Summary | ZeroBOX

ScreenDataSync.exe

Generic Malware Malicious Library UPX PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Sept. 10, 2024, 10:05 a.m. Sept. 10, 2024, 10:14 a.m.
Size 1.3MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 66f4c467d6f87afe16daafb012f27e76
SHA256 d3b79435a3f7f45d17f4e21bffeacea894eb97bf3cda0e362d3a5ae11c736de1
CRC32 61C15B76
ssdeep 24576:y9x8CwG7xfSLBXJ7vZqsiMcBEXLXzIguFDZEJPsla2+Fy6:ycxWfS9Z7lbR/Lu1Z0Psla2w
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) moved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Areas=d
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: QuvHwy
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Shot Pda Flavor Examining Unauthorized Louisiana Choose Pray
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'QuvHwy' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: FFICatherine
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'FFICatherine' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ExAmend
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Shine Collectors
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ExAmend' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: NHmIPages
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Pharmacy Physicians Emma
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'NHmIPages' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: RRYPub
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Tables Logical Beliefs Nokia Plymouth Pressing
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'RRYPub' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: JcuMadonna
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Wal Hearings Systems Guys Brilliant Directive Subscriptions Textile
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'JcuMadonna' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: RguBStates
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'RguBStates' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: wQCollege
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Escorts
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'wQCollege' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Sys=P
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: XlAhWarranties
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Basically Made King
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'XlAhWarranties' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: KhColleagues
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Receptor Moderator Bone
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'KhColleagues' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: qehXPatents
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'qehXPatents' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: wHEWCursor
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
file C:\Users\test22\AppData\Local\Temp\639278\Assumptions.pif
cmdline "C:\Windows\System32\cmd.exe" /c move Notice Notice.bat & Notice.bat
file C:\Users\test22\AppData\Local\Temp\639278\Assumptions.pif
file C:\Users\test22\AppData\Local\Temp\639278\Assumptions.pif
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c move Notice Notice.bat & Notice.bat
filepath: cmd
1 1 0
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline tasklist
cmdline "C:\Windows\System32\cmd.exe" /c move Notice Notice.bat & Notice.bat
cmdline cmd /c move Notice Notice.bat & Notice.bat
Bkav W32.AIDetectMalware
Elastic malicious (high confidence)
Cylance Unsafe
tehtris Generic.Malware
Kaspersky UDS:DangerousObject.Multi.Generic
SUPERAntiSpyware Adware.SearchSuite /Variant
McAfeeD ti!D3B79435A3F7
FireEye Generic.mg.66f4c467d6f87afe
SentinelOne Static AI - Suspicious PE
Antiy-AVL Trojan/Win32.AdLoad.bh
Kingsoft malware.kb.a.951
Microsoft Program:Win32/Wacapew.C!ml
ZoneAlarm UDS:DangerousObject.Multi.Generic
McAfee Artemis!66F4C467D6F8
DeepInstinct MALICIOUS
MaxSecure Trojan.Malware.121218.susgen
Process injection Process 2212 resumed a thread in remote process 2660
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000084
suspend_count: 0
process_identifier: 2660
1 0 0