Summary | ZeroBOX

66ebb3bf78bd6_Send.exe#111us300

UPX OS Processor Check PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Sept. 21, 2024, 1:46 p.m. Sept. 21, 2024, 2:04 p.m.
Size 2.9MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 098e15e88e5332253356c78badf8d479
SHA256 6b89cdfe0d3ebc90994ee564aac9c88b0df80f25720aedadff660a0d079ad0c9
CRC32 926166E5
ssdeep 49152:PqRtSgOLEJxW+BmNlgtTTqEva2+qb6Xy3gIYvfe2radRo8ap5XAnZ2JarsW:VgaEJxlBolgtCEvZuXyQbUzozXAnZUW
PDB Path d:\a42sr32\win32_x86\release\pdb\UniverseDesigner\designer.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
45.202.35.101 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 45.202.35.101:80 -> 192.168.56.103:49162 2400004 ET DROP Spamhaus DROP Listed Traffic Inbound group 5 Misc Attack

Suricata TLS

No Suricata TLS

pdb_path d:\a42sr32\win32_x86\release\pdb\UniverseDesigner\designer.pdb
section .gfids
resource name REGISTRY
resource name TYPELIB
suspicious_features POST method with no referer header, POST method with no useragent header, Connection to IP address suspicious_request POST http://45.202.35.101/pLQvfD4d/index.php
request POST http://45.202.35.101/pLQvfD4d/index.php
request POST http://45.202.35.101/pLQvfD4d/index.php
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 98304
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040b000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 53248
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00664000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 28672
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0066a000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2004
region_size: 100003840
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02140000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00670000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 16384
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00676000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 49152
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00679000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 20480
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00680000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 221184
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00684000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 184320
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0068d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 430080
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005ca000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2004
region_size: 454656
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006f0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 196608
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006b9000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 167936
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2004
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 430080
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005ca000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\Pictures\DreamifyCorp\ClientSecureUpdater.exe
section {u'size_of_data': u'0x00136800', u'virtual_address': u'0x001b2000', u'entropy': 6.891243887150608, u'name': u'.rsrc', u'virtual_size': u'0x001366d8'} entropy 6.89124388715 description A section with a high entropy has been found
entropy 0.419807334798 description Overall entropy of this PE file is high
buffer Buffer with sha1: f8ad1fdb0c158551e2efd59df1487e5b53c4bb77
host 45.202.35.101
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2204
region_size: 454656
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x001f0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000000b0
1 0 0
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Dell reg_value C:\Users\test22\Pictures\DreamifyCorp\ClientSecureUpdater.exe
Process injection Process 2004 manipulating memory of non-child process 2204
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2204
region_size: 454656
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x001f0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000000b0
1 0 0
Process injection Process 2004 injected into non-child 2204
Time & API Arguments Status Return Repeated

WriteProcessMemory

buffer: 
base_address: 0x7efde008
process_identifier: 2204
process_handle: 0x000000b0
1 1 0
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2208
thread_handle: 0x000000ac
process_identifier: 2204
current_directory:
filepath: C:\Users\test22\AppData\Local\Temp\66ebb3bf78bd6_Send.exe#111us300
track: 1
command_line:
filepath_r: C:\Users\test22\AppData\Local\Temp\66ebb3bf78bd6_Send.exe#111us300
stack_pivoted: 0
creation_flags: 2 (DEBUG_ONLY_THIS_PROCESS)
inherit_handles: 0
process_handle: 0x000000b0
1 1 0

NtGetContextThread

thread_handle: 0x000000ac
1 0 0

NtAllocateVirtualMemory

process_identifier: 2204
region_size: 454656
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x001f0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000000b0
1 0 0

WriteProcessMemory

buffer:
base_address: 0x001f0000
process_identifier: 2204
process_handle: 0x000000b0
1 1 0

WriteProcessMemory

buffer: 
base_address: 0x7efde008
process_identifier: 2204
process_handle: 0x000000b0
1 1 0
Lionic Trojan.Win32.Generic.4!c
Cynet Malicious (score: 99)
Skyhigh Artemis!Trojan
ALYac Trojan.GenericKD.74160259
VIPRE Trojan.GenericKD.74160259
BitDefender Trojan.GenericKD.74160259
Arcabit Trojan.Generic.D46B9883
Symantec Trojan.Gen.MBT
ESET-NOD32 a variant of Win32/GenKryptik.HBVT
Avast Win32:Malware-gen
MicroWorld-eScan Trojan.GenericKD.74160259
Emsisoft Trojan.GenericKD.74160259 (B)
F-Secure Trojan.TR/AVI.Agent.yqzgd
TrendMicro Trojan.Win32.AMADEY.YXEISZ
McAfeeD ti!6B89CDFE0D3E
CTX exe.trojan.amadey
Sophos Mal/Generic-S
Ikarus Trojan.Win32.Krypt
FireEye Trojan.GenericKD.74160259
Webroot W32.Trojan.Gen
Google Detected
Avira TR/AVI.Agent.yqzgd
Kingsoft Win32.Hack.Androm.gen
Gridinsoft Trojan.Win32.Amadey.tr
Xcitium Malware@#szfp2b8day44
Microsoft Trojan:Win32/Acll
GData Trojan.GenericKD.74160259
Varist W32/ABTrojan.IJKI-3578
DeepInstinct MALICIOUS
Malwarebytes Trojan.Dropper.SFX
Panda Trj/Chgt.AD
TrendMicro-HouseCall Trojan.Win32.AMADEY.YXEISZ
Tencent Win32.Trojan.FalseSign.Ckjl
Fortinet W32/GenKryptik.HBUB!tr
AVG Win32:Malware-gen
Paloalto generic.ml