Summary | ZeroBOX

test.exe

Generic Malware Malicious Library UPX PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6401 July 24, 2024, 9:45 p.m. July 24, 2024, 9:45 p.m.
Size 259.0KB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 0784da3d1a6ab997b2842fbf73b29688
SHA256 749c485da4adacfa775ecfd1d98c849b251157ef8df6de350d21a729d528e653
CRC32 D7881E7C
ssdeep 3072:c3+8oP9VR+EpZOEPot2pABIyzzZK0AujAbHchW6BzSMTIx5vD:C+pyUZVPot2aRzZKYsjeED
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Bkav W64.AIDetectMalware
DeepInstinct MALICIOUS
process: potential process injection target winlogon.exe