Summary | ZeroBOX

55aa5e.exe

Malicious Library UPX VMProtect PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 26, 2023, 8:10 p.m. Sept. 26, 2023, 8:14 p.m.
Size 7.0MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 50b75a2eab39366e1ff40211cf784a29
SHA256 2b152ed690b728c84af5ab78b722120a5385ee1b2938d6ed3d66d10a0ac10a7e
CRC32 635135F0
ssdeep 196608:+z0ooZ6Zy2UFUrTqsA5QMfMHUUJMVLv72RSSHIUdXJKn:+joZT52TqsA5/MHmv7y2EIn
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • VMProtect_Zero - VMProtect packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .vmp0
section .vmp1
section .vmp2
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2608
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00340000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2608
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00350000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2608
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00360000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2608
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00370000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2608
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00380000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2608
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00390000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2608
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003a0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0
cmdline "C:\Windows\System32\cmd.exe" /k shutdown -s -t 0
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /k shutdown -s -t 0
filepath: cmd
1 1 0
section {u'size_of_data': u'0x006a3800', u'virtual_address': u'0x003fb000', u'entropy': 7.972654591173986, u'name': u'.vmp2', u'virtual_size': u'0x006a3770'} entropy 7.97265459117 description A section with a high entropy has been found
entropy 0.954574176789 description Overall entropy of this PE file is high
cmdline "C:\Windows\System32\cmd.exe" /k shutdown -s -t 0
cmdline cmd /k shutdown -s -t 0
cmdline shutdown -s -t 0
section .vmp0 description Section name indicates VMProtect
section .vmp1 description Section name indicates VMProtect
section .vmp2 description Section name indicates VMProtect
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Stealer.12!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKDS.61015078
ALYac Trojan.GenericKDS.61015078
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan-Downloader ( 005790d31 )
K7GW Trojan-Downloader ( 005790d31 )
Cybereason malicious.cda56e
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/TrojanDownloader.Amadey.A
Cynet Malicious (score: 100)
APEX Malicious
Kaspersky Trojan-Spy.Win32.Stealer.etrw
BitDefender Trojan.GenericKDS.61015078
ViRobot Trojan.Win.Z.Stealer.7293440
Avast Win32:BotX-gen [Trj]
Rising Trojan.Generic@AI.100 (RDML:Q0HnaifcQC/EZBS5CjynHA)
Emsisoft Trojan.GenericKDS.61015078 (B)
F-Secure Trojan.TR/Spy.Stealer.jktuq
DrWeb Trojan.Packed2.45642
VIPRE Trojan.GenericKDS.61015078
TrendMicro Trojan.Win32.AMADEY.YXDIEZ
McAfee-GW-Edition BehavesLike.Win32.Generic.vc
Trapmine malicious.high.ml.score
FireEye Generic.mg.50b75a2eab39366e
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
GData Trojan.GenericKDS.61015078
Webroot W32.Trojan.Gen
Avira TR/Spy.Stealer.jktuq
Antiy-AVL Trojan[Downloader]/Win32.Amadey
Gridinsoft Malware.Win32.Sabsik.cc
Arcabit Trojan.GenericS.D3A30426
ZoneAlarm Trojan-Spy.Win32.Stealer.etrw
Microsoft Trojan:Win32/Sabsik.FL.B!ml
AhnLab-V3 Trojan/Win.Generic.C5378547
McAfee Artemis!50B75A2EAB39
MAX malware (ai score=87)
Cylance unsafe
Panda Trj/Chgt.AD
TrendMicro-HouseCall Trojan.Win32.AMADEY.YXDIEZ
Tencent Win32.Trojan-Spy.Stealer.Swhl
BitDefenderTheta Gen:NN.ZexaF.36662.@J0@aeermaai
AVG Win32:BotX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)