Summary | ZeroBOX

Content_497179.exe

NSIS Generic Malware Malicious Library UPX PE File DLL OS Processor Check PE32 BMP Format
Category Machine Started Completed
FILE s1_win7_x6401 July 2, 2024, 3:42 p.m. July 2, 2024, 3:44 p.m.
Size 7.8MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 52070a9adf4787ece9b80af208603030
SHA256 c41e5e851e0d62fe837b2b44ec114ae83a2dde3ef3943fbe37efaec94b0b6202
CRC32 2DE36732
ssdeep 196608:u288p8RT3OgtMwVajd4nXhE7OUGCZvb+CV4i8JRzY6SKg:u288+T3O6I2nXhE7OUGClb+CV4vDc
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
codeonicinc.com 104.26.8.6
IP Address Status Action
104.26.9.6 Active Moloch
164.124.101.2 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49164 -> 104.26.9.6:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.101:49167 -> 104.26.9.6:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.101:49164
104.26.9.6:443
C=US, O=Google Trust Services, CN=WE1 CN=codeonicinc.com 86:da:8b:36:46:21:b9:cf:2c:38:f1:8a:de:64:e9:75:47:0f:ee:47
TLS 1.2
192.168.56.101:49167
104.26.9.6:443
C=US, O=Google Trust Services, CN=WE1 CN=codeonicinc.com 86:da:8b:36:46:21:b9:cf:2c:38:f1:8a:de:64:e9:75:47:0f:ee:47

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

bind

ip_address: 127.0.0.1
socket: 488
port: 0
1 0 0

listen

socket: 488
backlog: 1
1 0 0

accept

ip_address:
socket: 488
port: 0
1 496 0

bind

ip_address: 127.0.0.1
socket: 468
port: 0
1 0 0

listen

socket: 468
backlog: 1
1 0 0

accept

ip_address:
socket: 468
port: 0
1 496 0
suspicious_features POST method with no referer header suspicious_request POST https://codeonicinc.com/
request POST https://codeonicinc.com/
request POST https://codeonicinc.com/
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2564
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73562000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2700
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73562000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2700
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73305000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\nshFB1B.tmp\nsDialogs.dll
file C:\Users\test22\AppData\Local\Temp\7zS40ADCD0F\setup.exe
file C:\Users\test22\AppData\Local\Temp\nshFB1B.tmp\System.dll
file C:\Users\test22\AppData\Local\Temp\nshFB1B.tmp\UAC.dll
file C:\Users\test22\AppData\Local\Temp\nshFB1B.tmp\UAC.dll
file C:\Users\test22\AppData\Local\Temp\nshFB1B.tmp\nsDialogs.dll
file C:\Users\test22\AppData\Local\Temp\7zS40ADCD0F\setup.exe
file C:\Users\test22\AppData\Local\Temp\nshFB1B.tmp\System.dll
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2564
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 458752
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x10001000
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x0008e800', u'virtual_address': u'0x0013f000', u'entropy': 7.997112804313907, u'name': u'.data', u'virtual_size': u'0x00091b7c'} entropy 7.99711280431 description A section with a high entropy has been found
entropy 0.30587603971 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
Time & API Arguments Status Return Repeated

EnumServicesStatusA

service_handle: 0x00273130
service_type: 11
service_status: 3
0 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\SpyNet
Time & API Arguments Status Return Repeated

LdrGetProcedureAddress

ordinal: 0
function_address: 0x1007d5c8
function_name: wine_get_version
module: ntdll
module_address: 0x76f10000
3221225785 0

LdrGetProcedureAddress

ordinal: 0
function_address: 0x1007d5c8
function_name: wine_get_version
module: ntdll
module_address: 0x76f10000
3221225785 0