Summary | ZeroBOX

code.exe

Formbook Generic Malware Malicious Library UPX PE File DLL PE32
Category Machine Started Completed
FILE s1_win7_x6401 Feb. 7, 2025, 2:11 p.m. Feb. 7, 2025, 2:18 p.m.
Size 280.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 88ba5ea93cd4d63db0c02028808483d5
SHA256 27632516b503084b7a82223985ade9d419829b073a0da07411877f97e218e4a7
CRC32 C9945DAA
ssdeep 6144:adbUUC1t/5mHkcx+rN4m0X+zWjw3sSVZZJa4zxjcOcRyb1oY7mRXx:adfCL/5Brmm04SosmNa49ILRvXx
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

request POST http://www.brothersharetender.xyz/zt2z/
request GET http://www.brothersharetender.xyz/zt2z/?Llh=xrZBxJYgw8cIQMiqB7MJTIt56Y5x1dzsCIunmK+cvRjjBmIrzA2dl/VKD+8Ko7RwD9ZNT3MsvQ9uHPPRt337yY3SQq9c32vIKb0ZpnkUqAHAqojpvsCz/3SLl1qRQBpJo+hmuPc=&td=4M-32bF2uXv9
request GET http://www.sqlite.org/2018/sqlite-dll-win32-x86-3260000.zip
request POST http://www.extremedoge.xyz/d8se/
request GET http://www.extremedoge.xyz/d8se/?Llh=/SD9pFSzQOAsk6zpabHlU9ZXbxrg7PaZHGb2u7tA7jL8hbNivAh91rSnEmMQYiYm2xILAWc0h2mK7v85Eb/bwmkVaqdX4hXL1d46fAKlPCExW94pmuU+QNfSRFIryEKBz6Xtm2w=&td=4M-32bF2uXv9
request POST http://www.meacci.xyz/y3n2/
request GET http://www.meacci.xyz/y3n2/?Llh=YYHifcw1ROMF/3Rui21dObVXjAOycMKtO4hXXvbRKVUVh0h/q4DM+aO7A1nlqnFctBzVAwzHmVAfM2sicI7T38fTXgwlOQpRgAWrULTRJOennTkobfA6A/gEUPp6kRoqEnphUcA=&td=4M-32bF2uXv9
request POST http://www.zltbd.top/1jgm/
request GET http://www.zltbd.top/1jgm/?Llh=eA6uj9mZZG+EKrxfswGApmXXI0p+YTaKp1gfdi5CfcM9nM+TLjgWcwBtgp/C7prMYA+QDtZzzV+0rSF+jYnqwmuWlATC+zwKaxmM0eLSIF6KRgpcsoHnjR3ICsIoHcDcBWoJljM=&td=4M-32bF2uXv9
request POST http://www.67051.app/fm7p/
request GET http://www.67051.app/fm7p/?Llh=fBQGVIP7Njvsfk9lzF9d/sdBluYbkOx9Vaqk3JyU25ETPeViuHfhuXRn/X/4l2r/aQcZiXoH+567skXIk+or+vUABT2ejmBxdOFfcD/7nc+/oBxuIH8atQY3BV9A3FWHsGb3cNA=&td=4M-32bF2uXv9
request POST http://www.lifesentials.life/ai0p/
request GET http://www.lifesentials.life/ai0p/?Llh=rZDqlkYBI8Udwc1PV/KnJHNh6pEuqfnUU600R0dEHTi0g/oFcrH0VJPjKDcJsyDPkPK5dg/BoZxLcakNPxKVIp3FFoqOpAqATHzFTc0Kc7j4Hnf42/UwaR/YWWdcV10GGOZvjs0=&td=4M-32bF2uXv9
request POST http://www.031234103.xyz/dcuq/
request GET http://www.031234103.xyz/dcuq/?Llh=7EIrk2a44qM8+P4T8JDW5BXJ9n28PXV7+/6L2NN5PDXBTTL/JZ98MmX8dmN4cg/v65DfsXcqsYvOJsm24QtwtT24Ily7fae4aXU265y/XHAb6zWkMeauie4snRNRUk0nTZ2JMB0=&td=4M-32bF2uXv9
request POST http://www.shibbets.xyz/c3po/
request GET http://www.shibbets.xyz/c3po/?Llh=/Wnh70q18r/I0Nchd4hywIFo9BzviYpX0j5Xn0WCxuGW1YNIN7yCv1GXQYyzHI9oVtbk0Qn7crHFX7iLWoKgAm1hHHflXN/4uvMxriDJeHGGOSWZuqMgFDJgNgOgFdkkkLhhx7k=&td=4M-32bF2uXv9
request POST http://www.banjia0731.icu/7hg3/
request GET http://www.banjia0731.icu/7hg3/?Llh=v5X+3+iEc/Uvt288LwqsYb5NJ0322hz3EXLj0Ccb66JVULuRjil5/VwtV230PPKy6CklN/m1lmp+ebN8FryGocLqxWElOtZH067PqeKPuYFK80ONFwqGcRNYKgFa/Hst8tVb9YA=&td=4M-32bF2uXv9
request POST http://www.dogebonus.xyz/0vny/
request GET http://www.dogebonus.xyz/0vny/?Llh=myEZ251pNFEUATDY+9yAk+s16G6gEHJ2TfH5Ex+eBmeHh8124vv24n+FuItehPX14VOi64VFrqeI2WDFhnLrQF1N78gHuIe9wI/OsVlX0IK+R23f3LJlJIi96OSfeEBtIW5OHg8=&td=4M-32bF2uXv9
request POST http://www.brothersharetender.xyz/zt2z/
request POST http://www.extremedoge.xyz/d8se/
request POST http://www.meacci.xyz/y3n2/
request POST http://www.zltbd.top/1jgm/
request POST http://www.67051.app/fm7p/
request POST http://www.lifesentials.life/ai0p/
request POST http://www.031234103.xyz/dcuq/
request POST http://www.shibbets.xyz/c3po/
request POST http://www.banjia0731.icu/7hg3/
request POST http://www.dogebonus.xyz/0vny/
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 274432
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ac3000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 12288
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ac1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 3158016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00b10000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2548
region_size: 135168
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003d0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2676
region_size: 3158016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01fe0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1452
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004730000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0
description sxstrace.exe tried to sleep 164 seconds, actually delayed analysis time by 164 seconds
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\
file C:\Users\test22\AppData\Local\Chromium\User Data
file C:\Users\test22\AppData\Local\MapleStudio\ChromePlus\User Data
file C:\Users\test22\AppData\Local\Yandex\YandexBrowser\User Data
file C:\Users\test22\AppData\Local\Temp\sqlite3.dll
file C:\Users\test22\AppData\Local\Temp\sqlite3.dll
section {u'size_of_data': u'0x00045000', u'virtual_address': u'0x00001000', u'entropy': 7.996338728900525, u'name': u'.text', u'virtual_size': u'0x00044f44'} entropy 7.9963387289 description A section with a high entropy has been found
entropy 1.0 description Overall entropy of this PE file is high
file C:\Users\test22\AppData\Local\AVAST Software\Browser\User Data
file C:\Users\test22\AppData\Local\AVG\Browser\User Data
Process injection Process 2548 manipulating memory of non-child process 988
Time & API Arguments Status Return Repeated

NtMapViewOfSection

section_handle: 0x0000004c
process_identifier: 988
commit_size: 0
win32_protect: 64 (PAGE_EXECUTE_READWRITE)
buffer:
base_address: 0x04250000
allocation_type: 0 ()
section_offset: 0
view_size: 14200832
process_handle: 0x00000050
1 0 0
Process injection Process 2548 called NtSetContextThread to modify thread in remote process 2676
Time & API Arguments Status Return Repeated

NtSetContextThread

registers.eip: 1995571652
registers.esp: 720668
registers.edi: 0
registers.eax: 1285792
registers.ebp: 0
registers.edx: 0
registers.ebx: 2130567168
registers.esi: 0
registers.ecx: 0
thread_handle: 0x00000064
process_identifier: 2676
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Formbook.4!c
tehtris Generic.Malware
Cynet Malicious (score: 100)
CAT-QuickHeal cld.trojan.sdum
Skyhigh BehavesLike.Win32.VirRansom.dc
ALYac Gen:Variant.Mikey.173310
Cylance Unsafe
VIPRE Gen:Variant.Mikey.173310
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Gen:Variant.Mikey.173310
K7GW Trojan ( 00536d121 )
K7AntiVirus Trojan ( 00536d121 )
Arcabit Trojan.Mikey.D2A4FE
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Formbook.AK
APEX Malicious
Avast Win32:TrojanX-gen [Trj]
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Trojan:Win32/FormBook.d8d1db5a
MicroWorld-eScan Gen:Variant.Mikey.173310
Rising Trojan.Formbook!1.10495 (CLASSIC)
Emsisoft Gen:Variant.Mikey.173310 (B)
F-Secure Trojan.TR/Crypt.ZPACK.Gen
TrendMicro Possible_Virus
McAfeeD Real Protect-LS!88BA5EA93CD4
Trapmine suspicious.low.ml.score
CTX exe.trojan.formbook
Sophos Mal/Generic-S
SentinelOne Static AI - Malicious PE
FireEye Generic.mg.88ba5ea93cd4d63d
Google Detected
Avira TR/Crypt.ZPACK.Gen
Antiy-AVL Trojan/Win32.Formbook.ak
Kingsoft malware.kb.a.1000
Gridinsoft Ransom.Win32.Gen.sa
Microsoft Trojan:Win32/FormBook.NF!MTB
GData Gen:Variant.Mikey.173310
Varist W32/Formbook.AG.gen!Eldorado
AhnLab-V3 Infostealer/Win.Formbook.R647393
McAfee Artemis!88BA5EA93CD4
DeepInstinct MALICIOUS
VBA32 BScope.Trojan.Formbook
Malwarebytes Malware.Heuristic.2051
Ikarus Trojan.Win32.Formbook
Panda Trj/CI.A
TrendMicro-HouseCall Possible_Virus
Tencent Win32.Trojan.Crypt.Jtgl
MaxSecure Trojan.Malware.300983.susgen