Summary | ZeroBOX

9402.tmp.exe

Malicious Packer UPX Malicious Library PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 30, 2024, 9:30 a.m. Sept. 30, 2024, 9:40 a.m.
Size 236.5KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 f1831e8f18625bb453d1bd5db5bd100d
SHA256 88f73b620d5c9e8cd51976e464208ac6cb4a13d19083187ad273ec6b5f33e6d1
CRC32 548AD259
ssdeep 6144:hBlkZvaF4NTBA38BNm2J0xjWp+i2GIN6DlxWkyu:hoSWNT638BCx2eiRn
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: cls
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: msg
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: * virus
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: goto
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: msg
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: * virus
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: goto
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: msg
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: * virus
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: goto
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: msg
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: * virus
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: goto
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: msg
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: * virus
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: goto
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: msg
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: * virus
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: goto
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: msg
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: * virus
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: goto
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: msg
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: * virus
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: goto
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: start
console_handle: 0x0000000000000007
1 1 0
section .code
packer PureBasic 4.x -> Neil Hodgson
file C:\Users\test22\AppData\Local\Temp\EBA8.tmp\EBA9.tmp\EBAA.bat
section {u'size_of_data': u'0x00003400', u'virtual_address': u'0x00013000', u'entropy': 7.111835561466392, u'name': u'.rdata', u'virtual_size': u'0x000033a5'} entropy 7.11183556147 description A section with a high entropy has been found
cmdline "C:\Windows\sysnative\cmd" /c "C:\Users\test22\AppData\Local\Temp\EBA8.tmp\EBA9.tmp\EBAA.bat C:\Users\test22\AppData\Local\Temp\9402.tmp.exe"
file C:\Users\test22\AppData\Local\Temp\EBA8.tmp\EBA9.tmp
file C:\Users\test22\AppData\Local\Temp\EBA8.tmp
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
CAT-QuickHeal Trojan.GenericPMF.S16976269
Skyhigh BehavesLike.Win32.RealProtect.dh
Cylance unsafe
Sangfor Trojan.Win32.Save.a
Cybereason malicious.b0ea0e
Symantec ML.Attribute.HighConfidence
McAfee Artemis!F1831E8F1862
ClamAV Win.Trojan.Generic-10011119-0
Rising Trojan.Generic@AI.99 (RDML:IQdQ3+qnweXIHygB6LB6WQ)
FireEye Generic.mg.f1831e8f18625bb4
Sophos Generic ML PUA (PUA)
Google Detected
Kingsoft malware.kb.a.941
Varist W32/ABRisk.WIKL-6757
BitDefenderTheta Gen:NN.ZexaF.36608.ouW@aC@8qrm
DeepInstinct MALICIOUS
Malwarebytes Generic.Malware/Suspicious
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/PossibleThreat
CrowdStrike win/malicious_confidence_60% (D)