Summary | ZeroBOX

tYrnx75.exe

Generic Malware Malicious Library UPX PE File OS Processor Check PE32 CAB
Category Machine Started Completed
FILE s1_win7_x6403_us Jan. 27, 2025, 4:42 p.m. Jan. 27, 2025, 4:56 p.m.
Size 846.6KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c3d89e95bfb66f5127ac1f2f3e1bd665
SHA256 5d07ad572a6a37d07d0b7ca990087960ad8850d7cfc56b8c7270c826c70fb56b
CRC32 2FBAB64E
ssdeep 24576:+VIFvGC3R+NVgcijiCnjWii1bAL3ztlmAQJut:Cg2VghqVRKz6AQwt
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) copied.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Challenged=M
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: XfAp-Unified-Librarian-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'XfAp-Unified-Librarian-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: XAKAhead-Winter-Bestiality-Courtesy-Sorted-Essays-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'XAKAhead-Winter-Bestiality-Courtesy-Sorted-Essays-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: TrJnEllen-Ways-Geometry-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'TrJnEllen-Ways-Geometry-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: chhProjected-Citizens-Exclusion-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'chhProjected-Citizens-Exclusion-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: fAHuRand-Site-Inclusion-Model-Consideration-Nov-Advances-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'fAHuRand-Site-Inclusion-Model-Consideration-Nov-Advances-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: rvdValidation-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'rvdValidation-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: dnqBaby-Media-Casa-Vietnam-Probability-Deutsche-Gradually-Terminology-Subscription-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'dnqBaby-Media-Casa-Vietnam-Probability-Deutsche-Gradually-Terminology-Subscription-' is not recognized as an internal or external command, operable program or
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Hwy=m
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: rqSpam-Printable-Ceremony-Richmond-Priced-Interests-Additional-Sprint-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'rqSpam-Printable-Ceremony-Richmond-Priced-Interests-Additional-Sprint-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: nHRPink-Supplemental-Villas-Harassment-Focal-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'nHRPink-Supplemental-Villas-Harassment-Focal-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: yXbDraws-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'yXbDraws-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ZrXProcesses-Er-Collector-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ZrXProcesses-Er-Collector-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: JPQxReveal-Dow-Unavailable-Southern-Fixes-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'JPQxReveal-Dow-Unavailable-Southern-Fixes-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: xwLSimultaneously-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'xwLSimultaneously-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: pYCUGospel-Organize-Sure-Er-Projector-Growth-Ascii-Moisture-Qualified-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'pYCUGospel-Organize-Sure-Er-Projector-Growth-Ascii-Moisture-Qualified-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
file C:\Users\test22\AppData\Local\Temp\764661\Macromedia.com
cmdline "C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd
file C:\Users\test22\AppData\Local\Temp\764661\Macromedia.com
file C:\Users\test22\AppData\Local\Temp\764661\Macromedia.com
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c copy Turner Turner.cmd & Turner.cmd
filepath: cmd
1 1 0
section {u'size_of_data': u'0x0000ee00', u'virtual_address': u'0x00100000', u'entropy': 7.598129118910282, u'name': u'.rsrc', u'virtual_size': u'0x0000ed6a'} entropy 7.59812911891 description A section with a high entropy has been found
section {u'size_of_data': u'0x00001000', u'virtual_address': u'0x0010f000', u'entropy': 7.893401772874734, u'name': u'.reloc', u'virtual_size': u'0x00000fd6'} entropy 7.89340177287 description A section with a high entropy has been found
entropy 0.610576923077 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline tasklist
Process injection Process 2088 resumed a thread in remote process 2648
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000084
suspend_count: 0
process_identifier: 2648
1 0 0
Lionic Trojan.Win32.AutoIt.4!c
Cylance Unsafe
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Trojan.GenericKD.75593447
K7GW Trojan ( 005be4d31 )
K7AntiVirus Trojan ( 005be4d31 )
Arcabit Trojan.Generic.D48176E7
Symantec Trojan.Gen.MBT
Elastic malicious (high confidence)
Kaspersky HEUR:Trojan.Win32.Autoit.gen
Alibaba Trojan:Win32/Runner.acc2a874
MicroWorld-eScan Trojan.GenericKD.75593447
Emsisoft Trojan.GenericKD.75593447 (B)
F-Secure Trojan.TR/AutoIt.aousf
DrWeb Trojan.Inject5.15294
McAfeeD ti!5D07AD572A6A
CTX exe.trojan.autoit
Sophos Mal/Generic-S
FireEye Trojan.GenericKD.75593447
Google Detected
Avira TR/AutoIt.aousf
Kingsoft Win32.Trojan.Autoit.gen
Microsoft Trojan:Win32/Wacatac.B!ml
GData Win32.Trojan.Agent.LYISJ9
Varist W32/ABTrojan.IVQG-0483
McAfee Artemis!C3D89E95BFB6
DeepInstinct MALICIOUS
Ikarus Trojan.NSIS.Runner
Tencent Win32.Trojan.FalseSign.Iajl
huorong Trojan/BAT.Agent.cv
Fortinet W32/PossibleThreat
alibabacloud Trojan:Win/Sonbokli.A9uj