Summary | ZeroBOX

boost.exe

Generic Malware Malicious Library UPX PE64 PE File OS Processor Check
Category Machine Started Completed
FILE s1_win7_x6401 Dec. 30, 2024, 1:54 p.m. Dec. 30, 2024, 2:04 p.m.
Size 20.1MB
Type PE32+ executable (GUI) x86-64, for MS Windows
MD5 3afbec336ce14a69efb9524e4228fa0b
SHA256 25518b8a4c2c6e3bfe59848b7399a1d14a199046a92f8f46c32152e06210b34c
CRC32 1CBEAD0A
ssdeep 393216:yTZtsW33O3g6JZ0GhSnUwBqLi7PbY0opB5/YC1T20Zzr8EreYl94SJ4:yTZm6jARzwGeU0olQmTHwEreYY+4
PDB Path D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .didat
section _RDATA
resource name PNG
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2640
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0
Cylance Unsafe
APEX Malicious
McAfeeD ti!25518B8A4C2C
Microsoft Trojan:Win32/Casdet!rfn
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2640
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x000007fffff90000
process_handle: 0xffffffffffffffff
1 0 0