Summary | ZeroBOX

ghjkl.exe

.NET framework(MSIL) Malicious Library PE32 PE File .NET EXE
Category Machine Started Completed
FILE s1_win7_x6403_us July 7, 2024, 6:48 p.m. July 7, 2024, 6:56 p.m.
Size 5.4MB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 a2a9c309c5300a53d2c2fc41b71b174b
SHA256 7ccfae8644c3bc7439b88f2dc0de06bb5082de09b0bf5e143de17487ff252224
CRC32 0A20A45F
ssdeep 98304:j+ddAtuMvY00V2vtQSH7OuqeGszSQTADu0mL63KQOKvYA1ZuoyQPNf+xKi:wdOuMvc8VdbOuqePmQTAKH63NYAiGfiT
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 327680
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00410000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1880
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73f31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1880
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73f32000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 524288
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00610000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00650000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00462000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00495000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0049b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00497000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0047c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00740000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1880
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0046a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
section {u'size_of_data': u'0x00570400', u'virtual_address': u'0x00002000', u'entropy': 7.999918252377611, u'name': u'.text', u'virtual_size': u'0x005703e8'} entropy 7.99991825238 description A section with a high entropy has been found
entropy 0.999640998025 description Overall entropy of this PE file is high
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Blocker.V!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Generic.36464688
Skyhigh BehavesLike.Win32.Generic.tc
ALYac Trojan.Generic.36464688
Cylance Unsafe
VIPRE Trojan.Generic.36464688
Sangfor Trojan.Msil.Agent.Vt8v
K7AntiVirus Trojan ( 005b709c1 )
BitDefender Trojan.Generic.36464688
K7GW Trojan ( 005b709c1 )
BitDefenderTheta Gen:NN.ZemsilF.36808.@p0@aOb!1Pb
VirIT Trojan.Win32.MSIL.GWA
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of MSIL/GenKryptik.GYTO
APEX Malicious
Avast Win32:CrypterX-gen [Trj]
Kaspersky HEUR:Trojan-Ransom.MSIL.Blocker.gen
Alibaba Ransom:MSIL/Blocker.442b871e
Rising Malware.Obfus/MSIL@AI.97 (RDM.MSIL2:Gn4r5/xJVWdkEB3o+lVXQQ)
Emsisoft Trojan.Generic.36464688 (B)
F-Secure Trojan.TR/Dropper.Gen
DrWeb Trojan.PackedNET.2939
Zillya Trojan.GenKryptik.Win32.805747
TrendMicro TrojanSpy.Win32.RHADAMANTHYS.YXEFWZ
McAfeeD Real Protect-LS!A2A9C309C530
Trapmine malicious.high.ml.score
FireEye Generic.mg.a2a9c309c5300a53
Sophos Mal/Generic-S
Ikarus Trojan.MSIL.Krypt
Webroot W32.Trojan.Gen
Google Detected
Avira TR/Dropper.Gen
MAX malware (ai score=85)
Antiy-AVL Trojan[Ransom]/MSIL.Blocker
Kingsoft MSIL.Trojan-Ransom.Blocker.gen
Gridinsoft Malware.Win32.Gen.tr
Arcabit Trojan.Generic.D22C6830
ViRobot Trojan.Win.Z.Blocker.5705216
ZoneAlarm HEUR:Trojan-Ransom.MSIL.Blocker.gen
GData Trojan.Generic.36464688
Varist W32/ABTrojan.UMFW-6567
AhnLab-V3 Trojan/Win.Mardom.C5644200
DeepInstinct MALICIOUS
Malwarebytes Spyware.PasswordStealer
Panda Trj/Chgt.AD
TrendMicro-HouseCall TrojanSpy.Win32.RHADAMANTHYS.YXEFWZ
Tencent Malware.Win32.Gencirc.10c00a7e
SentinelOne Static AI - Malicious PE