Summary | ZeroBOX

angi.exe

Gen1 Generic Malware Malicious Library Antivirus UPX PE64 OS Processor Check PE32 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 24, 2023, 7:41 a.m. Oct. 24, 2023, 7:50 a.m.
Size 1.3MB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 f281b31a99932f0d6c1fa3dd0649a36a
SHA256 29d9f955b553825fb23351f9daa7d4d0647153073e0d1465f24e674d6378ba06
CRC32 273D47D0
ssdeep 24576:t2dY5PVbHkHp3o6IoiEb7orLa9aCAQgaHEddMVmzut7BTF77l//ugU:dPVIo6iE/8LaoCAQgaHUMVmzutdRHNW
PDB Path F:\sDll_launch\x64\Release\sDll_launch.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • Antivirus - Contains references to security software
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • OS_Processor_Check_Zero - OS Processor Check
  • Generic_Malware_Zero - Generic Malware

Name Response Post-Analysis Lookup
bluesaks.fun 104.21.34.166
IP Address Status Action
164.124.101.2 Active Moloch
172.67.163.21 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49167 -> 172.67.163.21:80 2048093 ET MALWARE [ANY.RUN] Win32/Lumma Stealer Check-In Malware Command and Control Activity Detected
TCP 192.168.56.103:49171 -> 172.67.163.21:80 2048094 ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration Malware Command and Control Activity Detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
pdb_path F:\sDll_launch\x64\Release\sDll_launch.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section text
section data
suspicious_features POST method with no referer header suspicious_request POST http://bluesaks.fun/api
request POST http://bluesaks.fun/api
request POST http://bluesaks.fun/api
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7440b000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74380000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74351000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74021000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73fd1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73fb1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75931000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76e01000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x752e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76971000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x758f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73f81000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73f71000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73f31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2160
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73ee1000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Web Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENT
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
file C:\Users\test22\AppData\Local\Temp\acbffdecbe.sys
section {u'size_of_data': u'0x00144800', u'virtual_address': u'0x00001000', u'entropy': 7.3106874756121485, u'name': u'.text', u'virtual_size': u'0x00144770'} entropy 7.31068747561 description A section with a high entropy has been found
entropy 0.944343397599 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x0000032c
process_name: sppsvc.exe
process_identifier: 2508
0 0

Process32NextW

snapshot_handle: 0x00000304
process_name: sppsvc.exe
process_identifier: 2508
0 0

Process32NextW

snapshot_handle: 0x0000032c
process_name: sppsvc.exe
process_identifier: 2508
0 0

Process32NextW

snapshot_handle: 0x00000304
process_name: sppsvc.exe
process_identifier: 2508
0 0

Process32NextW

snapshot_handle: 0x0000032c
process_name: sppsvc.exe
process_identifier: 2508
0 0

Process32NextW

snapshot_handle: 0x000003c8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003a8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003c8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003a8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003c8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003c8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003c8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003a8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003a8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003a8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003c8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003a8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003c8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003a8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003c8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003c8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003c8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003a8
process_name: pw.exe
process_identifier: 2916
0 0

Process32NextW

snapshot_handle: 0x000003cc
process_name: pw.exe
process_identifier: 2916
0 0
file C:\Users\test22\AppData\Roaming\Bitcoin\wallets
file C:\Users\test22\AppData\Roaming\Electrum\wallets
file C:\Users\test22\AppData\Roaming\Exodus\exodus.wallet
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Injuke.16!c
Elastic malicious (moderate confidence)
MicroWorld-eScan Trojan.GenericKD.69959381
Skyhigh BehavesLike.Win64.Generic.tc
ALYac Trojan.GenericKD.69959381
Cybereason malicious.26f84d
Arcabit Trojan.Generic.D42B7ED5
Symantec Trojan.Gen.2
ESET-NOD32 a variant of Generik.EOSWKLX
Kaspersky Trojan.Win32.Injuke.iqoo
BitDefender Trojan.GenericKD.69959381
Avast Win64:DropperX-gen [Drp]
Tencent Win32.Trojan.Injuke.Ltgl
Emsisoft Trojan.GenericKD.69959381 (B)
VIPRE Trojan.GenericKD.69959381
TrendMicro TrojanSpy.Win64.LUMMASTEALER.YXDJVZ
FireEye Trojan.GenericKD.69959381
Sophos Mal/Generic-S
Webroot W32.Trojan.GenKD
Google Detected
MAX malware (ai score=87)
Antiy-AVL Trojan/Script.Phonzy
Gridinsoft Trojan.Win64.Generic.ca
Microsoft Trojan:Win32/Casdet!rfn
ZoneAlarm Trojan.Win32.Injuke.iqoo
GData Trojan.GenericKD.69959381
Varist W64/ABRisk.DYXR-4879
McAfee Artemis!F281B31A9993
Cylance unsafe
Panda Trj/Chgt.AD
TrendMicro-HouseCall TrojanSpy.Win64.LUMMASTEALER.YXDJVZ
Rising Trojan.Undefined!8.1327C (CLOUD)
Ikarus Trojan.SuspectCRC
Fortinet PossibleThreat.MU
AVG Win64:DropperX-gen [Drp]
DeepInstinct MALICIOUS