Summary | ZeroBOX

s.exe

Malicious Library UPX OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 10, 2023, 8 a.m. July 10, 2023, 8:02 a.m.
Size 239.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 dbf483bb273e267839e60bc5e78dd4e6
SHA256 4d4a7d70454600abb9b1093fb0152b73c450d81b7cf0f257c153b73b1ef66646
CRC32 367D8A75
ssdeep 3072:zp3QQB9gL/QwN9Y9jYVHU24egmWZMYtL+Hyol1k:eZ/Q8rV0NyW5UV
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

resource name None
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2580
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 77824
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x002bc000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2580
region_size: 36864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00690000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00013400', u'virtual_address': u'0x0001b000', u'entropy': 7.873783129975506, u'name': u'.data', u'virtual_size': u'0x00028efc'} entropy 7.87378312998 description A section with a high entropy has been found
entropy 0.323529411765 description Overall entropy of this PE file is high