Summary | ZeroBOX

poter.exe

EnigmaProtector Malicious Packer PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 May 13, 2024, 8:59 a.m. May 13, 2024, 9:02 a.m.
Size 3.0MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 3acbdb001a0be2555921f0361189f9b5
SHA256 577c882863773dd3c84a219133a967b6354e89822e871d6ddf954f0c3a2976a9
CRC32 2F032809
ssdeep 49152:/YAdQItwwztvgIBRUPgafOKR9UUVlNKnwGs1r/6brfoh93o0CjLGPFHeaz5BpGN4:/YAN9YIu4KR9UA0wGWHbyqN+azX8C
Yara
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • EnigmaProtector_IN - EnigmaProtector

IP Address Status Action
147.45.47.126 Active Moloch
164.124.101.2 Active Moloch
172.67.75.166 Active Moloch
34.117.186.192 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "MPGPH131 HR" has successfully been created.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: SUCCESS: The scheduled task "MPGPH131 LG" has successfully been created.
console_handle: 0x00000007
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
section
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
0x7ebd0de0
0x7ebd0c90

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406496
registers.edi: 26640624
registers.eax: 0
registers.ebp: 3406524
registers.edx: 2
registers.ebx: 1372433624
registers.esi: 18800640
registers.ecx: 53556980
1 0 0

__exception__

stacktrace:
0x7ebd0de0
0x7ebd0c90

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406496
registers.edi: 3406496
registers.eax: 0
registers.ebp: 3406524
registers.edx: 2
registers.ebx: 19764382
registers.esi: 0
registers.ecx: 3406532
1 0 0

__exception__

stacktrace:
0x7ebd0de0
0x7ebd0c90

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406496
registers.edi: 3406496
registers.eax: 0
registers.ebp: 3406524
registers.edx: 2
registers.ebx: 19764382
registers.esi: 0
registers.ecx: 3406532
1 0 0

__exception__

stacktrace:
0x7ebd0de0
0x7ebd0c90

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406496
registers.edi: 3406496
registers.eax: 0
registers.ebp: 3406524
registers.edx: 2
registers.ebx: 19764382
registers.esi: 0
registers.ecx: 3406532
1 0 0

__exception__

stacktrace:
0x7ebd0de0
0x7ebd0c90

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406496
registers.edi: 3406496
registers.eax: 0
registers.ebp: 3406524
registers.edx: 0
registers.ebx: 19764382
registers.esi: 0
registers.ecx: 3406532
1 0 0

__exception__

stacktrace:
0x7ebd0de0
0x7ebd0c90

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406496
registers.edi: 3406496
registers.eax: 0
registers.ebp: 3406524
registers.edx: 2
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406532
1 0 0

__exception__

stacktrace:
0x7ebd1980
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 20023976
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 14606336
registers.esi: 18800640
registers.ecx: 18800640
1 0 0

__exception__

stacktrace:
0x7ebd1980
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd1980
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd1980
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd1980
0x7ebd15c0

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 2
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd1e00
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 20023976
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 14606336
registers.esi: 18800640
registers.ecx: 0
1 0 0

__exception__

stacktrace:
0x7ebd1e00
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd1f50
0x7ebd15c0

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406368
registers.edi: 20023976
registers.eax: 0
registers.ebp: 3406396
registers.edx: 2
registers.ebx: 14606336
registers.esi: 18800640
registers.ecx: 3406388
1 0 0

__exception__

stacktrace:
0x7ebd1f50
0x7ebd15c0

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 2
registers.ebx: 19764382
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd1f50
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 19764382
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd1f50
0x7ebd15c0

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 2
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd1f50
0x7ebd15c0

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 2
registers.ebx: 19764382
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd1f50
0x7ebd15c0

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 2
registers.ebx: 19764382
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd2460
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 20023976
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 0
registers.esi: 18800640
registers.ecx: 2548544331
1 0 0

__exception__

stacktrace:
0x7ebd2460
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd2460
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd2460
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd2460
0x7ebd15c0

exception.instruction_r: f7 f0 e8 dc 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: div eax
exception.module: poter.exe
exception.exception_code: 0xc0000094
exception.offset: 2724957
exception.address: 0x12d945d
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 0
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd2460
0x7ebd15c0

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 2
registers.ebx: 19764339
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd26a0
0x7ebd15c0

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406368
registers.edi: 20023976
registers.eax: 0
registers.ebp: 3406396
registers.edx: 2
registers.ebx: 0
registers.esi: 18800640
registers.ecx: 2365652991
1 0 0

__exception__

stacktrace:
0x7ebd26a0
0x7ebd15c0

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 2
registers.ebx: 19764382
registers.esi: 0
registers.ecx: 3406404
1 0 0

__exception__

stacktrace:
0x7ebd26a0
0x7ebd15c0

exception.instruction_r: 0f 0b e8 b1 4d 01 00 33 c0 5a 59 59 64 89 10 eb
exception.instruction: ud2
exception.module: poter.exe
exception.exception_code: 0xc000001d
exception.offset: 2725000
exception.address: 0x12d9488
registers.esp: 3406368
registers.edi: 3406368
registers.eax: 0
registers.ebp: 3406396
registers.edx: 2
registers.ebx: 19764382
registers.esi: 0
registers.ecx: 3406404
1 0 0
request GET https://db-ip.com/demo/home.php?s=175.208.134.152
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02fa0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 32768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02fa4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 131072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02fac000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02fcc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 196608
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02fd0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03000000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 32768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03004000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0300c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03010000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03014000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03018000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0301c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03020000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03024000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03028000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0302c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03030000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03034000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03038000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0303c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03040000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03044000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03048000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0304c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03050000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03054000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03058000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0305c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03060000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03064000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03068000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0306c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03070000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03074000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03078000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0307c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03080000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03084000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03088000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0308c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03090000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03094000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03098000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0309c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x031e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x031e4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x031e8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x031ec000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x031f0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2556
region_size: 16384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x031f4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
domain ipinfo.io
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2700
thread_handle: 0x00000160
process_identifier: 2696
current_directory:
filepath:
track: 1
command_line: schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x00000164
1 1 0

CreateProcessInternalW

thread_identifier: 2760
thread_handle: 0x0000016c
process_identifier: 2756
current_directory:
filepath:
track: 1
command_line: schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x00000168
1 1 0
section {u'size_of_data': u'0x00093c00', u'virtual_address': u'0x00001000', u'entropy': 7.999707131763619, u'name': u'', u'virtual_size': u'0x0015c000'} entropy 7.99970713176 description A section with a high entropy has been found
section {u'size_of_data': u'0x00010200', u'virtual_address': u'0x0015d000', u'entropy': 7.995975879307306, u'name': u'', u'virtual_size': u'0x00028000'} entropy 7.99597587931 description A section with a high entropy has been found
section {u'size_of_data': u'0x00000800', u'virtual_address': u'0x00185000', u'entropy': 7.829108327163367, u'name': u'', u'virtual_size': u'0x00005000'} entropy 7.82910832716 description A section with a high entropy has been found
section {u'size_of_data': u'0x00006200', u'virtual_address': u'0x00197000', u'entropy': 7.973874973002187, u'name': u'', u'virtual_size': u'0x0000a000'} entropy 7.973874973 description A section with a high entropy has been found
section {u'size_of_data': u'0x00032800', u'virtual_address': u'0x001ae000', u'entropy': 7.998793308923065, u'name': u'', u'virtual_size': u'0x00792000'} entropy 7.99879330892 description A section with a high entropy has been found
section {u'size_of_data': u'0x0021c400', u'virtual_address': u'0x00940000', u'entropy': 7.974203282524806, u'name': u'.data', u'virtual_size': u'0x0021d000'} entropy 7.97420328252 description A section with a high entropy has been found
entropy 0.9836859958 description Overall entropy of this PE file is high
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
host 147.45.47.126
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\RageMP131 reg_value C:\Users\test22\AppData\Local\RageMP131\RageMP131.exe
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win32.RemAdmAmmyy.wc
ALYac Gen:Variant.Strictor.289681
VIPRE Gen:Variant.Strictor.289681
Sangfor Suspicious.Win32.Save.ins
K7AntiVirus Trojan ( 005376ae1 )
BitDefender Gen:Variant.Strictor.289681
K7GW Trojan ( 005376ae1 )
Arcabit Trojan.Strictor.D46B91
Symantec ML.Attribute.HighConfidence
tehtris Generic.Malware
ESET-NOD32 a variant of Win64/Packed.Enigma.CE
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Kaspersky VHO:Trojan-PSW.Win32.RisePro.gen
MicroWorld-eScan Gen:Variant.Strictor.289681
Emsisoft Gen:Variant.Strictor.289681 (B)
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.3acbdb001a0be255
Sophos Mal/RisePro-A
Ikarus Trojan.Win64.Enigma
Google Detected
Antiy-AVL Trojan[Packed]/Win64.Enigma
Gridinsoft Trojan.Win32.Downloader.dd!n
Microsoft Trojan:Win32/Wacatac.B!ml
ZoneAlarm VHO:Trojan-PSW.Win32.RisePro.gen
GData Win32.Trojan.PSE.1OXVGSY
AhnLab-V3 Trojan/Win.PWSX-gen.R646865
BitDefenderTheta Gen:NN.ZexaF.36804.bJ0@aaU71Qak
DeepInstinct MALICIOUS
Malwarebytes Trojan.Packed.Enigma
Zoner Probably Heur.ExeHeaderL
MAX malware (ai score=81)
AVG Win32:PWSX-gen [Trj]