Summary | ZeroBOX

rty25.exe

Malicious Packer UPX PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Feb. 1, 2024, 7:59 a.m. Feb. 1, 2024, 8:04 a.m.
Size 298.5KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 5fd7aff48d27771ca0aec6776afefb93
SHA256 a9498e18f267a568b57d3a281d14118c70ffd1aae42411ee9a7661092beee97b
CRC32 C7ED089A
ssdeep 6144:k7F5GxMr+PtCE2kWCZ3j9Z0CINiNRpxyN90vE:4FYxMqAEVBkCIWZy90
PDB Path wusa.pdb
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file

IP Address Status Action
154.92.15.189 Active Moloch
164.124.101.2 Active Moloch
182.162.106.33 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49166 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49165 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49163 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49173 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49167 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49178 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49169 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49176 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49182 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49175 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49179 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49168 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49181 -> 154.92.15.189:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49166
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49163
154.92.15.189:443
C=US, O=Let's Encrypt, CN=R3 CN=i.alie3ksgaa.com e3:88:72:04:24:5c:12:17:a4:e2:c1:d9:33:f0:d9:60:91:71:d3:dc
TLSv1
192.168.56.103:49165
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49172
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49173
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49167
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49178
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49169
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49176
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49182
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49175
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49179
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49168
154.92.15.189:443
None None None
TLSv1
192.168.56.103:49181
154.92.15.189:443
None None None

registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
pdb_path wusa.pdb
resource name MUI
resource name WEVT_TEMPLATE
request GET http://apps.identrust.com/roots/dstrootcax3.p7c
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 660
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000000ff0db000
process_handle: 0xffffffffffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
section {u'size_of_data': u'0x00015000', u'virtual_address': u'0x00038000', u'entropy': 7.3971931278824155, u'name': u'.rsrc', u'virtual_size': u'0x00015000'} entropy 7.39719312788 description A section with a high entropy has been found
entropy 0.282352941176 description Overall entropy of this PE file is high
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob