Summary | ZeroBOX

random.exe

UPX Malicious Library OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 14, 2024, 5:45 p.m. July 14, 2024, 5:51 p.m.
Size 429.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 233ea23b1c1587f1cf895f08ba6da10b
SHA256 c7e20eafa32a38282616d78c43c574991d30fe2fbc876141fa76e5ff538c3b5c
CRC32 F5BB76F4
ssdeep 6144:mA9KjaHcwQq8DvrqYTs8HinSRR9fYCDX9Y9yTDRLN:mAkjavQjDvt8SRzDYAb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2668
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 233472
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02c5e000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2668
region_size: 434176
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02b80000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
name RT_ICON language LANG_JAPANESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x02450eb0 size 0x00000468
name RT_ICON language LANG_JAPANESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x02450eb0 size 0x00000468
name RT_ICON language LANG_JAPANESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_DEFAULT offset 0x02450eb0 size 0x00000468
name RT_STRING language LANG_JAPANESE filetype data sublanguage SUBLANG_DEFAULT offset 0x02451d00 size 0x00000322
name RT_STRING language LANG_JAPANESE filetype data sublanguage SUBLANG_DEFAULT offset 0x02451d00 size 0x00000322
name RT_STRING language LANG_JAPANESE filetype data sublanguage SUBLANG_DEFAULT offset 0x02451d00 size 0x00000322
name RT_GROUP_ICON language LANG_JAPANESE filetype data sublanguage SUBLANG_DEFAULT offset 0x02451318 size 0x00000030
section {u'size_of_data': u'0x0003f800', u'virtual_address': u'0x00001000', u'entropy': 7.941071191359724, u'name': u'.text', u'virtual_size': u'0x0003f7be'} entropy 7.94107119136 description A section with a high entropy has been found
entropy 0.59276546091 description Overall entropy of this PE file is high
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.SmokeLoader.4!c
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win32.Generic.gm
ALYac Trojan.Generic.36534197
Cylance Unsafe
VIPRE Trojan.Generic.36534197
Sangfor Trojan.Win32.Save.a
K7AntiVirus Riskware ( 00584baa1 )
BitDefender Trojan.Generic.36534197
K7GW Riskware ( 00584baa1 )
Arcabit Trojan.Generic.D22D77B5
VirIT Trojan.Win32.Genus.WAJ
Symantec Trojan.FakeAV
tehtris Generic.Malware
ESET-NOD32 a variant of Win32/Kryptik.HXMG
APEX Malicious
Avast Win32:CrypterX-gen [Trj]
ClamAV Win.Packer.pkr_ce1a-9980177-0
Kaspersky HEUR:Trojan.Win32.Agent.gen
Alibaba Trojan:Win32/SmokeLoader.cddc9613
MicroWorld-eScan Trojan.Generic.36534197
Rising Stealer.Tepfer!8.13357 (CLOUD)
Emsisoft Trojan.Generic.36534197 (B)
F-Secure Trojan.TR/AD.GenSHCode.pxiua
DrWeb Trojan.DownLoader47.8409
TrendMicro Trojan.Win32.AMADEY.YXEGKZ
McAfeeD Real Protect-LS!233EA23B1C15
Trapmine malicious.moderate.ml.score
FireEye Generic.mg.233ea23b1c1587f1
Sophos Troj/Krypt-VK
Ikarus Trojan-PWS.Win32.Tepfer
Webroot W32.Trojan.Gen
Google Detected
Avira TR/AD.GenSHCode.pxiua
MAX malware (ai score=80)
Antiy-AVL Trojan[PSW]/Win32.Tepfer
Kingsoft malware.kb.a.1000
Gridinsoft Trojan.Win32.Amadey.tr
Xcitium Malware@#32cc2ge7hjakp
Microsoft Trojan:Win32/SmokeLoader.SMZ!MTB
ZoneAlarm HEUR:Trojan.Win32.Agent.gen
GData Win32.Packed.Kryptik.FIX18U
Varist W32/Kryptik.MIZ.gen!Eldorado
AhnLab-V3 Trojan/Win.SmokeLoader.R657887
Acronis suspicious
BitDefenderTheta Gen:NN.ZexaF.36808.Aq0@aWI!nziG
DeepInstinct MALICIOUS
VBA32 TrojanDownloader.Deyma