Summary | ZeroBOX

a10d94b7-8fb0-40c9-a1aa-15103db98d15

Generic Malware Malicious Library UPX PE File OS Processor Check PE32 CAB
Category Machine Started Completed
FILE s1_win7_x6401 May 4, 2025, 12:46 p.m. May 4, 2025, 1:11 p.m.
Size 1.2MB
Type PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5 bbb2fadd18b94c71dabdcf9abe2f60a2
SHA256 52c976140a7b016bcc8978be4d5a887a86e6b454aae7dce95ed15628d3326eb3
CRC32 31D6388B
ssdeep 24576:n0afOGVvlEldsFx10TKGRLTh3yIQvlRCVP54521aZ7mW/7/z3uWe:nJOqdACFxa2GRLTh3DQtYVPG57ZKOLeW
Yara
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) copied.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Planner=g
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: LxLoFemales
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Kong(Cord(Clearly(Sonic(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'LxLoFemales' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: GWRxThriller
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Fist(Learned(Statute(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'GWRxThriller' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: UwesAbilities
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Horse(Magnetic(Chester(Possibilities(Gun(Alleged(Visible(Diagnostic(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'UwesAbilities' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: XSWhButtons
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Memorial(Dodge(Buses(Visited(Suppose(With(Anyone(Wicked(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'XSWhButtons' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: gMPsychiatry
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Smilies(Fossil(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'gMPsychiatry' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Cheap=v
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: DWgZFirmware
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Contamination(Harbor(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'DWgZFirmware' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: RxIssue
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Payable(Stewart(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'RxIssue' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ABjWin
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Morocco(Actors(Federal(Translate(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ABjWin' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: udSteven
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Chip(Kid(Car(Specials(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'udSteven' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: trEReview
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: (Fails(Transfer(
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'trEReview' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Local\Temp>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Core=I
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2540
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x732d2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3060
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x732d2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2180
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x732d2000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\Smith.ppam
file C:\Users\test22\AppData\Local\Temp\Loan.ppam
file C:\Users\test22\AppData\Local\Temp\French.ppam
file C:\Users\test22\AppData\Local\Temp\Heat.ppam
file C:\Users\test22\AppData\Local\Temp\Warnings.ppam
file C:\Users\test22\AppData\Local\Temp\Soma.ppam
file C:\Users\test22\AppData\Local\Temp\Floors.ppam
file C:\Users\test22\AppData\Local\Temp\Theoretical.ppam
file C:\Users\test22\AppData\Local\Temp\Collector.ppam
file C:\Users\test22\AppData\Local\Temp\829811\Sugar.com
cmdline "C:\Windows\System32\cmd.exe" /c copy Loan.ppam Loan.ppam.bat & Loan.ppam.bat
cmdline C:\Windows\System32\cmd.exe /c copy Loan.ppam Loan.ppam.bat & Loan.ppam.bat
file C:\Users\test22\AppData\Local\Temp\829811\Sugar.com
file C:\Users\test22\AppData\Local\Temp\829811\Sugar.com
wmi SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\System32\cmd.exe
parameters: /c copy Loan.ppam Loan.ppam.bat & Loan.ppam.bat
filepath: C:\Windows\System32\cmd.exe
1 1 0
section {u'size_of_data': u'0x00023a00', u'virtual_address': u'0x000f2000', u'entropy': 7.865434341963707, u'name': u'.rsrc', u'virtual_size': u'0x00023900'} entropy 7.86543434196 description A section with a high entropy has been found
entropy 0.816618911175 description Overall entropy of this PE file is high
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
cmdline findstr /V "Html" Defeat
cmdline tasklist
cmdline "C:\Windows\System32\cmd.exe" /c copy Loan.ppam Loan.ppam.bat & Loan.ppam.bat
cmdline C:\Windows\System32\cmd.exe /c copy Loan.ppam Loan.ppam.bat & Loan.ppam.bat
Process injection Process 2668 resumed a thread in remote process 2180
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000088
suspend_count: 0
process_identifier: 2180
1 0 0
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.LummaStealer.4!c
Cynet Malicious (score: 99)
CAT-QuickHeal cld.backdoor.agent
Cylance Unsafe
Sangfor Trojan.Win32.Lummastealer.Vj3d
CrowdStrike win/malicious_confidence_70% (W)
K7GW Trojan ( 005c5b261 )
K7AntiVirus Trojan ( 005c5b261 )
Symantec Trojan.Gen.2
Elastic malicious (moderate confidence)
ESET-NOD32 Win32/Spy.LummaStealer.T
Avast Win32:Malware-gen
Kaspersky HEUR:Backdoor.Win32.Agent.gen
F-Secure Trojan.TR/AVI.Agent.xptyb
McAfeeD ti!52C976140A7B
CTX exe.trojan.lummastealer
Sophos Mal/Generic-S
Google Detected
Avira TR/AVI.Agent.xptyb
Antiy-AVL Trojan/NSIS.Runner.lg
Microsoft Trojan:Win64/LummaStealer!rfn
GData Win32.Trojan.Agent.U2T7XJ
Varist W32/ABTrojan.BEQP-2448
AhnLab-V3 Infostealer/Win.LummaC2.R699686
McAfee Artemis!BBB2FADD18B9
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.625067345
Ikarus Trojan.NSIS.Runner
TrendMicro-HouseCall Trojan.Win32.VSX.PE04C9Z
Fortinet NSIS/Runner.OK!tr
AVG Win32:Malware-gen
alibabacloud Backdoor:Win/LummaStealer.T