Summary | ZeroBOX

lv.exe

Malicious Library
Category Machine Started Completed
FILE s1_win7_x6401 March 25, 2021, 9:12 a.m. March 25, 2021, 9:16 a.m.
Size 2.2MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 a0e5955430ffd68628e6924deba5b8a1
SHA256 de5518baf0b99db0b28298eea2aef803869c3a1f03e71fa6c14b2949a76b9b1e
CRC32 099E9DBC
ssdeep 49152:T1bMPTjME/jVgkbOHNiL9VHiklAO55y+kFwQQS8BoOhxVN1:5oTJ/lL73b5y+kCQQS8fN1
Yara
  • PE_Header_Zero - PE File Signature Zero
  • escalate_priv - Escalade priviledges
  • screenshot - Take screenshot
  • keylogger - Run a keylogger
  • win_registry - Affect system registries
  • win_token - Affect system token
  • win_files_operation - Affect private profile
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsPacked - Entropy Check
  • HasOverlay - Overlay Check
  • HasRichSignature - Rich Signature Check

IP Address Status Action
164.124.101.2 Active Moloch
208.95.112.1 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.101:49227 -> 208.95.112.1:80 2022082 ET POLICY External IP Lookup ip-api.com Device Retrieving External IP Address Detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Microsoft Windows [Version 6.1.7601]
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Copyright (c) 2009 Microsoft Corporation. All rights reserved.
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: IiKKmeHsyiymNPJXbdjbUOyVyWdNwiJHDVZXJLuTWcqGoYcxiupEZ=jTwOFCLUfXbnVRPLgMlaBnOnNuBVFUXyHuJuWUyDiwyepJrDFvSbxHVNyCwmwQgcqsROoJOxGGlmzLfreXdowALZkWqzSFCsNJeRSfcWHbQNbvzxhXbrmyzAGRDjIcBwrSMJI
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'IiKKmeHsyiymNPJXbdjbUOyVyWdNwiJHDVZXJLuTWcqGoYcxiupEZ' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: kMCxBDJXCOCFyVimSHdClwMohjWPJEJJLPLLAyEPQIgOJrfGTEqyzuhlqzufHUg=tTUdpvYMeAMBMYmlWfVtEEfFBBLiZfiVxdJQoYvvGheSxLbeUWasZpaADfPILRNNaQivgIwXTnnsCblQrIjeWQWlXphTpOLOmgAEDwNjUcnALwXutZEeFKRCTXnycoNtNJRgWGjwVqoBscnVkiOlpIpPvXKFDIQMHzNelJpbMCiFCdkbnCThzDUymeRZWGnhpcT
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'kMCxBDJXCOCFyVimSHdClwMohjWPJEJJLPLLAyEPQIgOJrfGTEqyzuhlqzufHUg' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: IvLCYdbGBEjuMjiqOCarmICoSpButUvivhPeQsfeyhDUQLhKmbnGrPnqUDKOPsCGoyJnbtpbhfYktH=iWRGGcPrGPOohHBhNLXMKwOjxhqaNRhWjkCSYKWkaweJIWWQMelmiVHyoEjacvdPBRVwtIfePLzJYtEbslGLHNPdEbKznDPVKhoRwVMrNiKcCXirqOwlQFiOw
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'IvLCYdbGBEjuMjiqOCarmICoSpButUvivhPeQsfeyhDUQLhKmbnGrPnqUDKOPsCGoyJnbtpbhfYktH' is not recognized as an internal or external command, operable program or batc
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: h file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: vHYVEjWbZKWMvcnDXmexOHfGzKBFytyzPvnttSDnntYvihsFMjHILHPPssBTKdsUECX=XznyWEVJJSmuzVSTbbIoGINNdJOiNrSEdsIaNBMiLyunRcAOnnbuUOzgFLPjQNWFqVPwhmyVLAbBCfVV
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'vHYVEjWbZKWMvcnDXmexOHfGzKBFytyzPvnttSDnntYvihsFMjHILHPPssBTKdsUECX' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: ZJgGLJCXxNwMmdXoAbWFnBYaBczsSLdQTrRtIYfkhtSMtoklmawRYdK=LWtfflyIvkTvmTACoKsxIkgzppRAJmRDazzLTZVeYldSgPKGRmIhYfOmILyuzFZXzdruAOIpPgcnVctxnlIpQEEeETroTPIzlznYLEueRmnKUdEjGLHpWPuPLqCGLAfZFehCWy
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'ZJgGLJCXxNwMmdXoAbWFnBYaBczsSLdQTrRtIYfkhtSMtoklmawRYdK' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: UrGadyUogfQBoimbcjJjKeAsspntRewfBwNydbQKRRhdUYiSuFSfhSYRDfquGPskhAquxz=YcYcTOpvaeGYjlMeIrVBqvJrwAerzYqnMnTUgbyrxSHtqRtwBnsrnRuBLVzaMyrxwikOdSNlYRioPFepvqBUGXZUssoarMsg
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'UrGadyUogfQBoimbcjJjKeAsspntRewfBwNydbQKRRhdUYiSuFSfhSYRDfquGPskhAquxz' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: heTGfKJKitGKXMuTlWLEoNridvYJxikASaCDpDufSlmSzlzFemTQFKHmYLfSMZfZTuRFlCJGP=LYhkOuraHVhxUoLeFnghDSUmZhaOcmQjwlYIjNWoPzsxMnkJTiXkaBSTrNkBOgXoyqzKprPRByblBmNAwJVhCEUmsyFnBcxBvpfLyAmPsyJhtHaEZLmtaJGAuTatndduLW
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'heTGfKJKitGKXMuTlWLEoNridvYJxikASaCDpDufSlmSzlzFemTQFKHmYLfSMZfZTuRFlCJGP' is not recognized as an internal or external command, operable program or batch fil
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: e.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: alexBlyWvVGcKNqmQVfoMCPEjixsqPCCiTZzXdYUhNpFmnIsbRAkcNwPcnozPNVHathQNHBmW=VZaltOmeUpgsuzRlYmoFtmRCjclSEQfqgZSevlzxTNTMawXUYCIesssviQXJDGbtTgeiBPNNyNLdGylkbfTeijIXHvUGhKQjfOStZQaoOUXDFqPwGMjhNcWGFtmyViAxXn
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'alexBlyWvVGcKNqmQVfoMCPEjixsqPCCiTZzXdYUhNpFmnIsbRAkcNwPcnozPNVHathQNHBmW' is not recognized as an internal or external command, operable program or batch fil
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: e.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: RjykGXLhhfyaHGSqAnCmTRjnUdhhHzDGuYXOAAFdeoJsALSneu=VxZiqqHsdJbFTLnjIIrAqTkbKoVYonOlBxHjuRXOSpgHEDPFempQYFZeoCbRtIoRUhrmtkyRKfHQEESizdWJfYkVcFrExuJlqvMsmdBQxayJYobEJfbOMmCVwotnoAbDFbQiRBHrOyfWTBXjomVtIVbBURfsjeITUBtAafNiHxZGlFemlRdJEaVKZghZjdQMbcesbv
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'RjykGXLhhfyaHGSqAnCmTRjnUdhhHzDGuYXOAAFdeoJsALSneu' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: SLOvgVQsgPPuxMZfBGxArwNVsDhpPDKeNWbXQWHOoXZlvpvZnuALeWQQYTtKHHCKtNangenFZFsy=CnoihLIeYZRyHYWRWiBcguJQYLcHVMbELOvxWCzWTHyNBaHtBNebQKOvOspCfwijCjxSBBVxOFCGqWfFtsyiJZ
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'SLOvgVQsgPPuxMZfBGxArwNVsDhpPDKeNWbXQWHOoXZlvpvZnuALeWQQYTtKHHCKtNangenFZFsy' is not recognized as an internal or external command, operable program or batch
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: Set OsTWowGVTpDyAEyPFSnwIyzvFWDMuNhbopQtHVk=W
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: IdPyfwfDTRENDOzIWAdIPDVwtCGMjbwfiZVioPKAjVAwXiLjDd=FPejtcOwMcCdcPgGDTjmuQPcUeTrWQzpWJvmtNQMxOXyKEykIAizdQHPZHseBKtWwzxMzPCQeAtaTKLfXIccIqTuwHmbcOlKJqrslaRSYsdQLfVfVetSgIhwmgKMftxgfxISHxyEQCbdJrxLLlCzJscqNwRWIyCUXeAsHrIAWAwL
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'IdPyfwfDTRENDOzIWAdIPDVwtCGMjbwfiZVioPKAjVAwXiLjDd' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: WavTYqyCqFXYHyFDpWLqDzHCrtHBwvodKPQJxeJtbsXvCaqYeXNEdLID=TPUaDBDvHgRgVouhGDkvlqKtJmrJEZYujYBjPMTPzqUtoKiPHsKoviASyPJtnURIfLeXGTnUJvepyGWYsgwhfQKybIiZeOsmojPvHpoOTQnqtdNnTKMpSEanwWmYLnSVtDwTRmsoyhxmsJquVIyswiGETdcLKpexXDWBf
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'WavTYqyCqFXYHyFDpWLqDzHCrtHBwvodKPQJxeJtbsXvCaqYeXNEdLID' is not recognized as an internal or external command, operable program or batch file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: HxzEtFpTusWareaATWWvZArFnWkqBONmRwwLXvrwcZptOsuZwbKZETUudNuozpaaEbBwwHDvTVwZ=ZRiPkYtrOUYuUcpdVHjHQmsPtYxTgyJRUPsWZaolgfQCDVukxuXhPaAmAsKhElPIkukttjdCmwaBJOkpRomioceCfRvHHVFrmisbJeiiPxONZYPLuAccLHA
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: 'HxzEtFpTusWareaATWWvZArFnWkqBONmRwwLXvrwcZptOsuZwbKZETUudNuozpaaEbBwwHDvTVwZ' is not recognized as an internal or external command, operable program or batch
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: file.
console_handle: 0x0000000b
1 1 0

WriteConsoleW

buffer: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz>
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: tJPjQIUEcfeBbOAOqsaNGgDdwKBimlsRHAzZhVsimlsKWhgaqGxxfMpPunlyuNtkXlUWcBByql=vXSxOvpuSPXBUsETPKkqLyyMLzaXmygzymMRhrvJXHjvZJZERHMxOpBsRyJxtjHNADvcFMFLgCrtTJNezNyRaUFVYxZixwEKZnVcjEZtequkuv
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .ndata
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895 @ 0x77210895
stacktrace+0x84 memdup-0x1af @ 0x74420470
hook_in_monitor+0x45 lde-0x133 @ 0x744142ea
New_ntdll_NtProtectVirtualMemory+0x34 New_ntdll_NtQueryAttributesFile-0x151 @ 0x74433603
VirtualProtectEx+0x33 MapViewOfFile-0x2d kernelbase+0x13243 @ 0x7fefd6e3243
VirtualProtect+0x1b VirtualProtectEx-0x15 kernelbase+0x131fb @ 0x7fefd6e31fb
5+0x14638 @ 0x140014638
GetProcessAffinityMask+0x80 SetThreadContext-0x20 kernel32+0x2ef0 @ 0x76e42ef0
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff
0x25fff

exception.instruction_r: 0f ae 81 00 01 00 00 0f 29 81 a0 01 00 00 0f 29
exception.symbol: RtlCaptureContext+0x85 RtlRestoreContext-0xaa ntdll+0x50895
exception.address: 0x77210895
exception.module: ntdll.dll
exception.exception_code: 0xc0000005
exception.offset: 329877
registers.r14: 0
registers.r15: 0
registers.rcx: 1242680
registers.rsi: 5368868864
registers.r10: 0
registers.rbx: 1994665712
registers.rsp: 1244936
registers.r11: 514
registers.r8: 64
registers.r9: 4
registers.rdx: 1244024
registers.r12: 0
registers.rbp: 0
registers.rdi: 5368709487
registers.rax: 1242360
registers.r13: 0
1 0 0
request GET http://ip-api.com/line
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73721000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74e51000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x10001000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73711000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x727a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72764000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1016
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x727a2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2384
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 86016
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02c03000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2384
region_size: 155648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02af0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2228
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72941000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2228
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72904000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2228
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72942000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1332
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72941000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1332
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72904000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1332
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72942000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72941000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72904000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1760
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72942000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2696
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72941000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2696
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72904000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2696
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72942000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72941000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72904000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72942000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2744
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00830000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 106496
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03e61000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 32768
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03e7b000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03e83000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03e85000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2744
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03e86000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72941000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72904000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72942000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1972
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x006e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 172032
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03cf1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 40960
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03d1b000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03d25000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03d27000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03d28000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2620
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73321000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2664
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73321000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 13722034176
root_path: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 13719539712
root_path: C:\Users\test22\AppData\Roaming\yApPLqrLEZwNzecsF
total_number_of_bytes: 0
1 1 0
domain ip-api.com
file C:\Users\test22\AppData\Local\Temp\New Feature\5.exe
file C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz\Avvertire.exe.com
file C:\Users\test22\AppData\Roaming\yApPLqrLEZwNzecsF\Dattero.exe.com
file C:\Users\test22\AppData\Local\Temp\New Feature\vpn.exe
file C:\Users\test22\AppData\Local\Temp\New Feature\4.exe
file C:\Users\test22\AppData\Local\Temp\nsn63E4.tmp\UAC.dll
file C:\Users\test22\AppData\Local\Temp\New Feature\6.exe
cmdline "C:\Windows\System32\cmd.exe" /c CmD < Cio.mui
cmdline C:\Windows\System32\cmd.exe /c rd /s /q C:\ProgramData\wvohrodhxh & timeout 2 & del /f /q "C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz\Avvertire.exe.com"
cmdline "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\wvohrodhxh & timeout 2 & del /f /q "C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz\Avvertire.exe.com"
cmdline "C:\Windows\System32\svchost.exe"
cmdline svchost.exe
cmdline "C:\Windows\System32\cmd.exe" /c CmD < Estate.mp4
file C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz\Avvertire.exe.com
file C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz\Avvertire.exe.com
file C:\Users\test22\AppData\Local\Temp\nsn63E4.tmp\UAC.dll
file C:\Users\test22\AppData\Local\Temp\New Feature\4.exe
file C:\Users\test22\AppData\Local\Temp\New Feature\6.exe
file C:\Users\test22\AppData\Local\Temp\New Feature\vpn.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: svchost.exe
parameters:
filepath: svchost.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c CmD < Estate.mp4
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: svchost.exe
parameters:
filepath: svchost.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c CmD < Cio.mui
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\system32\cmd.exe
parameters: /c rd /s /q C:\ProgramData\wvohrodhxh & timeout 2 & del /f /q "C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz\Avvertire.exe.com"
filepath: C:\Windows\System32\cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\system32\cmd.exe
parameters: /c rd /s /q C:\ProgramData\wvohrodhxh & timeout 2 & del /f /q "C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz\Avvertire.exe.com"
filepath: C:\Windows\System32\cmd.exe
1 1 0
section {u'size_of_data': u'0x00001000', u'virtual_address': u'0x00172000', u'entropy': 7.922565237129837, u'name': u'.reloc', u'virtual_size': u'0x00000fd6'} entropy 7.92256523713 description A section with a high entropy has been found
url http://www.microsoft.com/schemas/ie8tldlistdescription/1.0
url http://purl.org/rss/1.0/
url http://www.passport.com
description Code injection with CreateRemoteThread in a remote process rule inject_thread
description Hijack network configuration rule hijack_network
description Create a windows service rule create_service
description Create a COM server rule create_com_service
description Communications over UDP network rule network_udp_sock
description Listen for incoming communication rule network_tcp_listen
description Communications over Toredo network rule network_toredo
description Communications over P2P network rule network_p2p_win
description Communications over HTTP rule network_http
description File downloader/dropper rule network_dropper
description Communications over FTP rule network_ftp
description Communications over RAW socket rule network_tcp_socket
description Communications use DNS rule network_dns
description Communication using dga rule network_dga
description Escalade priviledges rule escalate_priv
description Take screenshot rule screenshot
description Run a keylogger rule keylogger
description Steal credential rule cred_local
description Record Audio rule sniff_audio
description APC queue tasks migration rule migrate_apc
description Malware can spread east-west file rule spreading_file
description Malware can spread east-west using share drive rule spreading_share
description Create or check mutex rule win_mutex
description Affect system registries rule win_registry
description Affect system token rule win_token
description Affect private profile rule win_private_profile
description Affect private profile rule win_files_operation
description Match Winsock 2 API library declaration rule Str_Win32_Winsock2_Library
description Match Windows Inet API library declaration rule Str_Win32_Wininet_Library
description Match Windows Inet API call rule Str_Win32_Internet_API
description Match Windows Http API call rule Str_Win32_Http_API
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description Code injection with CreateRemoteThread in a remote process rule inject_thread
description Hijack network configuration rule hijack_network
description Create a windows service rule create_service
description Create a COM server rule create_com_service
description Communications over UDP network rule network_udp_sock
Time & API Arguments Status Return Repeated

CreateProcessInternalW

thread_identifier: 2716
thread_handle: 0x000002e0
process_identifier: 1436
current_directory: C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz
filepath: C:\Windows\System32\svchost.exe
track: 1
command_line: "C:\Windows\System32\svchost.exe"
filepath_r: C:\Windows\System32\svchost.exe
stack_pivoted: 0
creation_flags: 67634176 (CREATE_DEFAULT_ERROR_MODE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000002dc
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: svchost.exe
parameters:
filepath: svchost.exe
1 1 0

CreateProcessInternalW

thread_identifier: 2656
thread_handle: 0x000002e8
process_identifier: 2764
current_directory: C:\Users\test22\AppData\Roaming\yApPLqrLEZwNzecsF
filepath: C:\Windows\System32\svchost.exe
track: 1
command_line: "C:\Windows\System32\svchost.exe"
filepath_r: C:\Windows\System32\svchost.exe
stack_pivoted: 0
creation_flags: 67634176 (CREATE_DEFAULT_ERROR_MODE|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000002c4
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: svchost.exe
parameters:
filepath: svchost.exe
1 1 0
cmdline ping 127.0.0.1 -n 30
cmdline C:\Windows\System32\cmd.exe /c rd /s /q C:\ProgramData\wvohrodhxh & timeout 2 & del /f /q "C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz\Avvertire.exe.com"
cmdline "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\wvohrodhxh & timeout 2 & del /f /q "C:\Users\test22\AppData\Roaming\FEoIQQWzvYrooBdnhz\Avvertire.exe.com"
file C:\ProgramData\AVAST Software
file C:\ProgramData\AVG
file C:\ProgramData\Avg
file C:\Users\test22\AppData\Local\Temp\New Feature\5.exe
Process injection Process 2948 resumed a thread in remote process 2696
Process injection Process 2444 resumed a thread in remote process 1760
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000134
suspend_count: 0
process_identifier: 2696
1 0 0

NtResumeThread

thread_handle: 0x00000134
suspend_count: 0
process_identifier: 1760
1 0 0
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Ulise.188955
FireEye Generic.mg.a0e5955430ffd686
McAfee Artemis!A0E5955430FF
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan-Downloader ( 005795151 )
K7GW Trojan-Downloader ( 005795151 )
BitDefenderTheta Gen:NN.ZexaF.34628.ruW@aC8jE@mG
Cyren W64/Agent.CJO.gen!Eldorado
APEX Malicious
Avast Win32:Trojan-gen
Cynet Malicious (score: 100)
Kaspersky UDS:Trojan-Dropper.Win32.Scrop.gen
BitDefender Gen:Variant.Ulise.188955
Tencent Win64.Trojan-downloader.Agent.Lmuf
Emsisoft Trojan.Agent (A)
Ikarus Trojan.NSIS.SProtector
eGambit Unsafe.AI_Score_99%
Avira HEUR/AGEN.1140895
Arcabit Trojan.Ulise.D2E21B
Microsoft Trojan:Win32/Caynamer.A!ml
MAX malware (ai score=82)
Malwarebytes Malware.AI.4161497754
ESET-NOD32 multiple detections
Rising Trojan.Kryptik!1.D3E2 (CLASSIC)
SentinelOne Static AI - Suspicious PE
Webroot W32.Malware.Gen
AVG Win32:Trojan-gen
Panda Trj/CI.A
Qihoo-360 Win32/TrojanSpy.Coins.HyoDHrsA