Summary | ZeroBOX

run.exe

Malicious Library UPX Malicious Packer AntiDebug PE File PE32 AntiVM
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 20, 2024, 9:16 a.m. Oct. 20, 2024, 9:47 a.m.
Size 88.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c8b1964f7fe72bf917125109877bdda4
SHA256 02afb1f9c3c736a82fb7a4ae2930dee7c89fad2b76f5b0ed5ee7059da3a9c737
CRC32 F5B8DAB5
ssdeep 1536:b7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfMxjB1OE:3q6+ouCpk2mpcWJ0r+QNTBfMxBp
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: icacls
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\ProgramData\GBClientApp\Wallpapers" /deny administrator:(OI)(CI)F /t /c
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: icacls
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\ProgramData\GBClientApp\Wallpapers" /deny administrators:(OI)(CI)F /t /c
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\*Chrome*.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\*Chrome*.*
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\*Chrome.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\*Chrome.*
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\Chrome*.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\Chrome*.*
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\Chrome*.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\Chrome*.*
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\*Chome.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\*Chome.*
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\*Chome*.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\*Chome*.*
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\*Google*.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\*Google*.*
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\*Google.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\*Google.*
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\Google*.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\Google*.*
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\Gogle*.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\Gogle*.*
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\Desktop\*Gogle.*" /q
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Could Not Find C:\Users\test22\Desktop\*Gogle.*
console_handle: 0x000000000000000b
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .code
packer PureBasic 4.x -> Neil Hodgson
file C:\Users\test22\AppData\Local\Temp\BF82.tmp\BF83.tmp\BF94.bat
cmdline "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\BF82.tmp\BF83.tmp\BF94.bat C:\Users\test22\AppData\Local\Temp\run.exe"
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\sysnative\cmd
parameters: /c "C:\Users\test22\AppData\Local\Temp\BF82.tmp\BF83.tmp\BF94.bat C:\Users\test22\AppData\Local\Temp\run.exe"
filepath: C:\Windows\sysnative\cmd
1 1 0
section {u'size_of_data': u'0x00003400', u'virtual_address': u'0x00013000', u'entropy': 7.110640338733982, u'name': u'.rdata', u'virtual_size': u'0x0000339d'} entropy 7.11064033873 description A section with a high entropy has been found
section {u'size_of_data': u'0x00000c00', u'virtual_address': u'0x00019000', u'entropy': 7.081744135563848, u'name': u'.rsrc', u'virtual_size': u'0x00000aa8'} entropy 7.08174413556 description A section with a high entropy has been found
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
cmdline C:\Windows\sysnative\cmd /c "C:\Users\test22\AppData\Local\Temp\BF82.tmp\BF83.tmp\BF94.bat C:\Users\test22\AppData\Local\Temp\run.exe"
cmdline "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\BF82.tmp\BF83.tmp\BF94.bat C:\Users\test22\AppData\Local\Temp\run.exe"
cmdline chcp 65001
Process injection Process 1372 resumed a thread in remote process 2084
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000208
suspend_count: 1
process_identifier: 2084
1 0 0
cmdline icacls "C:\ProgramData\GBClientApp\Wallpapers" /deny administrator:(OI)(CI)F /t /c
cmdline icacls "C:\ProgramData\GBClientApp\Wallpapers" /deny administrators:(OI)(CI)F /t /c
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Tiny.trFe
Cynet Malicious (score: 100)
CAT-QuickHeal Trojan.GenericPMF.S17666681
Skyhigh BehavesLike.Win32.Generic.mh
ALYac Trojan.GenericKD.74344035
Cylance Unsafe
VIPRE Trojan.GenericKD.74344035
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Trojan.GenericKD.74344035
Arcabit Trojan.Generic.D46E6663
VirIT Trojan.Win32.Genus.IHW
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
APEX Malicious
Avast Win32:Malware-gen
Kaspersky Trojan.Win32.Agent.xbjyls
MicroWorld-eScan Trojan.GenericKD.74344035
Rising Trojan.Agent!8.B1E (CLOUD)
Emsisoft Trojan.GenericKD.74344035 (B)
F-Secure Trojan.TR/Agent.grvgx
Zillya Tool.Lazagne.Win32.102
McAfeeD Real Protect-LS!C8B1964F7FE7
CTX exe.trojan.generic
Sophos Mal/Generic-S
SentinelOne Static AI - Suspicious PE
FireEye Generic.mg.c8b1964f7fe72bf9
Webroot W32.Trojan.Gen
Google Detected
Avira TR/Agent.grvgx
Antiy-AVL Trojan/Win32.Nitol
Kingsoft malware.kb.a.988
Microsoft Trojan:Win32/Wacatac.B!ml
ZoneAlarm Trojan.Win32.Agent.xbjyls
GData Trojan.GenericKD.74344035
Varist W32/Kryptik.FDM.gen!Eldorado
McAfee GenericRXWO-YL!C8B1964F7FE7
DeepInstinct MALICIOUS
Malwarebytes Generic.Malware.AI.DDS
Ikarus Trojan.PowerShell.Crypt
Zoner Trojan.Win32.85523
Tencent Malware.Win32.Gencirc.141ba8b4
MaxSecure Trojan.Malware.320772.susgen
Fortinet W32/PossibleThreat
AVG Win32:Malware-gen
Paloalto generic.ml
alibabacloud Trojan:Win/Agent.xhQcil