Summary | ZeroBOX

larBxd7.exe

Generic Malware Malicious Library UPX PE File OS Processor Check PE32 CAB
Category Machine Started Completed
FILE s1_win7_x6401 April 7, 2025, 10:01 a.m. April 7, 2025, 10:06 a.m.
Size 1.2MB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 4641a0bec2101c82f575862f97be861c
SHA256 fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1
CRC32 5956F279
ssdeep 24576:etCs8d5ZIman4nF4GbZ8Yuk2qLwNmZIjZF+hBJwMwtpQI//3Vah0y4hQ/Dkk:eMd5eman4nOGb6YvVIfsm1tpQk/l5hQr
Yara
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) copied.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Extent=4
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: iLkStocks
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Tube(Laugh(Angel(Macromedia(Bronze(Barbados(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'iLkStocks' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: VCIntake
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Sys(Leaves(Trouble(Carrying(Enrolled(Plymouth(Daily(Termination(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'VCIntake' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ylHoward
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Connections(Rail(Colleges(Importantly(Using(Interest(Royal(Bookmark(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ylHoward' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: mAAvenue
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Epinions(Alarm(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'mAAvenue' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: RQwForums
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Guidance(Simulation(Const(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'RQwForums' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: inFame
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Italy(Republic(Rapids(Loose(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'inFame' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: sxUWalking
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Bibliographic(Carmen(Flows(Rid(Aging(Hell(Tires(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'sxUWalking' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Education=J
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: UQCompetition
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Hire(Disability(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'UQCompetition' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: FURivers
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'FURivers' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: upODirected
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Italic(Consultant(Invite(Hispanic(Cake(Manor(Regional(They(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'upODirected' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: sApVBrakes
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Jay(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'sApVBrakes' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2544
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x732d2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3032
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73bc2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 196
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73452000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\689912\Jordan.com
cmdline C:\Windows\System32\cmd.exe /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
cmdline "C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
file C:\Users\test22\AppData\Local\Temp\689912\Jordan.com
file C:\Users\test22\AppData\Local\Temp\689912\Jordan.com
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\System32\cmd.exe
parameters: /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
filepath: C:\Windows\System32\cmd.exe
1 1 0
section {u'size_of_data': u'0x0001aa00', u'virtual_address': u'0x00470000', u'entropy': 7.762937999863443, u'name': u'.rsrc', u'virtual_size': u'0x0001a9d8'} entropy 7.76293799986 description A section with a high entropy has been found
entropy 0.768953068592 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline tasklist
cmdline C:\Windows\System32\cmd.exe /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
cmdline "C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat
Process injection Process 2664 resumed a thread in remote process 196
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000088
suspend_count: 0
process_identifier: 196
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Runner.m!c
Cynet Malicious (score: 99)
CAT-QuickHeal cld.backdoor.agent
Skyhigh Artemis!Trojan
Cylance Unsafe
Sangfor Backdoor.Win32.Agent.Vmqt
CrowdStrike win/malicious_confidence_60% (W)
K7GW Trojan ( 005c4ee51 )
K7AntiVirus Trojan ( 005c4ee51 )
VirIT Trojan.Win32.NSISGenT.ACOY
Symantec Trojan.Gen.2
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Packed.NSIS.CS
Avast Script:SNH-gen [Trj]
Kaspersky HEUR:Backdoor.Win32.Agent.gen
F-Secure Trojan.TR/AVI.Agent.xutea
TrendMicro Trojan.Win32.AMADEY.YXFDDZ
CTX exe.trojan.runner
Sophos Mal/Generic-S
SentinelOne Static AI - Suspicious PE
FireEye Generic.mg.4641a0bec2101c82
Google Detected
Avira TR/AVI.Agent.xutea
Antiy-AVL Trojan/NSIS.Runner.lg
Kingsoft malware.kb.a.907
Microsoft Trojan:Win32/Wacatac.B!ml
GData Win32.Trojan.Agent.9YY2S1
Varist W32/ABTrojan.XKOF-8531
McAfee Artemis!4641A0BEC210
Malwarebytes Backdoor.Agent
Ikarus Trojan.NSIS.Runner
Panda Trj/Chgt.AD
TrendMicro-HouseCall Trojan.Win32.AMADEY.YXFDDZ
Tencent Win32.Trojan.FalseSign.Zfow
huorong Trojan/Runner.cr
Fortinet W32/Runner.MD!tr
AVG Script:SNH-gen [Trj]
Paloalto generic.ml
alibabacloud Backdoor:Win/Packed.NSIS.CB