Summary | ZeroBOX

payload.exe

UPX PE64 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Oct. 15, 2024, 2:16 p.m. Oct. 15, 2024, 2:31 p.m.
Size 58.7KB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 8bbc71bfca95de5ebb9679e32b501d90
SHA256 2a4f52e877fbc6c6773407d46a5f820523a4254e88d1889bd52b628b5a8b2494
CRC32 D149C02D
ssdeep 768:NOXmqd8BDsyhno7wmW28XqKqsRgcTGdVgX3vZwIf2iDL4h:YX0psy1okmW28XbUcTGdVgX3xwIf2KO
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Waiting for 100
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: seconds, press a key to continue ...
console_handle: 0x0000000000000007
1 1 0
cmdline C:\Windows\system32\cmd.exe /c timeout /T 100
Kaspersky UDS:DangerousObject.Multi.Generic
Google Detected
Kingsoft Win32.Troj.Unknown.a
ZoneAlarm UDS:DangerousObject.Multi.Generic
AhnLab-V3 Malware/Win.Generic.C5676229
McAfee Artemis!8BBC71BFCA95
Ikarus Trojan.Nekark