Summary | ZeroBOX

SequencesPassage.exe

Generic Malware Malicious Library UPX PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Aug. 23, 2024, 9:47 a.m. Aug. 23, 2024, 9:53 a.m.
Size 1012.3KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 dadfa6f51c990b1b4f5520f3a8e2c824
SHA256 d43af0c0a5058412c903698b4ac55f150f6a20cac43344b5a596906780dac1f7
CRC32 1FD0C103
ssdeep 24576:QzZmhskEKg3ADrO2paC5fgNl+ydoqyZH/M9OI9m8toYxILUj1:QchHgm9paCyNl+51Hk93m8aYAE
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) moved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Becoming=0
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: uMBkSalary
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Acid Contacts Reaching
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'uMBkSalary' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: HjTwo
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Disciplines
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'HjTwo' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: RFFjMaple
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Dj Analyses Themes Reward
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'RFFjMaple' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: XOROViruses
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'XOROViruses' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ZWRetrieval
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ZWRetrieval' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ackaStar
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Circles Contained Be Beauty Remember Bibliography
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ackaStar' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: nGMysimon
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Intervention
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'nGMysimon' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: dGtHear
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'dGtHear' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: sFgeExcitement
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Surge Avg Php Description Sociology Exports Compaq Lanes
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'sFgeExcitement' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: MDSword
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Ap Reseller Knew Medal Extract
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'MDSword' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Valentine=I
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: CvdFoundations
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Shadows Jews
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'CvdFoundations' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: jUiRisk
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
file C:\Users\test22\AppData\Local\Temp\404587\Km.pif
cmdline "C:\Windows\System32\cmd.exe" /k move Publications Publications.cmd & Publications.cmd & exit
file C:\Users\test22\AppData\Local\Temp\404587\Km.pif
file C:\Users\test22\AppData\Local\Temp\404587\Km.pif
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /k move Publications Publications.cmd & Publications.cmd & exit
filepath: cmd
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline tasklist
Bkav W32.AIDetectMalware
Sangfor Trojan.Win32.Agent.Vzbh
Symantec Trojan.Gen.MBT
Paloalto generic.ml
DrWeb Trojan.PWS.StealC.4
McAfeeD ti!D43AF0C0A505
Sophos Mal/Generic-S
Webroot W32.Malware.Gen
Gridinsoft Malware.Win32.Stealc.tr
ZoneAlarm HEUR:Trojan.Win32.Autoit.gen
TrendMicro-HouseCall TrojanSpy.Win32.STEALC.YXEHVZ
huorong Trojan/Runner.ba
Fortinet NSIS/Runner.AV!tr
DeepInstinct MALICIOUS
CrowdStrike win/grayware_confidence_60% (D)
Process injection Process 2092 resumed a thread in remote process 2640
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000084
suspend_count: 0
process_identifier: 2640
1 0 0