Summary | ZeroBOX

123.exe

Malicious Library UPX PE32 PE File DLL OS Processor Check MZP Format JPEG Format
Category Machine Started Completed
FILE s1_win7_x6401 Nov. 29, 2023, 2:21 p.m. Nov. 29, 2023, 2:30 p.m.
Size 962.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 5ab89a96be7570dfe4f49e6b9a42bc88
SHA256 85789e8cfddea18201a13e3c953229ed1b03db7455208a398bb2268a39258354
CRC32 F4AA9CCC
ssdeep 24576:/nsJ39LyjbJkQFMhmC+6GD9GG6VasP7bgY+yP:/nsHyjtk2MYC5GD9A77
Yara
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • UPX_Zero - UPX packed file
  • mzp_file_format - MZP(Delphi) file format
  • OS_Processor_Check_Zero - OS Processor Check

IP Address Status Action
142.251.220.14 Active Moloch
162.125.84.18 Active Moloch
164.124.101.2 Active Moloch
45.125.57.96 Active Moloch
69.42.215.252 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0
section CODE
section DATA
section BSS
packer BobSoft Mini Delphi -> BoB / BobSoft
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
synaptics+0x7bda4 @ 0x47bda4
synaptics+0x7bcf2 @ 0x47bcf2
synaptics+0x7bcb3 @ 0x47bcb3
synaptics+0x845fd @ 0x4845fd
synaptics+0x959fc @ 0x4959fc
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x755c33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xeedfade
exception.offset: 46887
exception.address: 0x7597b727
registers.esp: 60095964
registers.edi: 60096152
registers.eax: 60095964
registers.ebp: 60096044
registers.edx: 0
registers.ebx: 4703484
registers.esi: 11001
registers.ecx: 7
1 0 0

__exception__

stacktrace:
synaptics+0x7bda4 @ 0x47bda4
synaptics+0x7bcf2 @ 0x47bcf2
synaptics+0x7bcb3 @ 0x47bcb3
synaptics+0x845fd @ 0x4845fd
synaptics+0x95a83 @ 0x495a83
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x755c33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xeedfade
exception.offset: 46887
exception.address: 0x7597b727
registers.esp: 60093776
registers.edi: 60093964
registers.eax: 60093776
registers.ebp: 60093856
registers.edx: 0
registers.ebx: 4703484
registers.esi: 11004
registers.ecx: 7
1 0 0

__exception__

stacktrace:
synaptics+0x7bda4 @ 0x47bda4
synaptics+0x7bcf2 @ 0x47bcf2
synaptics+0x7bcb3 @ 0x47bcb3
synaptics+0x845fd @ 0x4845fd
synaptics+0x95b0a @ 0x495b0a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x755c33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x76f49ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x76f49ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xeedfade
exception.offset: 46887
exception.address: 0x7597b727
registers.esp: 60091588
registers.edi: 60091776
registers.eax: 60091588
registers.ebp: 60091668
registers.edx: 0
registers.ebx: 4703484
registers.esi: 11001
registers.ecx: 7
1 0 0
domain xred.mooo.com
request GET http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
request GET https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
request GET https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2656
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00690000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2656
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x735e2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2784
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 3203072
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10001000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2784
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 237568
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x1030f000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2856
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02080000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2856
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x735e2000
process_handle: 0xffffffff
1 0 0
name RT_ICON language LANG_TURKISH filetype dBase IV DBT of @.DBF, block length 8192, next free block index 40 sublanguage SUBLANG_DEFAULT offset 0x000b1028 size 0x000010a8
name RT_ICON language LANG_TURKISH filetype dBase IV DBT of @.DBF, block length 8192, next free block index 40 sublanguage SUBLANG_DEFAULT offset 0x000b1028 size 0x000010a8
name RT_RCDATA language LANG_TURKISH filetype Microsoft Excel 2007+ sublanguage SUBLANG_DEFAULT offset 0x000f1794 size 0x000047d3
name RT_RCDATA language LANG_TURKISH filetype Microsoft Excel 2007+ sublanguage SUBLANG_DEFAULT offset 0x000f1794 size 0x000047d3
name RT_RCDATA language LANG_TURKISH filetype Microsoft Excel 2007+ sublanguage SUBLANG_DEFAULT offset 0x000f1794 size 0x000047d3
name RT_RCDATA language LANG_TURKISH filetype Microsoft Excel 2007+ sublanguage SUBLANG_DEFAULT offset 0x000f1794 size 0x000047d3
name RT_RCDATA language LANG_TURKISH filetype Microsoft Excel 2007+ sublanguage SUBLANG_DEFAULT offset 0x000f1794 size 0x000047d3
name RT_RCDATA language LANG_TURKISH filetype Microsoft Excel 2007+ sublanguage SUBLANG_DEFAULT offset 0x000f1794 size 0x000047d3
name RT_RCDATA language LANG_TURKISH filetype Microsoft Excel 2007+ sublanguage SUBLANG_DEFAULT offset 0x000f1794 size 0x000047d3
name RT_RCDATA language LANG_TURKISH filetype Microsoft Excel 2007+ sublanguage SUBLANG_DEFAULT offset 0x000f1794 size 0x000047d3
name RT_GROUP_ICON language LANG_TURKISH filetype data sublanguage SUBLANG_DEFAULT offset 0x000f5f68 size 0x00000014
domain docs.google.com
file C:\Program Files\AppPatch\8.77.dll
file C:\ProgramData\Synaptics\Synaptics.dll
file C:\Users\test22\AppData\Local\Temp\._cache_123.exe
domain www.dropbox.com
file C:\Users\test22\AppData\Local\Temp\._cache_123.exe
file C:\Users\test22\AppData\Local\Temp\._cache_123.exe
host 45.125.57.96
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver reg_value C:\ProgramData\Synaptics\Synaptics.exe
Time & API Arguments Status Return Repeated

SetWindowsHookExA

thread_identifier: 0
callback_function: 0x03993540
hook_identifier: 2 (WH_KEYBOARD)
module_address: 0x03990000
1 852375 0
process ._cache_123.exe useragent Mozilla/4.0 (compatible)
process Synaptics.exe useragent MyApp
process Synaptics.exe useragent Synaptics.exe
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.DarkKomet.tp6k
Elastic malicious (high confidence)
MicroWorld-eScan Generic.Dacic.AEA16DAA.A.96E7E3ED
FireEye Generic.mg.5ab89a96be7570df
CAT-QuickHeal Sus.Nocivo.E0011
Skyhigh BehavesLike.Win32.Downloader.dh
ALYac Generic.Dacic.AEA16DAA.A.96E7E3ED
Cylance unsafe
Zillya Trojan.Delf.Win32.76144
Sangfor Suspicious.Win32.Save.ins
K7AntiVirus Trojan ( 000112511 )
Alibaba Backdoor:Win32/Zlob.180910
K7GW Trojan ( 000112511 )
Cybereason malicious.9e77e0
BitDefenderTheta AI:Packer.96BD33E81D
Symantec W32.Zorex
tehtris Generic.Malware
ESET-NOD32 Win32/Delf.NBX
Cynet Malicious (score: 100)
APEX Malicious
ClamAV Win.Downloader.Zegost-6484584-1
Kaspersky Backdoor.Win32.DarkKomet.hqxy
BitDefender Generic.Dacic.AEA16DAA.A.96E7E3ED
NANO-Antivirus Trojan.Win32.DarkKomet.fazbwq
Avast Win32:Dropper-OHP [Trj]
Tencent Virus.Win32.DarkKomet.yb
TACHYON Backdoor/W32.DP-DarkKomet.985088.B
Emsisoft Generic.Dacic.AEA16DAA.A.96E7E3ED (B)
Baidu Win32.Trojan-Downloader.Agent.bh
F-Secure Trojan:W97M/MaliciousMacro.GEN
DrWeb Trojan.DownLoader22.9658
VIPRE Generic.Dacic.AEA16DAA.A.96E7E3ED
TrendMicro Virus.Win32.NAPWHICH.B
Sophos Troj/Zegost-ID
Ikarus Trojan-PWS.Win32.QQPass
Jiangmin Backdoor.DarkKomet.ljd
Webroot W32.Malware.gen
Varist W32/Backdoor.OAZM-5661
Avira TR/Dldr.Agent.SH
Antiy-AVL Virus/Win32.DarkKomet.a
Kingsoft Win32.HeurC.KVM007.a
Microsoft Worm:Win32/AutoRun!atmn
Gridinsoft Trojan.Win32.Gen.tr
Xcitium Virus.Win32.Agent.DE@74b38h
Arcabit HEUR.VBA.Trojan.d
ViRobot Win32.Zorex.A
ZoneAlarm Backdoor.Win32.DarkKomet.hqxy
GData Win32.Backdoor.Agent.AXS
Google Detected
dead_host 192.168.56.101:49178
dead_host 192.168.56.101:49166
dead_host 45.125.57.96:2005
dead_host 192.168.56.101:49177