Summary | ZeroBOX

MKY.exe

Generic Malware Malicious Packer
Category Machine Started Completed
FILE s1_win7_x6402 March 17, 2021, 9:15 a.m. March 17, 2021, 9:15 a.m.
Size 144.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 50779df624494704e7e2d1c2b821a127
SHA256 c169a50f79367c282348c93d99790a6493d0b585030ddcafe770a9cb8eeced87
CRC32 39C19723
ssdeep 3072:UsBTX38jRuY4OW+G5gnsodMQ+IpxMgToXQBg:PURuY4/+G5gnsodMQ+IpxMgf
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • Generic_Malware_Zero - Generic Malware
  • PE_Header_Zero - PE File Signature Zero
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • HasRichSignature - Rich Signature Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 9068
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 9068
region_size: 36864
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x004e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 9068
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 876544
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x773b0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 3236
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 876544
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x773b0000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 9068
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 24576
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x003f0000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

EnumServicesStatusA

service_handle: 0x0054ae10
service_type: 48
service_status: 3
0 0
Bkav W32.AIDetect.malware2
McAfee Artemis!50779DF62449
Sangfor Trojan.Win32.Save.a
Alibaba Trojan:Win32/vbcrypt.ali2000008
Cybereason malicious.5665ae
APEX Malicious
Avast Win32:Malware-gen
Kaspersky UDS:DangerousObject.Multi.Generic
Paloalto generic.ml
McAfee-GW-Edition BehavesLike.Win32.Fareit.cm
FireEye Generic.mg.50779df624494704
SentinelOne Static AI - Suspicious PE
Microsoft Trojan:Win32/Wacatac.B!ml
GData Win32.Trojan-Downloader.GuLoader.V90Z90
Cynet Malicious (score: 100)
BitDefenderTheta Gen:NN.ZevbaF.34608.jm0@aqatxDmi
Rising Trojan.Kryptik!8.8 (CLOUD)
Ikarus Trojan.VB.Crypt
Fortinet W32/Kryptik.EOVV!tr
AVG Win32:Malware-gen
CrowdStrike win/malicious_confidence_70% (W)
Qihoo-360 Win32/Heur.Generic.HwMA7fsA