Summary | ZeroBOX

file.exe

Generic Malware Malicious Library UPX PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Aug. 10, 2024, 12:28 p.m. Aug. 10, 2024, 12:50 p.m.
Size 951.3KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e530d19a769bcd90ec3e92ebf08d68e9
SHA256 feb872b8a43d6a65ed3aa7e97dfa6c729c9e6fdf31ca913cbdbf2051d990fd36
CRC32 0259724E
ssdeep 24576:VouY8YFDfePwag4UuD8fb12btPSMAs+10lDgJHuA:tYZBW4uD8fxstPSMAP10lD
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) moved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Nutten=u
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: agnAcoustic
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Proposal
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'agnAcoustic' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: BwkSalon
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Antenna Partner Opposite
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'BwkSalon' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: AQSpPartial
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Anger
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'AQSpPartial' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: JPKVessels
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Internship
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'JPKVessels' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: wFJPMarriage
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Keeps Nightmare
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'wFJPMarriage' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Goals=A
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: OLkGolf
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Traveling Href Oz Supports
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'OLkGolf' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: MWBDecorative
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Uc Lesbian Counting Yang Confused Mine
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'MWBDecorative' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: jdoSrc
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Gross Executives Advertisement
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'jdoSrc' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ncStrict
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: European Executive Civic Hard
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ncStrict' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: OdEmPiss
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Cheats Beans
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'OdEmPiss' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: FYxxApril
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Courage Kinds Till February Angel
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
file C:\Users\test22\AppData\Local\Temp\473722\Instrumental.pif
cmdline "C:\Windows\System32\cmd.exe" /k move Kathy Kathy.cmd & Kathy.cmd & exit
file C:\Users\test22\AppData\Local\Temp\473722\Instrumental.pif
file C:\Users\test22\AppData\Local\Temp\473722\Instrumental.pif
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /k move Kathy Kathy.cmd & Kathy.cmd & exit
filepath: cmd
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline tasklist
Process injection Process 2068 resumed a thread in remote process 2572
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000001c
suspend_count: 0
process_identifier: 2572
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Autoit.4!c
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
Skyhigh Artemis!Trojan
ALYac Trojan.Generic.36679740
Cylance Unsafe
VIPRE Trojan.Generic.36679740
Sangfor Trojan.Win32.Autoit.Vm78
BitDefender Trojan.Generic.36679740
Symantec Trojan.Gen.MBT
ESET-NOD32 a variant of Win32/Packed.NSIS.J suspicious
Avast Win32:Malware-gen
Kaspersky HEUR:Trojan.Win32.Autoit.gen
Alibaba Trojan:MSIL/RedlineStealer.75fa803f
MicroWorld-eScan Trojan.Generic.36679740
Emsisoft Trojan.Generic.36679740 (B)
F-Secure Trojan.TR/AutoIt.nyoht
McAfeeD ti!FEB872B8A43D
FireEye Trojan.Generic.36679740
Sophos Mal/Generic-S
Webroot W32.Trojan.Gen
Google Detected
Avira TR/AutoIt.nyoht
MAX malware (ai score=82)
Antiy-AVL Trojan/Win32.Autoit
Kingsoft Win32.Trojan.Autoit.gen
Gridinsoft Malware.Win32.RedLine.tr
Xcitium Malware@#3w5b4ycetlh45
ZoneAlarm HEUR:Trojan.Win32.Autoit.gen
McAfee Artemis!E530D19A769B
DeepInstinct MALICIOUS
VBA32 TrojanPSW.RedLine
Malwarebytes Malware.AI.1516156981
Ikarus Trojan.SuspectCRC
Panda Trj/Chgt.AD
TrendMicro-HouseCall TROJ_GEN.R011C0DH824
Tencent Win32.Trojan.FalseSign.Bgow
huorong Trojan/Injector.btr
Fortinet W32/NDAoF
AVG Win32:Malware-gen
Paloalto generic.ml
CrowdStrike win/malicious_confidence_70% (W)
alibabacloud Trojan:Win/Autoit.gyf