Summary | ZeroBOX

dns.log

Anti_VM ScreenShot AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 Dec. 1, 2024, 2:25 a.m. Dec. 1, 2024, 2:27 a.m.
Size 188.9KB
Type ASCII text, with very long lines
MD5 09b081750dde8d0cebad84499db9fc11
SHA256 1761a768518e3fca80c1386cfe13322911e8f27a3f06252f5abed6219623a00e
CRC32 817BCE10
ssdeep 1536:uJRlriCkA/B1rO5ZAk1Hn/U2+nZy2HWV9BsOc4XR7n6hd0P2zuIhvJW1K:urVnBV0nwnZjwdRw
Yara
  • anti_vm_detect - Possibly employs anti-virtualization techniques

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2668
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x733c2000
process_handle: 0xffffffff
1 0 0
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep