Summary | ZeroBOX

random.exe

Generic Malware Malicious Library UPX PE File OS Processor Check PE32 CAB
Category Machine Started Completed
FILE s1_win7_x6403_us April 7, 2025, 9:59 a.m. April 7, 2025, 10:10 a.m.
Size 1.3MB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 09232161939bec92432fe5751b7cd092
SHA256 f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0
CRC32 1662E9B7
ssdeep 24576:LtCChnogHYbLwdCUnwZz+T8xoqW0R+oiiaebS842S6iEzcB9Ho6Usx8zhh:LfogddCZVRviihb4Lk4BBDvK
Yara
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) copied.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Victoria=G
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: vOqCancellation
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Tobago(Ep(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'vOqCancellation' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: jpdTFrankfurt
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Respondents(Harmful(Advert(Doctrine(Respected(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'jpdTFrankfurt' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: KhtPoland
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Aaron(Expenditures(Describe(Tribunal(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'KhtPoland' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: JXfbInterview
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Zshops(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'JXfbInterview' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: UfPReload
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Gzip(Server(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'UfPReload' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: wEVLatvia
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Editorial(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'wEVLatvia' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: RSpJMessage
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Canal(Movers(Assured(Third(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'RSpJMessage' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Snap=F
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: haJack
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Astronomy(Commercial(Literacy(Quarters(Survivors(Ask(Bullet(Democrat(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'haJack' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: RGStudents
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Medium(Cars(Robertson(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'RGStudents' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: aVMExcerpt
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Buyer(Glossary(Vs(Evident(Arrangement(Twisted(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'aVMExcerpt' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: GQEeConsiderations
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Working(Asbestos(Rugby(St(Faced(Bureau(Opposite(Reduce(
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
file C:\Users\test22\AppData\Local\Temp\674187\Constraints.com
cmdline "C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
cmdline CMD.exe /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
file C:\Users\test22\AppData\Local\Temp\674187\Constraints.com
file C:\Users\test22\AppData\Local\Temp\674187\Constraints.com
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: CMD.exe
parameters: /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
filepath: CMD.exe
1 1 0
section {u'size_of_data': u'0x00029400', u'virtual_address': u'0x00470000', u'entropy': 7.838032677428376, u'name': u'.rsrc', u'virtual_size': u'0x000293f8'} entropy 7.83803267743 description A section with a high entropy has been found
entropy 0.837563451777 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline tasklist
cmdline "C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
cmdline CMD.exe /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat
Process injection Process 2068 resumed a thread in remote process 2708
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000084
suspend_count: 0
process_identifier: 2708
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Runner.m!c
Cynet Malicious (score: 99)
CAT-QuickHeal cld.backdoor.agent
Skyhigh Artemis!Trojan
ALYac Trojan.Generic.37795009
Cylance Unsafe
VIPRE Trojan.Generic.37795009
Sangfor Backdoor.Win32.Agent.V3kj
CrowdStrike win/malicious_confidence_60% (W)
BitDefender Trojan.Generic.37795009
K7GW Trojan ( 005c4c581 )
K7AntiVirus Trojan ( 005c4c581 )
Arcabit Trojan.Generic.D240B4C1
VirIT Trojan.Win32.NSISGenT.ACOL
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Packed.NSIS.CS
Avast Win32:Malware-gen
Kaspersky HEUR:Backdoor.Win32.Agent.gen
MicroWorld-eScan Trojan.Generic.37795009
Emsisoft Trojan.Generic.37795009 (B)
F-Secure Trojan.TR/AVI.Agent.uglqm
TrendMicro Trojan.Win32.AMADEY.YXFC5Z
Trapmine suspicious.low.ml.score
CTX exe.trojan.runner
Sophos Mal/Generic-S
FireEye Generic.mg.09232161939bec92
Google Detected
Avira TR/AVI.Agent.uglqm
Antiy-AVL Trojan/NSIS.Runner.lg
Kingsoft malware.kb.a.844
Microsoft Trojan:Win64/LummaStealer!rfn
GData Trojan.Generic.37795009
Varist W32/ABTrojan.UTDZ-4006
McAfee Artemis!09232161939B
Ikarus Trojan.NSIS.Runner
Panda Trj/Chgt.AD
TrendMicro-HouseCall Trojan.Win32.AMADEY.YXFC5Z
Tencent Win32.Trojan.FalseSign.Pcnw
huorong Trojan/BAT.Agent.cv
MaxSecure Trojan.Malware.325674353.susgen
Fortinet W32/Runner.LP!tr
AVG Win32:Malware-gen
Paloalto generic.ml