Summary | ZeroBOX

random.exe

Generic Malware Malicious Library UPX ftp PE File OS Processor Check PE32 CAB
Category Machine Started Completed
FILE s1_win7_x6403_us Jan. 27, 2025, 4:44 p.m. Jan. 27, 2025, 4:47 p.m.
Size 884.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9ce7b5dc80b072328c7bbcdb1c787941
SHA256 d264ece444ce4f309f8abb6624a948b7e475b0ea41922a167b2c206a99a2f3ed
CRC32 1E780A23
ssdeep 24576:92AkXmXG/wzcVn5eiBOdsd1NvyiOIMEWozYL:umXGAcVN8dsFaiXvWeu
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) copied.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Double=E
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: evXSheep-Restriction-Stood-Cam-Scientific-Live-Ve-Situated-Club-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'evXSheep-Restriction-Stood-Cam-Scientific-Live-Ve-Situated-Club-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: bfOOMaintaining-Ant-Across-Webshots-Printed-Planner-Devel-Edition-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'bfOOMaintaining-Ant-Across-Webshots-Printed-Planner-Devel-Edition-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ZBUAlgorithms-Powered-Rolled-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ZBUAlgorithms-Powered-Rolled-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: GNvZMarkers-Oops-Imported-Devon-Disabilities-El-Stage-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'GNvZMarkers-Oops-Imported-Devon-Disabilities-El-Stage-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: SkLlp-Breaks-Grateful-Anaheim-Investing-Destroyed-Ex-Membrane-Involved-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'SkLlp-Breaks-Grateful-Anaheim-Investing-Destroyed-Ex-Membrane-Involved-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ihPetroleum-Seas-Just-Candy-Remarks-Porno-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ihPetroleum-Seas-Just-Candy-Remarks-Porno-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: sTLabeled-Gmbh-Lower-Implementing-Haven-Visible-Include-Measured-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'sTLabeled-Gmbh-Lower-Implementing-Haven-Visible-Include-Measured-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: fVTrailers-Effectively-Recruiting-Detect-Gate-Im-Tasks-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'fVTrailers-Effectively-Recruiting-Detect-Gate-Im-Tasks-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Representative=S
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: HPSiSons-Double-Desirable-Printers-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'HPSiSons-Double-Desirable-Printers-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: sGSPools-Color-Dump-Pond-Improvement-Females-Span-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'sGSPools-Color-Dump-Pond-Improvement-Females-Span-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: kaJAmericas-Across-Davidson-Racing-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'kaJAmericas-Across-Davidson-Racing-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: IQoSociology-Activities-Discount-Nightlife-Indicators-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'IQoSociology-Activities-Discount-Nightlife-Indicators-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: PgRaising-Workflow-Descriptions-Engineers-Hong-Cargo-Pays-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'PgRaising-Workflow-Descriptions-Engineers-Hong-Cargo-Pays-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: VDuMw-Label-Investments-
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'VDuMw-Label-Investments-' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
file C:\Users\test22\AppData\Local\Temp\567757\Appeal.com
cmdline "C:\Windows\System32\cmd.exe" /c copy Fixed Fixed.cmd & Fixed.cmd
file C:\Users\test22\AppData\Local\Temp\567757\Appeal.com
file C:\Users\test22\AppData\Local\Temp\567757\Appeal.com
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c copy Fixed Fixed.cmd & Fixed.cmd
filepath: cmd
1 1 0
section {u'size_of_data': u'0x0000a600', u'virtual_address': u'0x00100000', u'entropy': 7.364725559975049, u'name': u'.rsrc', u'virtual_size': u'0x0000a416'} entropy 7.36472555998 description A section with a high entropy has been found
section {u'size_of_data': u'0x00001000', u'virtual_address': u'0x0010b000', u'entropy': 7.926452079815375, u'name': u'.reloc', u'virtual_size': u'0x00000fd6'} entropy 7.92645207982 description A section with a high entropy has been found
entropy 0.529069767442 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline tasklist
Process injection Process 2180 resumed a thread in remote process 2724
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000084
suspend_count: 0
process_identifier: 2724
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Runner.m!c
Skyhigh ACL/Malware Generic.CPVH
McAfee ACL/Malware Generic.CPVH
Cylance Unsafe
CrowdStrike win/malicious_confidence_70% (W)
Symantec Trojan Horse
Elastic malicious (high confidence)
Avast FileRepMalware [Misc]
Kaspersky HEUR:Backdoor.Win32.Agent.gen
F-Secure Backdoor.BDS/Agent.ipyph
McAfeeD ti!D264ECE444CE
CTX exe.trojan.runner
Sophos Mal/Generic-S
Google Detected
Avira BDS/Agent.ipyph
Kingsoft Win32.Hack.Agent.gen
Microsoft Trojan:Win32/Wacatac.B!ml
GData Win32.Trojan.Agent.1ETXBY
Varist W32/ABTrojan.ZKHI-2375
DeepInstinct MALICIOUS
Ikarus Trojan.NSIS.Runner
Fortinet BAT/Runner.U!tr
AVG FileRepMalware [Misc]
alibabacloud Backdoor:Win/Wacatac.B9nj