Summary | ZeroBOX

66ca20a26df75_PastaCache.exe#inst

Generic Malware Malicious Library UPX PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Aug. 25, 2024, 6:42 p.m. Aug. 25, 2024, 6:59 p.m.
Size 929.2KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 377dcc031a12d3c0189afe684e4ad41e
SHA256 464e16f6d92d3c9eddeef69f7b1416fefb97817732155fe3549f37986d26fc44
CRC32 A3A19676
ssdeep 24576:DzZFjuoNQGf5CIEAi0TWYNXi+dvD/ReHBDW/R:DTCs3fti05JR9K4
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) moved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Collaboration=5
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ekYOrganized
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Till Rainbow
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ekYOrganized' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ltWChallenged
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ltWChallenged' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ZDlVisitors
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Hybrid Enclosed Encounter Tommy Effectiveness Obligation
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ZDlVisitors' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: uFiDome
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Privilege Interfaces Cl Ns Expanded
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'uFiDome' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: IUVOAnna
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Brush Bool Allows
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'IUVOAnna' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ybFiling
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Laughing Courage Albania Decent Religion
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ybFiling' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: JHSafely
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Briefing
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'JHSafely' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Dublin=n
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: jGZSQuilt
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Main Sum Arrived Peter Vs
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'jGZSQuilt' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: PpDescribes
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Admitted Christian Moderator Dozens Rolled
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'PpDescribes' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: vWTClouds
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'vWTClouds' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: JuArtists
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Infrastructure Enables Sum Guatemala Conscious
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'JuArtists' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
file C:\Users\test22\AppData\Local\Temp\104992\Direct.pif
cmdline "C:\Windows\System32\cmd.exe" /k move Kitchen Kitchen.bat & Kitchen.bat & exit
file C:\Users\test22\AppData\Local\Temp\104992\Direct.pif
file C:\Users\test22\AppData\Local\Temp\104992\Direct.pif
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /k move Kitchen Kitchen.bat & Kitchen.bat & exit
filepath: cmd
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline tasklist
cmdline "C:\Windows\System32\cmd.exe" /k move Kitchen Kitchen.bat & Kitchen.bat & exit
cmdline cmd /k move Kitchen Kitchen.bat & Kitchen.bat & exit
Bkav W32.AIDetectMalware
Elastic malicious (high confidence)
Skyhigh Artemis!Trojan
McAfee Artemis!377DCC031A12
Kaspersky UDS:DangerousObject.Multi.Generic
McAfeeD ti!464E16F6D92D
Webroot W32.Trojan.Gen
Kingsoft Win32.Trojan.Autoit.gen
Gridinsoft Spy.Win32.Vidar.tr
Microsoft Trojan:Win32/Sabsik.FL.A!ml
ZoneAlarm UDS:DangerousObject.Multi.Generic
TrendMicro-HouseCall TrojanSpy.Win32.VIDAR.YXEHYZ
huorong Trojan/Runner.ba
Paloalto generic.ml
CrowdStrike win/malicious_confidence_70% (W)
Process injection Process 2072 resumed a thread in remote process 2572
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000084
suspend_count: 0
process_identifier: 2572
1 0 0