Summary | ZeroBOX

random.exe

Malicious Packer PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 May 14, 2024, 8:07 a.m. May 14, 2024, 8:27 a.m.
Size 2.1MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 906505cc5818955f1793017c1d83206d
SHA256 9c3cdb46ca15b7c867ba2fdaab5f4c48e682ef004de8beac75d7da8186da3f1e
CRC32 B82D5BFB
ssdeep 49152:vQgZkd65/+6WUYT+HYNcMT8wDjbS/h2EMxdR+bOZkWSIpxQCRXAFE:4gdk6lmHZa2EmcbOZVSsbXEE
Yara
  • PE_Header_Zero - PE File Signature
  • themida_packer - themida packer
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)

IP Address Status Action
104.26.4.15 Active Moloch
147.45.47.126 Active Moloch
164.124.101.2 Active Moloch
34.117.186.192 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: SUCCESS: The scheduled task "MPGPH131 HR" has successfully been created.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: SUCCESS: The scheduled task "MPGPH131 LG" has successfully been created.
console_handle: 0x00000007
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
section
section .vm_sec
section .themida
section .boot
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 83 c4 04 e9 98 bc f0 ff
exception.symbol: random+0x4a2875
exception.instruction: in eax, dx
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 4860021
exception.address: 0x1382875
registers.esp: 2947368
registers.edi: 6630936
registers.eax: 1750617430
registers.ebp: 17383424
registers.edx: 22614
registers.ebx: 15597568
registers.esi: 13
registers.ecx: 20
1 0 0

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 83 c4 04 81 fb 68 58 4d
exception.symbol: random+0x4a28e9
exception.instruction: in eax, dx
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 4860137
exception.address: 0x13828e9
registers.esp: 2947368
registers.edi: 6630936
registers.eax: 1447909480
registers.ebp: 17383424
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 13
registers.ecx: 10
1 0 0
request GET https://db-ip.com/demo/home.php?s=175.208.134.152
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01063000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0103d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0103d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 163840
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0103d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 908
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0103d000
process_handle: 0xffffffff
1 0 0
domain ipinfo.io
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2236
thread_handle: 0x00000114
process_identifier: 2240
current_directory:
filepath:
track: 1
command_line: schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x0000010c
1 1 0

CreateProcessInternalW

thread_identifier: 416
thread_handle: 0x0000011c
process_identifier: 776
current_directory:
filepath:
track: 1
command_line: schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
filepath_r:
stack_pivoted: 0
creation_flags: 134217728 (CREATE_NO_WINDOW)
inherit_handles: 0
process_handle: 0x00000118
1 1 0
section {u'size_of_data': u'0x00080000', u'virtual_address': u'0x00001000', u'entropy': 7.999563636568724, u'name': u' ', u'virtual_size': u'0x0015bae8'} entropy 7.99956363657 description A section with a high entropy has been found
section {u'size_of_data': u'0x0000c600', u'virtual_address': u'0x0015d000', u'entropy': 7.995659060728957, u'name': u' ', u'virtual_size': u'0x00027e32'} entropy 7.99565906073 description A section with a high entropy has been found
section {u'size_of_data': u'0x00000800', u'virtual_address': u'0x00185000', u'entropy': 7.381162332644007, u'name': u' ', u'virtual_size': u'0x00004930'} entropy 7.38116233264 description A section with a high entropy has been found
section {u'size_of_data': u'0x00007200', u'virtual_address': u'0x0018a000', u'entropy': 7.981397743898315, u'name': u' ', u'virtual_size': u'0x0000c8c0'} entropy 7.9813977439 description A section with a high entropy has been found
section {u'size_of_data': u'0x00004c00', u'virtual_address': u'0x00197000', u'entropy': 7.978273846938975, u'name': u' ', u'virtual_size': u'0x00009858'} entropy 7.97827384694 description A section with a high entropy has been found
section {u'size_of_data': u'0x0016ee00', u'virtual_address': u'0x00506000', u'entropy': 7.954421185542796, u'name': u'.boot', u'virtual_size': u'0x0016ee00'} entropy 7.95442118554 description A section with a high entropy has been found
entropy 0.968313473143 description Overall entropy of this PE file is high
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
host 147.45.47.126
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion
registry HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\RageMP131 reg_value C:\Users\test22\AppData\Local\RageMP131\RageMP131.exe
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
cmdline schtasks /create /f /RU "test22" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
registry HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 76 (SystemFirmwareTableInformation)
3221225507 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:

        
      
      
      
exception.instruction_r: ed 64 8f 05 00 00 00 00 83 c4 04 81 fb 68 58 4d
exception.symbol: random+0x4a28e9
exception.instruction: in eax, dx
exception.module: random.exe
exception.exception_code: 0xc0000096
exception.offset: 4860137
exception.address: 0x13828e9
registers.esp: 2947368
registers.edi: 6630936
registers.eax: 1447909480
registers.ebp: 17383424
registers.edx: 22104
registers.ebx: 2256917605
registers.esi: 13
registers.ecx: 10
1 0 0