Summary | ZeroBOX

111.txt

Suspicious_Script_Bin ScreenShot AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6401 Feb. 20, 2025, 7:09 p.m. Feb. 20, 2025, 7:11 p.m.
Size 131.2KB
Type ASCII text, with very long lines
MD5 54fbe16bb5ff1ed4ef9ecdbfb97905ca
SHA256 fb70d59686e9c99b78c715127367fa46eea1359baf7ff6e0644ff19d0674359e
CRC32 32F78C58
ssdeep 3072:U1I6D5sqVQ0p0qZAmJHeo6oTBUPn3m7oUQRDKzn6uIr352hiNY:X65zbp/imJ+o6oTBim7oUQR+6hp2v
Yara
  • Suspicious_Obfuscation_Script_2 - Suspicious obfuscation script (e.g. executable files)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2628
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x733c2000
process_handle: 0xffffffff
1 0 0
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
MicroWorld-eScan Heur.BZC.PZQ.Pantera.130.FB31A69A
CTX txt.unknown.pantera
VIPRE Heur.BZC.PZQ.Pantera.130.FB31A69A
Arcabit Heur.BZC.PZQ.Pantera.130.FB31A69A
Avast Script:SNH-gen [Drp]
BitDefender Heur.BZC.PZQ.Pantera.130.FB31A69A
Emsisoft Heur.BZC.PZQ.Pantera.130.FB31A69A (B)
FireEye Heur.BZC.PZQ.Pantera.130.FB31A69A
GData Heur.BZC.PZQ.Pantera.130.FB31A69A
AVG Script:SNH-gen [Drp]