Summary | ZeroBOX

coinbase.exe

Gen1 Generic Malware Malicious Library ASPack Antivirus UPX Malicious Packer PE File MZP Format PE64 OS Processor Check PE32 dll DLL DllRegisterServer
Category Machine Started Completed
FILE s1_win7_x6403_us Feb. 27, 2025, 9:18 a.m. Feb. 27, 2025, 9:20 a.m.
Size 949.9KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 5f41899fe8f7801b20885898e0f4c05a
SHA256 62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed
CRC32 2BB9B24D
ssdeep 24576:vnvJUgT/3hRWpul04R3qO/hCwZWHGIEIPURoWuVT:vvygTffWMlH6otkGI9sLuF
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • mzp_file_format - MZP(Delphi) file format
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
section CODE
section DATA
section BSS
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
coinbase+0x807a1 @ 0x4807a1
coinbase+0x986ab @ 0x4986ab
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xeedface
exception.offset: 46887
exception.address: 0x7559b727
registers.esp: 1637928
registers.edi: 4523196
registers.eax: 1637928
registers.ebp: 1638008
registers.edx: 0
registers.ebx: 0
registers.esi: 2
registers.ecx: 7
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00401000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040f000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2128
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01dd0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2224
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00400000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2224
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00401000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2224
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0040f000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2272
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\is-EJ99J.tmp\_isetup\_shfoldr.dll
file C:\Users\test22\AppData\Local\Temp\is-EJ99J.tmp\_isetup\_isdecmp.dll
file C:\Users\test22\AppData\Local\Temp\is-32AEQ.tmp\_isetup\_isdecmp.dll
file C:\Users\test22\AppData\Local\Temp\is-32AEQ.tmp\_isetup\_shfoldr.dll
cmdline "regsvr32.exe" /s /i:INSTALL "C:\Users\test22\AppData\Roaming\\netapi32_2.ocx"
file C:\Users\test22\AppData\Local\Temp\is-KDSR0.tmp\coinbase.tmp
file C:\Users\test22\AppData\Local\Temp\is-EJ99J.tmp\_isetup\_RegDLL.tmp
file C:\Users\test22\AppData\Local\Temp\is-EJ99J.tmp\_isetup\_isdecmp.dll
file C:\Users\test22\AppData\Local\Temp\is-EJ99J.tmp\_isetup\_shfoldr.dll
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Users\test22\AppData\Local\Temp\coinbase.exe
parameters: /VERYSILENT
filepath: C:\Users\test22\AppData\Local\Temp\coinbase.exe
1 1 0
Time & API Arguments Status Return Repeated

RegOpenKeyExA

regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\Elated Kangaroo_is1
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00000001
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Elated Kangaroo_is1
2 0

RegOpenKeyExA

regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\Elated Kangaroo_is1
base_handle: 0x80000002
key_handle: 0x00000000
options: 0
access: 0x00000001
regkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Elated Kangaroo_is1
2 0

RegOpenKeyExA

regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\Elated Kangaroo_is1
base_handle: 0x80000001
key_handle: 0x00000000
options: 0
access: 0x00000008
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Elated Kangaroo_is1
2 0

RegOpenKeyExA

regkey_r: Software\Microsoft\Windows\CurrentVersion\Uninstall\Elated Kangaroo_is1
base_handle: 0x80000002
key_handle: 0x00000000
options: 0
access: 0x00000008
regkey: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Elated Kangaroo_is1
2 0
Lionic Trojan.Win32.Gatak.4!c
Skyhigh BehavesLike.Win32.ObfuscatedPoly.dc
CrowdStrike win/grayware_confidence_90% (W)
Symantec Trojan.Gen.MBT
ESET-NOD32 a variant of Win32/GenKryptik_AGen.AYM
Avast Win32:CrypterX-gen [Trj]
Kaspersky UDS:Trojan.Win32.Gatak.frt
Alibaba Trojan:Win32/GenKryptik.995ed40f
Rising Trojan.Kryptik!8.8 (CLOUD)
Zillya Trojan.Gatak.Win32.419
McAfeeD ti!62F7943A3896
Sophos Mal/Generic-S
Google Detected
Microsoft Trojan:Win32/Wacatac.B!ml
Varist W32/InstallMonster.GQ.gen!Eldorado
AhnLab-V3 Trojan/Win.Generic.R692554
McAfee Artemis!5F41899FE8F7
DeepInstinct MALICIOUS
Ikarus Win32.Outbreak
Panda Trj/Genetic.gen
AVG Win32:CrypterX-gen [Trj]
Paloalto generic.ml