Summary | ZeroBOX

Tumeg.exe

Emotet Gen1 UPX Antivirus Malicious Library PE32 PE File CAB
Category Machine Started Completed
FILE s1_win7_x6401 July 31, 2023, 7:33 a.m. July 31, 2023, 7:39 a.m.
Size 162.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e5655066c86f74f6b444f66f3222ce07
SHA256 062de0a9fa284c56323ccaa5cf9b4a70801234b129744e1def53b29a7a86b8cd
CRC32 FB209166
ssdeep 3072:5eFRQGCIIm1xn5GWp1icKAArDZz4N9GhbkrNEk4fH7YEqZuk8Ox:CQGCIImNp0yN90QE7fUv
PDB Path wextract.pdb
Yara
  • UPX_Zero - UPX packed file
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • CAB_file_format - CAB archive file
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Emotet_RL_Gen_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: This is a malware that permanently damages your computer. Do you accept what is written on the "http://bit.ly/tusufterms" page? [Y/N]
console_handle: 0x0000000b
1 1 0
pdb_path wextract.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
resource name AVI
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2668
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73921000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2668
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73261000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceW

number_of_free_clusters: 3253047
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0

GetDiskFreeSpaceW

number_of_free_clusters: 3253047
sectors_per_cluster: 8
bytes_per_sector: 512
root_path: \
total_number_of_clusters: 8362495
1 1 0
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_DIALOG language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x00025a60 size 0x0000011c
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_STRING language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002889c size 0x00000332
name RT_VERSION language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002a84c size 0x00000418
name RT_VERSION language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x0002a84c size 0x00000418
file C:\Users\test22\AppData\Local\Temp\IXP000.TMP\Tumeg.bat
section {u'size_of_data': u'0x0001f400', u'virtual_address': u'0x0000c000', u'entropy': 6.875279349459064, u'name': u'.rsrc', u'virtual_size': u'0x00020000'} entropy 6.87527934946 description A section with a high entropy has been found
entropy 0.776397515528 description Overall entropy of this PE file is high
cmdline net session
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 reg_value rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\test22\AppData\Local\Temp\IXP000.TMP\"
Lionic Trojan.Win32.Zefaao.4!c
MicroWorld-eScan Gen:Trojan.Heur.ku0@j3zEfaaO
FireEye Gen:Trojan.Heur.ku0@j3zEfaaO
ALYac Gen:Trojan.Heur.ku0@j3zEfaaO
Sangfor Trojan.Win32.Agent.Vm25
Cybereason malicious.6c86f7
Arcabit Trojan.Heur.E0C5D6
BitDefenderTheta AI:Packer.A40A59791C
Symantec Trojan.Gen.MBT
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
APEX Malicious
BitDefender Gen:Trojan.Heur.ku0@j3zEfaaO
Emsisoft Gen:Trojan.Heur.ku0@j3zEfaaO (B)
VIPRE Gen:Trojan.Heur.ku0@j3zEfaaO
McAfee-GW-Edition BehavesLike.Win32.Dropper.ch
Sophos Generic Reputation PUA (PUA)
Avira TR/AD.BatBadJoke.wlsah
MAX malware (ai score=87)
Microsoft Trojan:Win32/Casdet!rfn
GData Gen:Trojan.Heur.ku0@j3zEfaaO
AhnLab-V3 Trojan/Win.Generic.C5462398
McAfee Artemis!E5655066C86F
Cylance unsafe
Panda Trj/Chgt.AD
Fortinet W32/PossibleThreat
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_90% (W)