Summary | ZeroBOX

winwrt.exe

Malicious Library UPX Malicious Packer Anti_VM PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6403_us July 11, 2024, 1:20 p.m. July 11, 2024, 1:44 p.m.
Size 6.5MB
Type PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
MD5 738be35e781a93b2f3486268fcbf2d6e
SHA256 61a6c1560ac095f3fc66beadcc5f1f430c3cb0394fa77f0d369f694eb1a2685f
CRC32 E7DE1A1C
ssdeep 49152:87JozavjZrb/T3vO90d7HjmAFd4A64nsfJrCyhvB9AolOjOThQLQ+JO22gltDkYX:sfYfglBRcE3BTiIWqMnM
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .symtab
Skyhigh BehavesLike.Win64.HToolWinGo.vh
McAfeeD ti!61A6C1560AC0
DeepInstinct MALICIOUS
MaxSecure Trojan.Malware.300983.susgen
CrowdStrike win/malicious_confidence_60% (D)
Time & API Arguments Status Return Repeated

NtQuerySystemInformation

information_class: 8 (SystemProcessorPerformanceInformation)
1 0 0
Time & API Arguments Status Return Repeated

LdrGetProcedureAddress

ordinal: 0
function_address: 0x000007fefe467a50
function_name: wine_get_version
module: ntdll
module_address: 0x00000000776c0000
-1073741511 0