Summary | ZeroBOX

cpa-back-2-15-25.txt

Anti_VM ScreenShot AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 Feb. 20, 2025, 3:23 a.m. Feb. 20, 2025, 3:25 a.m.
Size 6.2MB
Type ASCII text, with very long lines
MD5 253a78bdd5572b54ad8eabef88c0d67c
SHA256 fde90474fcac0c5760914257cd4d8f129de742bec2820625e5b26c73e8d100b4
CRC32 A09758ED
ssdeep 1536:0NQNfQ+WRLyMNQNfQ+WRLyMNQNfQ+WRLyMNQNfQ+WRLyu26vgn00oR/S7rEmamYh:Mwgp
Yara
  • anti_vm_detect - Possibly employs anti-virtualization techniques

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2632
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x733c2000
process_handle: 0xffffffff
1 0 0
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep