Summary | ZeroBOX

Gamesense.rar

KeyLogger PWS Escalate priviledges AntiDebug AntiVM
Category Machine Started Completed
FILE s1_win7_x6402 July 3, 2024, 9:46 a.m. July 3, 2024, 9:49 a.m.
Size 68.4KB
Type RAR archive data, v5
MD5 b1adc1e869b9d40b6d9c8550cd129268
SHA256 991fbd8f8738d75011be7b07ef3054a72e78c59a630fdf5486c57effdeae15d0
CRC32 D05CF790
ssdeep 1536:EcN3/NiXSb1nHJGTk/zD0TzKkoxPmZq6vsqdTcTEcXLM8S:Ect4Xy9pGTk/n03KkoMZbkAmE+o
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74002000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x737e3000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\7zE0981DCA6\Gamesense.exe
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0
description Escalate priviledges rule Escalate_priviledges
description PWS Memory rule Generic_PWS_Memory_Zero
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Run a KeyLogger rule KeyLogger
Cynet Malicious (score: 99)
CAT-QuickHeal Worm.CFC.S31613722
Skyhigh BehavesLike.Generic.kc
Malwarebytes Backdoor.XWorm.Generic
VIPRE Gen:Variant.Jalapeno.640
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 005aa5f01 )
K7GW Trojan ( 005aa5f01 )
Arcabit Trojan.Jalapeno.640
VirIT Trojan.Win32.MSIL_Heur.B
ESET-NOD32 a variant of MSIL/Agent.DWN
Avast Win32:RATX-gen [Trj]
ClamAV Win.Packed.njRAT-10002074-1
Kaspersky HEUR:Backdoor.MSIL.XWorm.gen
BitDefender Gen:Variant.Jalapeno.640
Rising Trojan.AntiVM!1.CF63 (CLASSIC)
Emsisoft Gen:Variant.Jalapeno.640 (B)
F-Secure Trojan.TR/Spy.Gen
DrWeb BackDoor.BladabindiNET.30
FireEye Gen:Variant.Jalapeno.640
Sophos Troj/RAT-FJ
Ikarus Trojan.MSIL.Agent
Google Detected
Avira TR/Spy.Gen
MAX malware (ai score=81)
Microsoft Trojan:MSIL/AsyncRAT.R!MTB
ZoneAlarm HEUR:Backdoor.MSIL.XWorm.gen
GData MSIL.Trojan.PSE.VTQMFW
Varist W32/MSIL_Agent.BUD.gen!Eldorado
AhnLab-V3 Trojan/Win.AntiVm.C5374869
BitDefenderTheta Gen:NN.ZemsilF.36808.wm0@aqMqeNl
DeepInstinct MALICIOUS
VBA32 Backdoor.MSIL.XWorm.gen
Tencent Trojan.MSIL.Agent.16000605
SentinelOne Static AI - Malicious Archive
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/Bladabindi.SSNY!tr
AVG Win32:RATX-gen [Trj]