
-1073741511 0

LdrGetProcedureAddress

ordinal: 0
function_address: 0x00000000003abe38
function_name: wine_get_version
module: ntdll
module_address: 0x00000000776c0000
-1073741511 0