Summary | ZeroBOX

FreeArc-0.51-win32.exe

UPX Malicious Library BMP Format PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 2, 2024, 10:04 p.m. July 2, 2024, 10:06 p.m.
Size 6.2MB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 f610dc533e6a1a631d78391705f374e9
SHA256 6539dcec7fc5f5a62e0b44dd6f796a7ef7a09c16ec43d100ac2e6ffc74a8faba
CRC32 AE0BA0E7
ssdeep 98304:1PC/ETlZEqMB5M/AJEZmUWGGE+qoX5EngjKqgyu2+7TkAOphJSlOse9syIZbRlry:8EoqqmoXU8E0inFTkxp6e9orkHRrilg
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73bc1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75b71000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73261000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c61000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c24000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2556
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72c62000
process_handle: 0xffffffff
1 0 0
Bkav W32.Common.80C3A334
Symantec Trojan Horse
Zillya Exploit.IMG.Win32.698
Jiangmin Exploit.IMG-WMF.wm
Antiy-AVL Trojan/Win32.SGeneric
Gridinsoft Malware.Win32.GenericMC.cc