Summary | ZeroBOX

NorthSperm.exe

Generic Malware Malicious Library UPX PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Aug. 17, 2024, 10:13 p.m. Aug. 17, 2024, 10:27 p.m.
Size 1.5MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ff83471ce09ebbe0da07d3001644b23c
SHA256 9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba
CRC32 3BA86D43
ssdeep 24576:nK7tMGUfQtpOdk3xWBq0qWH6JubmMTzfZwLDC4pZylqUAc2:JQ7AkiqQaJjMHWvlpOqUt2
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) moved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Yrs=Z
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: gndNPine
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Urw Url Dk Appearance Exception Creating Latter
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'gndNPine' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: sDBMDear
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Forecasts Ss Tv Transport Bangladesh Genetics
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'sDBMDear' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: EhojDefend
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Kit Discounted
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'EhojDefend' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: dxTvs
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Judges Examine Transparent Investments Male Doctrine Treasury
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'dxTvs' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: uKxISymantec
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Locale Idea
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'uKxISymantec' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Mail=O
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: vSaJShow
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'vSaJShow' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: YqBelt
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Derek Celebrities Strips Seller Republicans Antarctica
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'YqBelt' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: nzPbInvestigations
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Med Ribbon Monday Alive Fox Washington Smooth
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'nzPbInvestigations' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: VKvrOttawa
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Shown
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'VKvrOttawa' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: BfVAmd
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Inquiries Difficulty
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'BfVAmd' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: numAAffiliation
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'numAAffiliation' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
file C:\Users\test22\AppData\Local\Temp\719580\Optimum.pif
cmdline "C:\Windows\System32\cmd.exe" /k move Surrey Surrey.cmd && Surrey.cmd && exit
file C:\Users\test22\AppData\Local\Temp\719580\Optimum.pif
file C:\Users\test22\AppData\Local\Temp\719580\Optimum.pif
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /k move Surrey Surrey.cmd && Surrey.cmd && exit
filepath: cmd
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline tasklist
Process injection Process 2148 resumed a thread in remote process 2648
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000084
suspend_count: 0
process_identifier: 2648
1 0 0