Summary | ZeroBOX

WezoAutoUP.exe

CoinMiner Emotet Suspicious_Script_Bin Generic Malware AutoIt MPRESS Malicious Library Malicious Packer UPX PE64 PE File MSOffice File DLL OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us June 21, 2024, 9:45 a.m. June 21, 2024, 9:47 a.m.
Size 332.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5 46748aff6fcab034d0affddc99c6d876
SHA256 82a9537d99a9ccc5c534dd87f642a7e77b594f7554c2ed7a32a1a9518634a42c
CRC32 C038FA17
ssdeep 6144:m68oipnnK9jqXEX52Ums+Tbxzbx9SmIqQyPodMUf8Dkzel6R8zHe1IH:WfnnK9zABs+TbFx9SXOPCf8DkqAR8zHB
Yara
  • AutoIt - autoit
  • PE_Header_Zero - PE File Signature
  • CoinMiner_IN - CoinMiner
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware

IP Address Status Action
104.21.52.166 Active Moloch
164.124.101.2 Active Moloch
58.23.215.23 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49163 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49163 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49163 -> 58.23.215.23:8765 2019935 ET INFO AutoIt User Agent Executable Request Misc activity
TCP 58.23.215.23:8765 -> 192.168.56.103:49163 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.103:49163 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49163 -> 58.23.215.23:8765 2019935 ET INFO AutoIt User Agent Executable Request Misc activity
TCP 192.168.56.103:49172 -> 104.21.52.166:80 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49172 -> 104.21.52.166:80 2027360 ET INFO AutoIt User-Agent Downloading ZIP Misc activity
TCP 192.168.56.103:49172 -> 104.21.52.166:80 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2019935 ET INFO AutoIt User Agent Executable Request Misc activity
TCP 58.23.215.23:8765 -> 192.168.56.103:49179 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 192.168.56.103:49163 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49163 -> 58.23.215.23:8765 2019935 ET INFO AutoIt User Agent Executable Request Misc activity
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2019935 ET INFO AutoIt User Agent Executable Request Misc activity
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2019935 ET INFO AutoIt User Agent Executable Request Misc activity
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2019935 ET INFO AutoIt User Agent Executable Request Misc activity
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2019935 ET INFO AutoIt User Agent Executable Request Misc activity
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2019935 ET INFO AutoIt User Agent Executable Request Misc activity
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49179 -> 58.23.215.23:8765 2019935 ET INFO AutoIt User Agent Executable Request Misc activity

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleA

buffer: 7-Zip 20.00 alpha (x86) : Copyright (c) 1999-2020 Igor Pavlov : 2020-02-06
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Scanning the drive for archives:
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: 0M Scan D:\
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: ERROR:
console_handle: 0x0000000b
1 1 0

WriteConsoleA

buffer: The parameter is incorrect.
console_handle: 0x0000000b
1 1 0

WriteConsoleA

buffer: D:\verysync-windows-amd64-v2.15.0.zip
console_handle: 0x0000000b
1 1 0

WriteConsoleA

buffer: System ERROR:
console_handle: 0x0000000b
1 1 0

WriteConsoleA

buffer: The parameter is incorrect.
console_handle: 0x0000000b
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
packer UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x77710895
stacktrace+0x84 memdup-0x1af @ 0x749a0470
hook_in_monitor+0x45 lde-0x133 @ 0x749942ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x749b3603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefdc03243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefdc031fb
changezuhaolnk+0xa7bec @ 0x1400a7bec
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76fc2ef0
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff
0xfafff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x77710895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 4388408
registers.rsi: 5369741312
registers.r10: 0
registers.rbx: 1996238576
registers.rsp: 4390664
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 4389752
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 4388088
registers.r13: 0
1 0 0
request GET http://dl-cn.verysync.com/releases/v2.15.0/verysync-windows-amd64-v2.15.0.zip
request GET http://dl-cn.verysync.com/releases/
file C:\Users\test22\AppData\Local\Temp\storyhosts.exe
file C:\Users\test22\AppData\Local\Temp\7z.exe
file C:\Users\test22\AppData\Local\Temp\DownVerySync.exe
file C:\Users\test22\AppData\Local\Temp\changezuhaolnk.exe
file C:\Users\test22\AppData\Local\Temp\dbzclientUpdate.exe
file C:\Users\test22\AppData\Local\Temp\WezoEventUP.exe
file C:\Users\test22\AppData\Local\Temp\7z.dll
file C:\Users\test22\AppData\Local\Temp\wzoptup.exe
file C:\Users\test22\AppData\Local\Temp\DelHosts.exe
file C:\Users\test22\AppData\Local\Temp\sysup.exe
file C:\Users\test22\AppData\Local\Temp\wzoptBmp.exe
file C:\Users\test22\AppData\Local\Temp\arpwriteIni.exe
cmdline C:\Windows\system32\cmd.exe /c ipconfig
file C:\Users\test22\AppData\Local\Temp\wzoptup.exe
file C:\Users\test22\AppData\Local\Temp\arpwriteIni.exe
file C:\Users\test22\AppData\Local\Temp\7z.dll
file C:\Users\test22\AppData\Local\Temp\storyhosts.exe
file C:\Users\test22\AppData\Local\Temp\sysup.exe
file C:\Users\test22\AppData\Local\Temp\7z.exe
file C:\Users\test22\AppData\Local\Temp\WezoEventUP.exe
file C:\Users\test22\AppData\Local\Temp\dbzclientUpdate.exe
file C:\Users\test22\AppData\Local\Temp\wzoptBmp.exe
file C:\Users\test22\AppData\Local\Temp\DelHosts.exe
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 198
family: 0
111 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@ º´ Í!¸LÍ!This program cannot be run in DOS mode. $šÇƒ®Þ¦íýÞ¦íýÞ¦íýj:ýý¦íýj:ýC¦íýj:ýý¦íý@*ýߦíýŒÎèüó¦íýŒÎéü̦íýŒÎîü˦íý×Þnýצíý×Þ~ýû¦íýÞ¦ìý÷¤íý{ÏãüŽ¦íý{Ïîüߦíý{ÏýߦíýÞ¦zýߦíý{ÏïüߦíýRichÞ¦íýPELs£ícà" Ð  °f  p@@€@@ƒ$p<‡¤hÄh UPX0 €àUPX1Р Ê@à.rsrc pÎ@À3.91UPX!  0ªÿqµµÒ”N¥Æ &æ
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $¹µníýÔ¾ýÔ¾ýÔ¾nš˜¾ÿÔ¾æIª¾JÔ¾æI«¾ÈÔ¾ô¬ƒ¾ôÔ¾ô¬“¾ÜÔ¾ýÔ¾íÖ¾æI´¾´Ô¾æIž¾ÊÔ¾æIš¾üÔ¾ýԗ¾üÔ¾æI¾üÔ¾RichýÔ¾PELŒ´-Oà#  °€À@w Ѐ @ €@@8ð °€ 8pUPX0À€àUPX1°Ðª@à.rsrc€€ t®@À3.08UPX!  ݽÞüwXÐ3[Q 9§à &X
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@0º´ Í!¸LÍ!This program cannot be run in DOS mode. $o1)ë+PG¸+PG¸+PG¸ŸÌ¶¸>PG¸ŸÌ´¸·PG¸ŸÌµ¸ PG¸µð€¸*PG¸y8B¹PG¸y8C¹:PG¸y8D¹#PG¸"(ĸ#PG¸"(À¸*PG¸"(Ô¸PG¸+PF¸RG¸Ž9I¹{PG¸Ž9D¹*PG¸Ž9¸¸*PG¸+Pи*PG¸Ž9E¹*PG¸Rich+PG¸PEd†4ìcð" 4 .U@ঢ়`@@0\|°¬ @<oÐt Pp  š (pp P 8.textP3 4  `.rdata$BP D8 @@.data(‘ P|@À.pdata<o@pÌ@@.rsrc¬ ° <@@.reloct Ð Z@B
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $¹µníýÔ¾ýÔ¾ýÔ¾nš˜¾ÿÔ¾æIª¾JÔ¾æI«¾ÈÔ¾ô¬ƒ¾ôÔ¾ô¬“¾ÜÔ¾ýÔ¾íÖ¾æI´¾´Ô¾æIž¾ÊÔ¾æIš¾üÔ¾ýԗ¾üÔ¾æI¾üÔ¾RichýÔ¾PELŒ´-Oà#  °€À@w Ѐ @ €@@8ð °€ 8pUPX0À€àUPX1°Ðª@à.rsrc€€ t®@À3.08UPX!  ݽÞüwXÐ3[Q 9§³Û &
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $¹µníýÔ¾ýÔ¾ýÔ¾nš˜¾ÿÔ¾æIª¾JÔ¾æI«¾ÈÔ¾ô¬ƒ¾ôÔ¾ô¬“¾ÜÔ¾ýÔ¾íÖ¾æI´¾´Ô¾æIž¾ÊÔ¾æIš¾üÔ¾ýԗ¾üÔ¾æI¾üÔ¾RichýÔ¾PELŒ´-Oà#  °€À@w Ѐ @ €@@8ð °€ 8pUPX0À€àUPX1°Ðª@à.rsrc€€ t®@À3.08UPX!  ݽÞüwXÐ3[Q 9§â &\
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $&’`’bóÁbóÁbóÁ$¢ïÁ`óÁüSÉÁcóÁo¡ÑÁQóÁo¡îÁÓóÁo¡ïÁWóÁk‹ÁkóÁk‹ÁGóÁbóÁ|ñÁG„äÁ,óÁG„ÑÁcóÁo¡ÕÁcóÁbó™ÁcóÁG„ÐÁcóÁRichbóÁPELch;fà"    pà€ð@@€@@”ö$”f¸ú dHUPX0à€àUPX1  ð  @à.rsrcpl¤ @À3.91UPX!  þßæ“ÊmM hk Ä&R
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $&’`’bóÁbóÁbóÁ$¢ïÁ`óÁüSÉÁcóÁo¡ÑÁQóÁo¡îÁÓóÁo¡ïÁWóÁk‹ÁkóÁk‹ÁGóÁbóÁ|ñÁG„äÁ,óÁG„ÑÁcóÁo¡ÕÁcóÁbó™ÁcóÁG„ÐÁcóÁRichbóÁPEL]ˆbà"  p°×"Àà"@P#@€@@”F#$à"”f¸J# tÙ"HUPX0°€àUPX1 À@à.rsrcpà"l@À3.91UPX!  (—,oi¶¹7h;!‰Š &
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $&’`’bóÁbóÁbóÁ$¢ïÁ`óÁüSÉÁcóÁo¡ÑÁQóÁo¡îÁÓóÁo¡ïÁWóÁk‹ÁkóÁk‹ÁGóÁbóÁ|ñÁG„äÁ,óÁG„ÑÁcóÁo¡ÕÁcóÁbó™ÁcóÁG„ÐÁcóÁRichbóÁPELšåcà"   p°`VÀ`@Ð@€@@ÈÄ$`ÈdìÈ DXHUPX0°€àUPX1 Àš@à.rsrcp`jž@À3.91UPX!  `3•/wtah{`–Î&'
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $b`÷ã&™°&™°&™°’h°+™°’j°«™°’k°>™°¸¡^°$™°_š±0™°_±5™°_œ± ™°/y°,™°/y °#™°&˜°*™°±_œ±™°±_™±'™°´_f°'™°±_›±'™°Rich&™°PELׄÆ_à ²@ì0@@@Á È4TÈ<0°Òh"ÀªTU@0`Ľ .textê `.rdata¦0¨@@.data(7à¾@À.didatˆ Î@À.rsrc°Ò0ÔÐ@@.reloch"$¤@B
request_handle: 0x00cc000c
1 1 0
section {u'size_of_data': u'0x0004aa00', u'virtual_address': u'0x0007d000', u'entropy': 7.940965856094214, u'name': u'UPX1', u'virtual_size': u'0x0004b000'} entropy 7.94096585609 description A section with a high entropy has been found
entropy 0.911450381679 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
process cmd.exe
section UPX0 description Section name indicates UPX
section UPX1 description Section name indicates UPX
cmdline ipconfig
cmdline C:\Windows\system32\cmd.exe /c ipconfig
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WezoAotoUp reg_value "C:\Users\test22\AppData\Local\Temp\WezoAutoUP.exe"
file C:\Users\test22\AppData\Local\Temp\changezuhaolnk.exe
file C:\Users\test22\AppData\Local\Temp\storyhosts.exe
cmdline C:\Users\test22\AppData\Local\Temp\DownVerySync.exe
Bkav W32.AIDetectMalware
Lionic Trojan.Multi.Generic.lrP4
Elastic malicious (moderate confidence)
Cynet Malicious (score: 99)
Skyhigh BehavesLike.Win32.AutoitDropper.fc
Cylance Unsafe
Sangfor Trojan.Win32.Agent.V6xa
K7AntiVirus Trojan ( 0056e5201 )
K7GW Trojan ( 0056e5201 )
VirIT Trojan.Win32.Generic.XTX
Symantec Trojan.Gen.MBT
ESET-NOD32 multiple detections
APEX Malicious
McAfee RDN/YahLover.worm
Avast Win32:Evo-gen [Trj]
ClamAV Win.Malware.Generic-6651791-0
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Packed:Win32/Generic.4fad0b70
F-Secure Dropper.DR/AutoIt.Gen
DrWeb Trojan.Siggen5.59949
TrendMicro TROJ_GEN.R002C0PET24
McAfeeD ti!82A9537D99A9
Trapmine malicious.high.ml.score
FireEye Generic.mg.46748aff6fcab034
Sophos Mal/Generic-S
Ikarus PUA.Autoit
Webroot W32.Trojan.Gen
Google Detected
Avira DR/AutoIt.Gen
Antiy-AVL Trojan[Packed]/Win32.Autoit
Kingsoft Win32.Troj.Unknown.a
Gridinsoft Trojan.Win32.CoinMiner.dd!s2
Xcitium TrojWare.Win32.Hider.REXR@5364l6
Microsoft Trojan:Win32/Casdet!rfn
ViRobot Trojan.Win32.A.Agent.690283[UPX]
ZoneAlarm UDS:DangerousObject.Multi.Generic
GData Win32.Trojan.PSE.R2WKDE
Varist W32/Trojan.IJBN-1595
DeepInstinct MALICIOUS
VBA32 IMWorm.Sohanad
Malwarebytes Generic.Malware.AI.DDS
Panda Trj/Chgt.AD
TrendMicro-HouseCall TROJ_GEN.R002C0PET24
Tencent Autoit.Trojan.Autoit.Gajl
Yandex Trojan.GenAsa!i9rai7w7/WE
MaxSecure Trojan.Malware.204083740.susgen
Fortinet Riskware/YahLover
AVG Win32:Evo-gen [Trj]
Paloalto generic.ml
CrowdStrike win/malicious_confidence_100% (W)