Summary | ZeroBOX

byebyefronbypass.exe

Emotet Gen1 Generic Malware Malicious Library Antivirus UPX Malicious Packer Admin Tool (Sysinternals etc ...) Anti_VM ftp .NET DLL PE File PE64 dll OS Processor Check PE32 ZIP Format wget DLL DllRegisterServer
Category Machine Started Completed
FILE s1_win7_x6403_us Sept. 3, 2024, 8:52 a.m. Sept. 3, 2024, 8:56 a.m.
Size 17.9MB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 b5128526be8a6b02a0ea3dcb4bef1478
SHA256 cdddb70fc2836d52d8fe97b8bf301ffb9386ca7fe611b5a4b8bc055f9d344cc1
CRC32 5EFA7B1E
ssdeep 393216:/PuxYjFHQAmcWBfVuQaFMR8D7fwveOn92/wnMU+j5QzFeY:/Pux6F2Bf5aFMR8DoewQW650F
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section _RDATA
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\libssl-1_1.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\vcruntime140.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\vcruntime140_1.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\clr_loader\ffi\dlls\amd64\ClrLoader.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\webview\lib\Microsoft.Web.WebView2.Core.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\libffi-8.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\mfc140u.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\webview\lib\WebBrowserInterop.x64.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\pywintypes311.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\libcrypto-1_1.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\pythoncom311.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\python3.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\incognito.exe
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\python311.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\tcl86t.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\webview\lib\runtimes\win-x64\native\WebView2Loader.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\webview\lib\Microsoft.Web.WebView2.WinForms.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\pythonnet\runtime\Python.Runtime.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\tk86t.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\webview\lib\WebBrowserInterop.x64.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\webview\lib\Microsoft.Web.WebView2.WinForms.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\pythonnet\runtime\Python.Runtime.dll
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\webview\lib\Microsoft.Web.WebView2.Core.dll
section {u'size_of_data': u'0x011aa000', u'virtual_address': u'0x00045000', u'entropy': 7.999084992950053, u'name': u'.rsrc', u'virtual_size': u'0x011a9e38'} entropy 7.99908499295 description A section with a high entropy has been found
entropy 0.989523783473 description Overall entropy of this PE file is high
file C:\Users\test22\AppData\Local\Temp\onefile_2068_133697995624843750\incognito.exe