Summary | ZeroBOX

x103.log

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 May 16, 2024, 8:57 a.m. May 16, 2024, 8:59 a.m.
Size 105.3KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 5c3eb8c100cef5725d79a35664e58646
SHA256 54dc7635c51ecd94cfe8e45cbac2e52191867b9ff0465d778ee5a200bb832c22
CRC32 55493231
ssdeep 1536:MTJxeSgVJ43R2N8gW7YI4z1w+8X5QbdoRPqUw35:M1xeSU4h2NQ7YfF0qn
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
103.143.81.180 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49161 -> 103.143.81.180:808 2260003 SURICATA Applayer Protocol detection skipped Generic Protocol Command Decode

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2540
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00401000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2540
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00401000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005d0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005e0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005f0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 528384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01e10000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 139264
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00610000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 204800
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02960000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2540
region_size: 229376
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x029e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2540
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73252000
process_handle: 0xffffffff
1 0 0
description x103.log tried to sleep 199 seconds, actually delayed analysis time by 199 seconds
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 13322780672
free_bytes_available: 13322780672
root_path: C:\
total_number_of_bytes: 34252779520
1 1 0
Time & API Arguments Status Return Repeated

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0

Process32NextW

snapshot_handle: 0x000002d8
process_name: conhost.exe
process_identifier: 2584
0 0
host 103.143.81.180
Time & API Arguments Status Return Repeated

RegSetValueExW

key_handle: 0x000001a8
regkey_r: d33f351a4aeea5e608853d1a56661059
reg_type: 3 (REG_BINARY)
value: {vU_!jWW.dll_bin¿29e63e83392895a08a0855578b853682é’U‹ìƒìSV‹q<W‰Uô‹Dx…Àtmƒ||tf‹\‰]ø…Ût[‹T‹t ыD$ñ‰UèÁ3҉uð‰Eì…Ût:‹<–3öù‰}üŠ„Àt‹ßiöƒ¾ÀðCŠ„Àuî‹]øæÿÿÿ;uôt‹uðB;ÓrÆ3À_^[‹å]Ã}u‹Eì·P‹Uè‹‚ÁëâWQÿUëÛU‹ìQƒeüèX-½º‰Eü‹Eü‹å]ÃU‹ìQQd¡0SVW‹@ ‹Ù‹PëA·r$3ɋz(Ñî…ö~·ƒøaràÿiɃ·ÀÈNuâáÿÿÿùæœÊ„Ÿ‹…Òu»3öjºT¸¹‹ÎèËþÿÿPºx ‰‹Îè¼þÿÿÿ3ºb4‰^‰C‹Îè«þÿÿÿ3ºs€H‰C‹Îèšþÿÿÿ3º¥ò\p‰C ‹Îè‰þÿÿƒÄ‰CEøÇEøntdlfÇEülPÿSÿ3‹ðºËyµ ‹Îè_þÿÿÿ3ºÀé‰C‹ÎèNþÿÿYY_^‰C[‹å]ËréaÿÿÿU‹ìƒì‹Â‰Mü‰EôSV…Àu3Àé’ºMZf9uïW‹x<ø?PE…s¸Lf9G…dƒÀ¿f9G…Wj@hÿwP3ÛSÿQ‹ð…ö„=ÿwT‹EüÿuôVÿP‹~<3Àþ‰]ð‰}ìf;GsX‹]ô‡‰Eø‹Hü…Ét+΃8tÿ0‹@ÃP‹EüQÿPëƒ8v ÿw8‹EüQÿP‹Eø‹MðƒÀ(‰EøA·G;ȉMð‹Eø|¶3ۋ‡ …Àt`9Ÿ¤tX 0ëEBø‰]ôÑè‰Eø…À~1·TY‹ÂÇEô0%ðf;Eôuâÿ‹Æ+G42C;]ø|Ñ3ۋEðA‹‰Eð‹Âu­‹‡€…Àt9Ÿ„twÆëiÆP‹EüÿP‰Eè…À„"‹Eø‹…Éu‹H‹PΉMð։Uô‹ …Ét3‹]ü‹úy·ÁëFÁPÿuèÿ‰ƒÇ‹EðƒÀ‰Eð‹…Éuڋ}ì3ۋEøƒÀ‰Eø‹@ …Àu‹À…Ét?‹L1 3ÒjX+Á‰MðÁè…ɉ]ôE‰Eè…Àt‹øSjVÿ‹Mð‹EôƒÁ@‰Mð‰Eô;Çuæ‹}ì‹G(ÆtÿujVÿЃ} „‹E…À„‚‰‹Gx…Àty9_|tt9\0tn‹L0‹T0 ΉMô֋L0$ΉUì‰Mð9\0vM‹ø‹šÿu ÆP‹EüÿP…Àt$‹UìC;\7rãë,‹Eüh@ÿwPVÿP 3À_^[‹å]ËEð‹Mô·X‹‹MƉ3À@ëàU‹ìƒì$SVWMÜè%üÿÿèüÿÿƒeü‹ðÆJº3ۋ~ ‹Fþ…Àt:jhÿvÆS‰EøÿUä‹Ø…Ûu3Àë_ÿvSÿv WÿUøƒÄƒøÿt ;Fu‹û3ÛC€>EüP‹×M܍FujPëh@ÿvSÿUèë»PjèžüÿÿƒÄ …Ût h@ÿvWÿUè‹Eü_^[‹å]à  u0
regkey: HKEY_CURRENT_USER\Console\0\d33f351a4aeea5e608853d1a56661059
1 0 0

RegSetValueExW

key_handle: 0x000001ac
regkey_r: IpDates_info
reg_type: 3 (REG_BINARY)
value: 103.143.81.180808103.143.81.1804433127.0.0.18011Tm™†NT€Á”1.0
regkey: HKEY_LOCAL_MACHINE\SOFTWARE\IpDates_info
1 0 0
Time & API Arguments Status Return Repeated

SetWindowsHookExW

thread_identifier: 0
callback_function: 0x73c0c951
hook_identifier: 14 (WH_MOUSE_LL)
module_address: 0x73c00000
1 2359727 0
Lionic Trojan.Win32.Shellcode.4!c
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
Skyhigh BehavesLike.Win32.Generic.cm
McAfee Artemis!5C3EB8C100CE
VIPRE Gen:Variant.Jaik.225374
Sangfor Trojan.Win32.Winos.swkaa
BitDefender Gen:Variant.Jaik.225374
Arcabit Trojan.Jaik.D3705E
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/ShellcodeRunner.JW
APEX Malicious
Avast Win32:TrojanX-gen [Trj]
Kaspersky HEUR:Trojan.Multi.ShellCode.gen
MicroWorld-eScan Gen:Variant.Jaik.225374
Rising Trojan.ShellCode!8.197DC (TFE:5:3Vu5mR7mZjH)
Emsisoft Gen:Variant.Jaik.225374 (B)
F-Secure Trojan.TR/Redcap.pprih
FireEye Generic.mg.5c3eb8c100cef572
Sophos Mal/Generic-S
Ikarus Trojan.Win32.Shellcoderunner
Webroot W32.Malware.Gen
Google Detected
Avira TR/Redcap.pprih
MAX malware (ai score=87)
Antiy-AVL Trojan/Win32.ShellcodeRunner
Kingsoft malware.kb.a.768
Gridinsoft Trojan.Win32.Shellcode.sa
Microsoft Trojan:Win32/Wacatac.B!ml
ZoneAlarm HEUR:Trojan.Multi.ShellCode.gen
GData Gen:Variant.Jaik.225374
Varist W32/ABRisk.ISPI-4873
DeepInstinct MALICIOUS
VBA32 BScope.Trojan.Meterpreter
Malwarebytes Backdoor.Bot
TrendMicro-HouseCall TROJ_GEN.R002H07EF24
Tencent Malware.Win32.Gencirc.1409ae50
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet Malicious_Behavior.SB
AVG Win32:TrojanX-gen [Trj]
Paloalto generic.ml
alibabacloud Trojan:Win/ShellcodeRunner.JI