Summary | ZeroBOX

Secret_Weapon.exe

Malicious Library Antivirus UPX Malicious Packer PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 14, 2024, 10:35 a.m. Oct. 14, 2024, 10:37 a.m.
Size 822.0KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 497ea5f145901f80028099cb40f92def
SHA256 ad541c4b251600a52fb80d6167e2071328b4c83030914ee19646528b0570c0dd
CRC32 3E5E31C7
ssdeep 24576:joS2T15eHOOKZj9/KP+wk9EUhmO70anqqfavJ6Ui63tU+Q:ES2TftZFE+wRemO70aqq4Ti6dFQ
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Active code page: 65001
console_handle: 0x0000000000000013
1 1 0
section .code
packer PureBasic 4.x -> Neil Hodgson
file C:\Users\test22\AppData\Local\Temp\C29F.tmp\C2A0.tmp\C2B1.bat
section {u'size_of_data': u'0x00003400', u'virtual_address': u'0x00013000', u'entropy': 7.111835561466392, u'name': u'.rdata', u'virtual_size': u'0x000033a5'} entropy 7.11183556147 description A section with a high entropy has been found
section {u'size_of_data': u'0x000b7a00', u'virtual_address': u'0x00019000', u'entropy': 7.999530614224543, u'name': u'.rsrc', u'virtual_size': u'0x000b7998'} entropy 7.99953061422 description A section with a high entropy has been found
entropy 0.910475030451 description Overall entropy of this PE file is high
cmdline "C:\Windows\sysnative\cmd" /c "C:\Users\test22\AppData\Local\Temp\C29F.tmp\C2A0.tmp\C2B1.bat C:\Users\test22\AppData\Local\Temp\Secret_Weapon.exe"
file C:\Users\test22\AppData\Local\Temp\C29F.tmp
file C:\Users\test22\AppData\Local\Temp\C29F.tmp\C2A0.tmp
Bkav W32.AIDetectMalware
Elastic malicious (high confidence)
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win32.Generic.cc
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
Symantec ML.Attribute.HighConfidence
ESET-NOD32 BAT/HackTool.Agent.CL potentially unsafe
McAfee GenericRXWO-ZS!497EA5F14590
Rising Hacktool.Agent/BAT!8.13765 (CLOUD)
McAfeeD Real Protect-LS!497EA5F14590
FireEye Generic.mg.497ea5f145901f80
Sophos Generic ML PUA (PUA)
SentinelOne Static AI - Malicious PE
Google Detected
Varist W32/ABRisk.MWXI-6748
BitDefenderTheta Gen:NN.ZexaF.36812.ZuW@a4Ydool
DeepInstinct MALICIOUS
Malwarebytes Generic.Malware.AI.DDS
Ikarus Trojan.Win32
MaxSecure Trojan.Malware.300983.susgen
Paloalto generic.ml
CrowdStrike win/malicious_confidence_70% (W)
alibabacloud HackTool:Win/Agent.CE