Summary | ZeroBOX

buben.exe

EnigmaProtector Malicious Packer PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us May 3, 2024, 3:44 p.m. May 3, 2024, 3:53 p.m.
Size 3.1MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 89614bcd95a77224939391e14e6a45d4
SHA256 8f2d99ca04db3fc50810158be6f60f4df8df819dd30227d58287f71b220fbfb8
CRC32 7F35706E
ssdeep 98304:ELczzk0Gqz5w0oagqMl293keG0X3ojOIML:EIfkGYnqMi3k3tj
Yara
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • EnigmaProtector_IN - EnigmaProtector

IP Address Status Action
104.26.4.15 Active Moloch
147.45.47.93 Active Moloch
164.124.101.2 Active Moloch
34.117.186.192 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49167 -> 34.117.186.192:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49167 -> 34.117.186.192:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49167 -> 34.117.186.192:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49167 -> 34.117.186.192:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected
TCP 192.168.56.103:49166 -> 147.45.47.93:58709 2049060 ET MALWARE RisePro TCP Heartbeat Packet A Network Trojan was detected
TCP 147.45.47.93:58709 -> 192.168.56.103:49166 2046266 ET MALWARE [ANY.RUN] RisePro TCP (Token) A Network Trojan was detected
TCP 192.168.56.103:49166 -> 147.45.47.93:58709 2046269 ET MALWARE [ANY.RUN] RisePro TCP (Activity) A Network Trojan was detected
TCP 192.168.56.103:49166 -> 147.45.47.93:58709 2046269 ET MALWARE [ANY.RUN] RisePro TCP (Activity) A Network Trojan was detected
TCP 192.168.56.103:49166 -> 147.45.47.93:58709 2049060 ET MALWARE RisePro TCP Heartbeat Packet A Network Trojan was detected
TCP 147.45.47.93:58709 -> 192.168.56.103:49166 2046267 ET MALWARE [ANY.RUN] RisePro TCP (External IP) A Network Trojan was detected
TCP 192.168.56.103:49169 -> 104.26.4.15:443 906200054 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49166 -> 147.45.47.93:58709 2049060 ET MALWARE RisePro TCP Heartbeat Packet A Network Trojan was detected
TCP 192.168.56.103:49167 -> 34.117.186.192:443 2025331 ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) Device Retrieving External IP Address Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLSv1
192.168.56.103:49169
104.26.4.15:443
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 CN=db-ip.com 65:b1:27:2e:35:d2:f7:1f:20:04:c5:ca:ea:4e:7a:b4:69:6a:83:00

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "MPGPH131 HR" has successfully been created.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: SUCCESS: The scheduled task "MPGPH131 LG" has successfully been created.
console_handle: 0x00000007
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
section
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
0x7ebd0e50
0x7ebd0d00

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390360
registers.edi: 22692080
registers.eax: 0
registers.ebp: 4390388
registers.edx: 0
registers.ebx: 229603846
registers.esi: 14839808
registers.ecx: 51590784
1 0 0

__exception__

stacktrace:
0x7ebd0e50
0x7ebd0d00

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390360
registers.edi: 4390360
registers.eax: 0
registers.ebp: 4390388
registers.edx: 2
registers.ebx: 15803507
registers.esi: 0
registers.ecx: 4390396
1 0 0

__exception__

stacktrace:
0x7ebd0e50
0x7ebd0d00

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390360
registers.edi: 4390360
registers.eax: 0
registers.ebp: 4390388
registers.edx: 0
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390396
1 0 0

__exception__

stacktrace:
0x7ebd0e50
0x7ebd0d00

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390360
registers.edi: 4390360
registers.eax: 0
registers.ebp: 4390388
registers.edx: 2
registers.ebx: 15803507
registers.esi: 0
registers.ecx: 4390396
1 0 0

__exception__

stacktrace:
0x7ebd0e50
0x7ebd0d00

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390360
registers.edi: 4390360
registers.eax: 0
registers.ebp: 4390388
registers.edx: 2
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390396
1 0 0

__exception__

stacktrace:
0x7ebd0e50
0x7ebd0d00

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390360
registers.edi: 4390360
registers.eax: 0
registers.ebp: 4390388
registers.edx: 0
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390396
1 0 0

__exception__

stacktrace:
0x7ebd0e50
0x7ebd0d00

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390360
registers.edi: 4390360
registers.eax: 0
registers.ebp: 4390388
registers.edx: 2
registers.ebx: 15803507
registers.esi: 0
registers.ecx: 4390396
1 0 0

__exception__

stacktrace:
0x7ebd0e50
0x7ebd0d00

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390360
registers.edi: 4390360
registers.eax: 0
registers.ebp: 4390388
registers.edx: 0
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390396
1 0 0

__exception__

stacktrace:
0x7ebd0e50
0x7ebd0d00

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390360
registers.edi: 4390360
registers.eax: 0
registers.ebp: 4390388
registers.edx: 0
registers.ebx: 15803507
registers.esi: 0
registers.ecx: 4390396
1 0 0

__exception__

stacktrace:
0x7ebd0e50
0x7ebd0d00

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390360
registers.edi: 4390360
registers.eax: 0
registers.ebp: 4390388
registers.edx: 0
registers.ebx: 15803507
registers.esi: 0
registers.ecx: 4390396
1 0 0

__exception__

stacktrace:
0x7ebd19f0
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 16063144
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 10645504
registers.esi: 14839808
registers.ecx: 14839808
1 0 0

__exception__

stacktrace:
0x7ebd19f0
0x7ebd1630

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 0
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd1e70
0x7ebd1630

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390232
registers.edi: 16063144
registers.eax: 0
registers.ebp: 4390260
registers.edx: 0
registers.ebx: 10645504
registers.esi: 14839808
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7ebd1e70
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 15803507
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd1e70
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd1e70
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd1e70
0x7ebd1630

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 0
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd1fc0
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 16063144
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 10645504
registers.esi: 14839808
registers.ecx: 4390252
1 0 0

__exception__

stacktrace:
0x7ebd1fc0
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd1fc0
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd1fc0
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd24d0
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 16063144
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 0
registers.esi: 14839808
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7ebd24d0
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd24d0
0x7ebd1630

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 0
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd24d0
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 15803507
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd24d0
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 15803550
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd2710
0x7ebd1630

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390232
registers.edi: 16063144
registers.eax: 0
registers.ebp: 4390260
registers.edx: 0
registers.ebx: 0
registers.esi: 14839808
registers.ecx: 2022427275
1 0 0

__exception__

stacktrace:
0x7ebd2710
0x7ebd1630

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 0
registers.ebx: 15803507
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd2710
0x7ebd1630

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: buben.exe
exception.exception_code: 0xc0000094
exception.offset: 2696285
exception.address: 0xf1245d
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 0
registers.ebx: 15803507
registers.esi: 0
registers.ecx: 4390268
1 0 0

__exception__

stacktrace:
0x7ebd2710
0x7ebd1630

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: buben.exe
exception.exception_code: 0xc000001d
exception.offset: 2696328
exception.address: 0xf12488
registers.esp: 4390232
registers.edi: 4390232
registers.eax: 0
registers.ebp: 4390260
registers.edx: 2
registers.ebx: 15803507
registers.esi: 0
registers.ecx: 4390268
1 0 0
request GET https://db-ip.com/demo/home.php?s=175.208.134.152
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02d70000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 32768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02d74000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 131072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02d7c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02d9c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 196608
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02da0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02dd0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 32768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02dd4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ddc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02de0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02de4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02de8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02dec000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02df0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02df4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02df8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02dfc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e04000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e08000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e0c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e14000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e18000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e1c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e24000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e28000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e2c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e30000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e34000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e38000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e3c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e40000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e44000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e48000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e4c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e50000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e54000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e58000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e5c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e64000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e68000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02e6c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ef0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ef4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02ef8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02efc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02f00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2064
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02f04000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
description buben.exe tried to sleep 262 seconds, actually delayed analysis time by 262 seconds
domain ipinfo.io
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2536
thread_handle: 0x00000164
process_identifier: 2532
current_directory:
filepath:
track: 1
command_line: schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x00000168
1 1 0

CreateProcessInternalW

thread_identifier: 2644
thread_handle: 0x00000170
process_identifier: 2640
current_directory:
filepath:
track: 1
command_line: schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x0000016c
1 1 0
section {u'size_of_data': u'0x00092a00', u'virtual_address': u'0x00001000', u'entropy': 7.999630025295813, u'name': u'', u'virtual_size': u'0x00159000'} entropy 7.9996300253 description A section with a high entropy has been found
section {u'size_of_data': u'0x00010200', u'virtual_address': u'0x0015a000', u'entropy': 7.991123626377572, u'name': u'', u'virtual_size': u'0x00028000'} entropy 7.99112362638 description A section with a high entropy has been found
section {u'size_of_data': u'0x00000800', u'virtual_address': u'0x00182000', u'entropy': 7.838614541323653, u'name': u'', u'virtual_size': u'0x00005000'} entropy 7.83861454132 description A section with a high entropy has been found
section {u'size_of_data': u'0x00006000', u'virtual_address': u'0x00192000', u'entropy': 7.992202653257841, u'name': u'', u'virtual_size': u'0x0000a000'} entropy 7.99220265326 description A section with a high entropy has been found
section {u'size_of_data': u'0x00032800', u'virtual_address': u'0x001a7000', u'entropy': 7.999134442258987, u'name': u'', u'virtual_size': u'0x00795000'} entropy 7.99913444226 description A section with a high entropy has been found
section {u'size_of_data': u'0x0022d400', u'virtual_address': u'0x0093c000', u'entropy': 7.983726652687861, u'name': u'.data', u'virtual_size': u'0x0022e000'} entropy 7.98372665269 description A section with a high entropy has been found
entropy 0.986040609137 description Overall entropy of this PE file is high
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
host 147.45.47.93
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\RageMP131 reg_value C:\Users\test22\AppData\Local\RageMP131\RageMP131.exe
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.RisePro.1p!c
tehtris Generic.Malware
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win32.Generic.wc
Cylance unsafe
Sangfor Suspicious.Win32.Save.ins
K7GW Trojan ( 005376ae1 )
K7AntiVirus Trojan ( 005376ae1 )
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win64/Packed.Enigma.CE
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Kaspersky UDS:Trojan-PSW.Win32.RisePro
Alibaba Trojan:Win32/Enigma.5f3338b8
Rising Stealer.RisePro!8.176E1 (CLOUD)
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.89614bcd95a77224
Sophos Mal/Generic-S
Ikarus Trojan.Win64.Enigma
Google Detected
Kingsoft Win32.PSWTroj.Undef.a
Microsoft Trojan:Win32/Sabsik.FL.B!ml
ZoneAlarm UDS:Trojan-PSW.Win32.RisePro
BitDefenderTheta Gen:NN.ZexaF.36804.fJ0@aaUtp4ck
DeepInstinct MALICIOUS
VBA32 TrojanClicker.Cycler
Malwarebytes Malware.AI.2221259969
Zoner Probably Heur.ExeHeaderL
AVG Win32:PWSX-gen [Trj]