Summary | ZeroBOX

install_new.exe

Gen1 Generic Malware Malicious Library UPX PE64 PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 April 18, 2024, 4:32 p.m. April 18, 2024, 4:35 p.m.
Size 2.4MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ba7445dd6438c2097c1c5b2ce173c064
SHA256 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768
CRC32 DD5BB667
ssdeep 49152:zgwRBNhWLwbYdMsr37tl5oaSeaduub9vdcOMigvOQowQEJHQJPT5NuEj3uWNtiT:zgwRBNhmwbirt02q1r4PFJwJ1fjeWNk
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
194.116.172.72 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: The batch file cannot be found.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: [SC] OpenService FAILED 1060: The specified service does not exist as an installed service.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: a
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: n
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: t
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: o
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: p
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: e
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: n
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: s
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: e
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: r
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: v
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: i
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: c
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: e
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: O
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: p
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: e
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: n
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: S
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: e
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: r
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: v
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: i
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: c
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: e
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer:
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: S
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: e
console_handle: 0x0000000f
1 1 0

WriteConsoleW

buffer: r
console_handle: 0x0000000f
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
packer Armadillo v1.71
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73bc2000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 13319548928
root_path: C:\Program Files (x86)\GameServerClient
total_number_of_bytes: 0
1 1 0
file C:\Program Files (x86)\GameServerClient\install.bat
file C:\Program Files (x86)\GameServerClient\installc.bat
file C:\Program Files (x86)\GameServerClient\GameClient.exe
file C:\Program Files (x86)\GameServerClient\GameClientC.exe
file C:\Users\test22\AppData\Local\Temp\7ZSfx000.cmd
file C:\Program Files (x86)\GameServerClient\GameService.exe
Time & API Arguments Status Return Repeated

CreateServiceW

service_start_name:
start_type: 2
password:
display_name: GameServerClient
filepath: C:\Program Files (x86)\GameServerClient\GameService.exe
service_name: GameServerClient
filepath_r: C:\Program Files (x86)\GameServerClient\GameService.exe
desired_access: 983551
service_handle: 0x00857438
error_control: 1
service_type: 16
service_manager_handle: 0x008574d8
1 8746040 0

CreateServiceW

service_start_name:
start_type: 2
password:
display_name: GameServerClientC
filepath: C:\Program Files (x86)\GameServerClient\GameService.exe
service_name: GameServerClientC
filepath_r: C:\Program Files (x86)\GameServerClient\GameService.exe
desired_access: 983551
service_handle: 0x002f7450
error_control: 1
service_type: 16
service_manager_handle: 0x002f74f0
1 3109968 0
file C:\Users\test22\AppData\Local\Temp\7ZSfx000.cmd
file C:\Program Files (x86)\GameServerClient\GameService.exe
file C:\Users\test22\AppData\Local\Temp\install_new.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\7ZSfx000.cmd
parameters:
filepath: C:\Users\test22\AppData\Local\Temp\7ZSfx000.cmd
1 1 0
cmdline Sc delete GameServerClient
cmdline Sc delete GameServerClientC
host 194.116.172.72
Time & API Arguments Status Return Repeated

EnumServicesStatusW

service_handle: 0x003173c0
service_type: 59
service_status: 3
0 0
service_name GameServerClient service_path C:\Program Files (x86)\GameServerClient\GameService.exe
service_name GameServerClientC service_path C:\Program Files (x86)\GameServerClient\GameService.exe
Bkav W32.AIDetectMalware
ALYac Trojan.GenericKD.72398061
Cylance unsafe
VIPRE Trojan.GenericKD.72398061
Sangfor Trojan.Win32.Agent.V3e4
CrowdStrike win/grayware_confidence_70% (W)
BitDefender Trojan.GenericKD.72398061
Arcabit Trojan.Generic.D450B4ED
Symantec Trojan.Gen.MBT
MicroWorld-eScan Trojan.GenericKD.72398061
Rising HackTool.NSSM!1.CABB (CLASSIC)
Emsisoft Trojan.GenericKD.72398061 (B)
DrWeb Tool.Nssm.5
TrendMicro Trojan.Win32.AMADEY.YXEDPZ
Trapmine suspicious.low.ml.score
FireEye Trojan.GenericKD.72398061
Sophos Mal/Generic-S
Webroot W32.Trojan.GenKD
Antiy-AVL Trojan/Win32.Znyonm
Gridinsoft Virtool.Win32.Znyonm.ca
Microsoft Trojan:Win32/Znyonm
GData Trojan.GenericKD.72398061
AhnLab-V3 Malware/Win.Generic.C5613362
DeepInstinct MALICIOUS
Malwarebytes Trojan.Dropper.SFX
TrendMicro-HouseCall Trojan.Win32.AMADEY.YXEDPZ
Tencent Win32.Trojan.Malware.Szfl
MAX malware (ai score=89)
Fortinet W32/Malicious_Behavior.SBX