Summary | ZeroBOX

clr.exe

Generic Malware Malicious Library UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 13, 2024, 2:05 p.m. Nov. 13, 2024, 2:11 p.m.
Size 83.2KB
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, RAR self-extracting archive
MD5 a736e23ae291f6d3a848fdb1aaa7348f
SHA256 d00d806f1df7195c4d6b5757d90c3e81fdbf8d4f2efcbc895ee752af0b09b28c
CRC32 6ECCC40C
ssdeep 1536:o8V6g/5b+Dae3E/j9pGtbFIViUDq51plh6HcUa3WloAuyQjn:o8V6E5e3YxGF6zDUj/Rj3Pjn
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: taskkill
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: /f /im miter.exe
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: copy
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: /y miterINST.exe miter.exe
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 1 file(s) copied.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: instsrv.exe
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: alark C:\Windows\alark.exe
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ping
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 127.0.0.1 -n 2
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Reg
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "Description" /t REG_SZ /d "Alarm service for default browser." /f
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Reg
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "DisplayName" /t REG_SZ /d "Alarm Key Service" /f
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Reg
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "ObjectName" /t REG_SZ /d "LocalSystem" /f
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: reg
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "Start" /t REG_DWORD /d "2" /f
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: reg
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "Type" /t REG_DWORD /d "16" /f
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: reg
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "ErrorControl" /t REG_DWORD /d "1" /f
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: reg
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "ImagePath" /t REG_EXPAND_SZ /d "C:\Windows\alark.exe" /f
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Reg
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Add "HKLM\SYSTEM\CurrentControlSet\services\alark\Parameters" /v "Application" /t REG_SZ /d "cmd /c start C:\Windows\miter.exe -t3010 C:\Windows\sysclr.bat" /f
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ping
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 127.0.0.1 -n 2
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: net
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: start alark
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ping
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 127.0.0.1 -n 4
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: timeout
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 4 /NOBREAK
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Windows>
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
file C:\Windows\miterINST.exe
file C:\Windows\clrinst.bat
file C:\Windows\alark.exe
file C:\Windows\sysclr.bat
file C:\Windows\instsrv.exe
file C:\Windows\sysclr.exe
Time & API Arguments Status Return Repeated

CreateServiceA

service_start_name:
start_type: 2
password:
display_name: alark
filepath: C:\Windows\alark.exe
service_name: alark
filepath_r: C:\Windows\alark.exe
desired_access: 983551
service_handle: 0x003db160
error_control: 1
service_type: 16
service_manager_handle: 0x003db200
1 4043104 0
file C:\Windows\clrinst.bat
file C:\Windows\instsrv.exe
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "alark.exe")
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "miter.exe")
section {u'size_of_data': u'0x0000b400', u'virtual_address': u'0x0001a000', u'entropy': 7.888577112876484, u'name': u'UPX1', u'virtual_size': u'0x0000c000'} entropy 7.88857711288 description A section with a high entropy has been found
entropy 0.909090909091 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeSecurityPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeRestorePrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
Time & API Arguments Status Return Repeated

NtTerminateProcess

status_code: 0x00000001
process_identifier: 2876
process_handle: 0x00000184
0 0

NtTerminateProcess

status_code: 0x00000001
process_identifier: 2876
process_handle: 0x00000184
1 0 0
section UPX0 description Section name indicates UPX
section UPX1 description Section name indicates UPX
cmdline ping 127.0.0.1 -n 4
cmdline reg add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "ImagePath" /t REG_EXPAND_SZ /d "C:\Windows\alark.exe" /f
cmdline taskkill /f /im miter.exe
cmdline reg add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "ErrorControl" /t REG_DWORD /d "1" /f
cmdline ping 127.0.0.1 -n 2
cmdline Reg Add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "Description" /t REG_SZ /d "Alarm service for default browser." /f
cmdline reg add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "Start" /t REG_DWORD /d "2" /f
cmdline Reg Add "HKLM\SYSTEM\CurrentControlSet\services\alark\Parameters" /v "Application" /t REG_SZ /d "cmd /c start C:\Windows\miter.exe -t3010 C:\Windows\sysclr.bat" /f
cmdline Reg Add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "DisplayName" /t REG_SZ /d "Alarm Key Service" /f
cmdline reg add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "Type" /t REG_DWORD /d "16" /f
cmdline taskkill /f /im alark.exe
cmdline Reg Add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "ObjectName" /t REG_SZ /d "LocalSystem" /f
cmdline net start alark
service_name alark service_path C:\Windows\alark.exe
reg_key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\alark\ImagePath reg_value C:\Windows\alark.exe
service alark (regkey HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\alark\Start)
Lionic Trojan.Win32.Generic.lCIq
Cynet Malicious (score: 99)
Skyhigh Clearlogs
ALYac Application.Clearlog.A
Cylance Unsafe
VIPRE Application.Bat.VJC
CrowdStrike win/grayware_confidence_90% (W)
BitDefender Application.Bat.VJC
K7GW Riskware ( 0015e4f01 )
K7AntiVirus Riskware ( 0015e4f01 )
Arcabit Application.Bat.VJC [many]
Baidu Win32.HackTool.Clearlog.b
VirIT Trojan.Win32.Agent.AYQF
Symantec Hacktool.Clearlogs
Elastic malicious (moderate confidence)
ESET-NOD32 multiple detections
Avast SFX:Dropper-L [Drp]
ClamAV Win.Trojan.Genome-5527
Kaspersky UDS:Trojan.Win32.Scar
NANO-Antivirus Trojan.Win32.DownLoad3.cqqapi
MicroWorld-eScan Application.Bat.VJC
Rising Hack.Clearlog.k (CLASSIC)
Emsisoft Application.Bat.VJC (B)
F-Secure Trojan.TR/Spy.6144.213
DrWeb VirusConstructor.ClearLogs
TrendMicro TSPY_FAREIT.YYSRV
McAfeeD ti!D00D806F1DF7
CTX exe.trojan.clearlog
Sophos Mal/Generic-S
Ikarus HackTool.Win32.Clearlog
FireEye Generic.mg.a736e23ae291f6d3
Jiangmin HackTool.Clearlog.l
Google Detected
Avira TR/Dropper.Gen
Antiy-AVL HackTool/Win32.KeyGen
Gridinsoft Trojan.Win32.Gen.cc!s2
Xcitium Malware@#2f8qa3jru3l1h
Microsoft HackTool:Win32/Multiverze
ZoneAlarm HackTool.Win32.Clearlog.c
GData Gen:Variant.Razy.117592
Varist W32/Trojan.RFBI-8246
AhnLab-V3 PUP/Win32.Agent.R348454
McAfee Artemis!A736E23AE291
DeepInstinct MALICIOUS
VBA32 BScope.Trojan.Ditertag
Malwarebytes Malware.AI.1986806844
Panda Trj/CI.A
Zoner Probably Heur.ExeHeaderL
TrendMicro-HouseCall TSPY_FAREIT.YYSRV
Tencent Win32.Hacktool.Clearlog.Qimw