Summary | ZeroBOX

arphaDump64.dll

Malicious Library PE64 PE File DLL
Category Machine Started Completed
FILE s1_win7_x6401 June 18, 2024, 9:36 a.m. June 18, 2024, 9:38 a.m.
Size 55.0KB
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5 b60a81a659f6a8228c3e5df7f1c0819a
SHA256 0f4c555dc838ea3ba222b6d64e93be6400f5eccb6ae432a653fb5688eff719d5
CRC32 6084881B
ssdeep 1536:z4qguMDQRDG4S/GvGMZ4dvkAxcmgdSrna:z4qgbDQtG+Ydv/xcmgwrn
PDB Path C:\Users\Admin\Documents\Visual Studio 2008\Projects\dlll\x64\Release\dlll.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • IsDLL - (no description)
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
pdb_path C:\Users\Admin\Documents\Visual Studio 2008\Projects\dlll\x64\Release\dlll.pdb
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2876
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2920
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2956
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
Kaspersky Trojan.Win64.DLLhijack.iw
Rising Trojan.DLLhijack!8.1B50 (CLOUD)
ZoneAlarm Trojan.Win64.DLLhijack.iw
MaxSecure Win.MxResIcn.Heur.Gen