Analysis Report s3ZenAQ7m1.bin
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • AV Detection
- • Compliance
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Boot Survival
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample |
Source: | Avira: |
Multi AV Scanner detection for submitted file |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process Stats: |
Source: | Code function: | 0_2_00407170 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Section loaded: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
HIPS / PFW / Operating System Protection Evasion: |
---|
Contains functionality to inject code into remote processes |
Source: | Code function: | 0_2_00407170 |
Injects a PE file into a foreign processes |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Registry Run Keys / Startup Folder1 | Process Injection211 | Masquerading11 | OS Credential Dumping | Security Software Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Registry Run Keys / Startup Folder1 | Software Packing1 | LSASS Memory | File and Directory Discovery1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection211 | Security Account Manager | System Information Discovery2 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
66% | Virustotal | Browse | ||
45% | ReversingLabs | Win32.Trojan.Vebzenpak | ||
100% | Avira | TR/Dropper.Gen |
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Patched.Ren.Gen | Download File | ||
100% | Avira | TR/Dropper.Gen | Download File | ||
100% | Avira | TR/Dropper.Gen | Download File | ||
100% | Avira | TR/Patched.Ren.Gen | Download File | ||
100% | Avira | TR/Patched.Ren.Gen | Download File | ||
100% | Avira | TR/Dropper.Gen | Download File | ||
100% | Avira | TR/Patched.Ren.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File |
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
No contacted domains info |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| low | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| low | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| low | ||
false |
| unknown | ||
false | high | |||
false |
| unknown |
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 368352 |
Start date: | 13.03.2021 |
Start time: | 23:11:11 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 8m 16s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | s3ZenAQ7m1.bin (renamed file extension from bin to exe) |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 30 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal64.evad.winEXE@3/20@0/0 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1000 |
Entropy (8bit): | 7.691899187561062 |
Encrypted: | false |
SSDEEP: | 24:ckVCbNX/YrVKpu82EOoACZwS6S+s8hO9Y/THxJRSc+q:VEbNArVK+7xfOCH5Z+q |
MD5: | 5E5A20047D007EBF28918F2068FF88CF |
SHA1: | 2C4DC7453D0089126F790213A9D55556885D53E4 |
SHA-256: | 43A588692F674651B6825B4C8C9A99C7794A48A476E17620C2909E550BA7EC54 |
SHA-512: | 96BF311C3853D4009B3CC275A999DA2B309B0F99A5648279F9D83E665F9E86DD2A247E4813B08612E9CB62A3ABDF451011594368A634AEEC0F1EC0C7E4AE390E |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1134 |
Entropy (8bit): | 4.852816346482338 |
Encrypted: | false |
SSDEEP: | 24:Q+sE+TlR/yoMlnY2I0UawHdrbJnXNYvtUvyNYFsFGPa0ZqP/THxJRSc+q:rsE6LCnY50NwTXGlUyGFsFMZqTH5Z+q |
MD5: | C337A8219B2F0A2CBC128220907E0C23 |
SHA1: | EFAE069DE57EE8CBE918A7E31E8F59DCC149607C |
SHA-256: | 9A81BF89E7311CF5ACDB69CEED52D6FECFF082640B2A2805F50D124F6047BC6A |
SHA-512: | 012BE257E65646B9975D112C52B1E45DBF1D8582472E8CECD1F0D043EDB0DE046CBA3E21C924932F15D2091BD915E976D876269842BD649587E6E26CFA155C8D |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 991366 |
Entropy (8bit): | 7.999836591239994 |
Encrypted: | true |
SSDEEP: | 24576:V8JvDZ/OitaiGjvlghi3DVRl6h2oLit2zG:VyvNmitaiGzmi3DhEnzG |
MD5: | 249BEEE0E66BF26CA68A1DEAEAF4B75C |
SHA1: | B683ADCDE424AED135AD59E87C30AAF8008D034C |
SHA-256: | 373DEA19A39D439D995E48FA84C94FD4300F935CA88272383649589F8040EC3F |
SHA-512: | AF790DCAF7520B0A3CA789E0096E3DC816BC73D1A425615C54D22E944D5F649422ADE8A41E0EDE66AF232976A8714FF080BB39DAA27FCA90CA57CA07361D9FB6 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 991500 |
Entropy (8bit): | 7.421487496393618 |
Encrypted: | false |
SSDEEP: | 12288:1t0Yy+QEHeSHMTuLTBn0wM67J9ji8GUrWelRRzMzzD0Ad3KYo7hAx131YKTwIiMd:1t0Yy3a/INiRoz0AhK7+xyL6A2oY0EN |
MD5: | D37168DB9912AB92BD3C7A284C4EED68 |
SHA1: | 24973FA76E788D51E20AC31EEE7835D6B20161DD |
SHA-256: | 4BDE4676EE4EDEB8CE682EC016A83883609724B9D0FD9955D3E88FFDF5BA9B40 |
SHA-512: | 059AB734DD1A8BE485CA86A9BD8D5D06FE4B7937D1B1A4286ACBB441B6DD1D17E85BEE4E261769EF372C7F774B4CA2AEA79C0574A4F34598114733FF7ADC19F9 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 423598 |
Entropy (8bit): | 7.999553218788967 |
Encrypted: | true |
SSDEEP: | 12288:3ERdouok/clAZ5r7rohri7yF5tpaYKHWn:3dgkM5r7grKZYRn |
MD5: | 3A40FE6FD93F8776D971C75CAACF4BAA |
SHA1: | F43EAF407CF14736CBB256708B43D52A1414548F |
SHA-256: | D6317B4BF3AE6CB951CE35CD600742FB140CB143FEDCF93B15DE16BB73C6CE36 |
SHA-512: | F104CDF044095789468BC9695C4CAB0229C9EE9C90F889B18021FC7BAC0887A7CE65C463906F3448716B62AEF1756F30705601C24AA2B941BEFBF8AA73366A0D |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 423732 |
Entropy (8bit): | 6.330189993122203 |
Encrypted: | false |
SSDEEP: | 6144:kyYCpQcslnC3znG+xfbMgyGn7LiJdKkAtyKuskePvX2Zp7DmuXYvr6ys/pX:hYFlnCxjMyn72/KkAtydem3nM6BZ |
MD5: | 1FC9B39B1F6DBB618E9FD452BAD66048 |
SHA1: | 220998CCCEC8E862E79DCD441B31128E6340968F |
SHA-256: | 7743C3ED80481190C91575FF6256AA7333EF9623B838F80833FAD6C554F7F36F |
SHA-512: | 0BDF4019E7BBA712DB50C31E40BB2FDAF05A4EAEC94251B3240C899E37367B819FFE8097E283751D95664EB9894B115FE8ECAE22EE94977B853D87EB87A9916B |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 991366 |
Entropy (8bit): | 7.999836591239994 |
Encrypted: | true |
SSDEEP: | 24576:V8JvDZ/OitaiGjvlghi3DVRl6h2oLit2zG:VyvNmitaiGzmi3DhEnzG |
MD5: | 249BEEE0E66BF26CA68A1DEAEAF4B75C |
SHA1: | B683ADCDE424AED135AD59E87C30AAF8008D034C |
SHA-256: | 373DEA19A39D439D995E48FA84C94FD4300F935CA88272383649589F8040EC3F |
SHA-512: | AF790DCAF7520B0A3CA789E0096E3DC816BC73D1A425615C54D22E944D5F649422ADE8A41E0EDE66AF232976A8714FF080BB39DAA27FCA90CA57CA07361D9FB6 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 991500 |
Entropy (8bit): | 7.421487496393618 |
Encrypted: | false |
SSDEEP: | 12288:1t0Yy+QEHeSHMTuLTBn0wM67J9ji8GUrWelRRzMzzD0Ad3KYo7hAx131YKTwIiMd:1t0Yy3a/INiRoz0AhK7+xyL6A2oY0EN |
MD5: | D37168DB9912AB92BD3C7A284C4EED68 |
SHA1: | 24973FA76E788D51E20AC31EEE7835D6B20161DD |
SHA-256: | 4BDE4676EE4EDEB8CE682EC016A83883609724B9D0FD9955D3E88FFDF5BA9B40 |
SHA-512: | 059AB734DD1A8BE485CA86A9BD8D5D06FE4B7937D1B1A4286ACBB441B6DD1D17E85BEE4E261769EF372C7F774B4CA2AEA79C0574A4F34598114733FF7ADC19F9 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14982 |
Entropy (8bit): | 7.986033929355074 |
Encrypted: | false |
SSDEEP: | 384:zvQaPGKSgGSBKcu8SMy0hwFk1joj+4MYJXoimvIjd+q:zo/uKcChswUslVJXoim6 |
MD5: | 4AF9DB10D2C94A96B5F2BBA3D2ACF359 |
SHA1: | C097D667608296B7F809924CF34434319D5C0DD3 |
SHA-256: | A1ECABBF739A19B6E4566DF899B2906E39F5CA5BF8A4FC7EF0AC55CD588326A9 |
SHA-512: | BC23CDF404159B1C8C28C557502F0781EF4F5B742C249677B8F349C3AB43B5F6BB635E31FC6B2EAC059A06F2A3D1844AC88CFCFB7AFB0A664C2EF51A9DF4639D |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15116 |
Entropy (8bit): | 6.149066524437746 |
Encrypted: | false |
SSDEEP: | 192:GL9W4ol8lRAi75wKVsw2uaSZscF8Bd1LgV5+a9sgfxIZHo3DLhxMt+q:khoGYiWZwDZsHLgqDgf2hqJI+q |
MD5: | 39D8BC08F25B79ACE155FF6FD999FC2F |
SHA1: | 12EDD19808F31EE370910DB5B08426299746FD75 |
SHA-256: | 8BE05B8697E54F91E3A5E270AF0D66F420F241CA8DF470A19ECF395557F047ED |
SHA-512: | 1F56BF6232FA510F5A0D1CB5372DBE9FC6E2FA73CE6BA05B9178E8626AE6F5D611C56070E05AE24531B4ECFB6157B3145FCC23834909BD48658117E0FBFC5B80 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 177846 |
Entropy (8bit): | 7.9990067622525975 |
Encrypted: | true |
SSDEEP: | 3072:NuSW8yPyUk30w6CwsRYbryC5+vshmLg1nymhf64SOvmugO4ft:NuSGKIw6vsRceC5+vVLg1nXhtSq74ft |
MD5: | 2C185067778B734C64A708D3DA7F9D0F |
SHA1: | 0480C0A01FE4D864BA7C482EEF1A51487C316185 |
SHA-256: | 1A2726BBC068124BB157C5CFA36F4FCFA9E02B683D5FB3F4D08E47ECBA90165C |
SHA-512: | 7D02B76ED7A5A08F311ADCC32E05ECAB2CA608A737A453563D5866A49FAEE06627FF792A5D5BE69260C060D5DCAB67B83CEA6E05C65A967E5E7B61340DEC1CAA |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 177980 |
Entropy (8bit): | 6.667386381176696 |
Encrypted: | false |
SSDEEP: | 3072:i16mNB3sJ2xp+MHsSVSol3cUAYuBwp0yOvbXWTBfgQcVE0dvdCohMA:iPNSYxp+M/KvTWTBVcVE5qMA |
MD5: | 455CEA8BA20AD9A31EFF1DA5A226A5DA |
SHA1: | B9924BDC0446CE2722741B75A12F42C91CB18E4A |
SHA-256: | 188092834BC98778F86314B479451366926403DBACB1E7E5EF412799EF1CB7A2 |
SHA-512: | D16CAB44399208EB7C670C4CDC1F09D2F822D254026349520E32ACC87FBBA1A8727502AA7AA6783A1B4EB6CCDE3ACEB711D74BE2F3C8D9FCE9F258B962D86006 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 244416646 |
Entropy (8bit): | 7.999999354586816 |
Encrypted: | true |
SSDEEP: | 3145728:wN6sGnTpc1W8uhhDWslXo5RteOR7dxoSxVnwKxeZI/4hT3hTexywJ5uiIX5bJRi3:q6sKm1W8oDWslY5n5dxHMZqE4DDImxtn |
MD5: | 24C5C064A92962E58DF01240589CD560 |
SHA1: | 47A14D9C5930759C43FD094AEA15A16FD0C7314E |
SHA-256: | 2F882C65245DD54ECE873E9285C601728311D08F29414E8BBFF6DC335EB8A3D5 |
SHA-512: | 334C659D2EF81C61EEB9E2B6DB6159D0C5C8D2CC0DB3EEFA82342BDBC54238D536457D9D644E504F5F1392705EBBA14D50DCA7076A1EDBC288C1C0B551076EB3 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71827456 |
Entropy (8bit): | 7.9905540073984165 |
Encrypted: | true |
SSDEEP: | 1572864:bWdolzI0VkoqvxI9Fw2Ltl32DJi+Sx+melo1h6HbbZ:bW8LzpEi+qqbZ |
MD5: | 721F94A7AF6D5665E7FD49EF08574C47 |
SHA1: | 29BA0C211F5C72A53789E3B05CCC7D8B11334B37 |
SHA-256: | EDFFC55E95E68BD1076E6E1A964551CDF2D2A1D74607097A5C052C26F04BD3D7 |
SHA-512: | EF1C07FD6D973A59291FF9A0489D59788F19D1BB1E56178F1D4AE84A93127393535951A17846E5342027017B97668797DF2088EC8BE7EA0A8338EAC70500E35B |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2793094 |
Entropy (8bit): | 7.999934177292409 |
Encrypted: | true |
SSDEEP: | |
MD5: | 93597FF5F8EC906FEB063DC9338CC7B4 |
SHA1: | 357D4B070B56407A9934506F3C52537D02762E68 |
SHA-256: | A6A7EC804371957F78AE38FD7474FCD74B90114F1B811A754A78B1B5795386E6 |
SHA-512: | 4EF66F5C8A8DB1F729F88B1F7FF55ADCBB58A284BD2F17E763FACDBDCFB372D0545065EC73982D39BC111CAADC390254D4332CC1F7ED8D72681B8790D4A0F0E6 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 175114177 |
Entropy (8bit): | 7.999998925759809 |
Encrypted: | true |
SSDEEP: | |
MD5: | B3812EE37714C294174FD2B2ED8F0258 |
SHA1: | 703810A035C0DD482A1FEAEB1AF18BD05C9CCA01 |
SHA-256: | 9EB7D3CCC5B4125FC7D74617DCB31EAC03A4109AB2CB73E2BE22F82FA9CFA5F0 |
SHA-512: | 81ED18662C037AB1681F49B9F09A34B51544A12700031A4F29B9B49E7BA72F1DC65AE179AA1F4150AF282831051586B484A8688FF310089C0085C0C325E9100A |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 742 |
Entropy (8bit): | 7.5490936735624405 |
Encrypted: | false |
SSDEEP: | |
MD5: | DB38E130D9960D1BC0B79CD5626CFC72 |
SHA1: | 493C8FDF7B5F96CA86CCFF509131D8591F13B0ED |
SHA-256: | 1B457017C172E592DCC7F71DDAE8A5355CABCBA7AE2F651DDBEE1CCBAD3E1DA2 |
SHA-512: | BE4C58F69F600283AFCCE842BF0B421FA38D9F448F41DC50168388040A71DC47F94E5E83FA1CB3ABE0DEAD9AB966A392F0F0BCD16F39766C3F1D43CB303665A4 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 876 |
Entropy (8bit): | 4.628585969096136 |
Encrypted: | false |
SSDEEP: | |
MD5: | BBDAAD0C6A4BC3E281618D8E35CEFC11 |
SHA1: | 0689E67A316B4111A574BE31DE1FBD1BD1926C87 |
SHA-256: | 458372710E387F4A0ECF1446A0AD8D7FF9B51AB3C51E7619356A70C27E4B2E8F |
SHA-512: | B6DD7FC60C4F6566C0C373EE5829BB3BCFBD4667B2AA407D3AD0976EE2973A3708BA6F22AC94D4724F242551C60E8E9B2FB63709893F2EB0D23587E80B5A34B9 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 465014 |
Entropy (8bit): | 7.999587188788213 |
Encrypted: | true |
SSDEEP: | |
MD5: | 2B3E0305E17F3726DE1D54A9E3F6888F |
SHA1: | 7DE15ADBA7305F873CF38E5E2E0AF85B2E7E084C |
SHA-256: | E4BAEACE261F31B0720A41AF7FAA729A5ACFC742F1C44937001F0900D83E3879 |
SHA-512: | 461B01754BA8564125B632C4935070037D9E87712DBFB71E25DFCF42E6C6F835F6157727244F779EC1C987CA9B6CA6567DB170A0C16EC2110A66DA125AE6207A |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 348 |
Entropy (8bit): | 6.668673391714458 |
Encrypted: | false |
SSDEEP: | |
MD5: | 842C2D5B8F6D5E04CF9A46A7438A4B4B |
SHA1: | 5205C1E8AD122DA03855F500E7CFED232BDAAD77 |
SHA-256: | 8F4082747B9E07928228BC825F46890E2E7EAD4D71829606256ACDC53B538C1E |
SHA-512: | EBFEF611B266F7378F828B07D852C67D5D1F1925194E56057ED3AB31F7835204DD27CFE8E1A9D7AB6F461586550C22F5E080244C60F59445F54224DA71921E9F |
Malicious: | false |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 5.889119918577074 |
TrID: |
|
File name: | s3ZenAQ7m1.exe |
File size: | 102400 |
MD5: | 7f5227030be3d2ef48aa652af1ec72b0 |
SHA1: | 202e7ac1c2aaca8fbeed4ac454ca195a33c9d064 |
SHA256: | 4dfc17406a58c6f1ce83a73ce6dd5b343d00fe77d07dfe21d28da13631bfad90 |
SHA512: | 4603b758416dac60cb322aae6f3566711b6a4a9b657f6448861553b45b1c737fd3180d2b0bc169ef193a2372e89aba14a4d27a25e0a5eb440ed6c4afafe5f55c |
SSDEEP: | 1536:juwI7JIu1l2tHeRtnKT5lv1jZR+rpwNy1CqKvbBnNooElc3Q:j3I7l1l2ReyTXX1q4Du7 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......].......................p...............Rich............................PE..L.....L`..........................................@ |
File Icon |
---|
Icon Hash: | 38f6c6e6f8f4f060 |
General | |
---|---|
Entrypoint: | 0x4015ec |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
DLL Characteristics: | |
Time Stamp: | 0x604C949E [Sat Mar 13 10:31:58 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 65155a2944ad0beb18aa3e4f1d3900f5 |
Instruction |
---|
push 00401CB0h |
call 00007FDAA4DD8223h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
xor byte ptr [eax], al |
add byte ptr [eax], al |
inc eax |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ebx+1FDE625Ah], ah |
cmpsd |
push es |
inc edi |
lahf |
mov gs, word ptr [eax+32h] |
lahf |
adc ebx, dword ptr [edi] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [ecx], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax+46h], bh |
jne 00007FDAA4DD8293h |
push 0000006Bh |
imul ebp, dword ptr [esi+00h], 00000000h |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add bh, bh |
int3 |
xor dword ptr [eax], eax |
add byte ptr [esi+edi*2], al |
lds ecx, fword ptr [esi+55h] |
mov al, 44h |
mov word ptr [ebp-2DE994E0h], cs |
das |
inc esi |
sal ebp, cl |
and byte ptr [eax+1Dh], FFFFFFD4h |
add eax, dword ptr [ebp-4Fh] |
sbb dl, byte ptr [edx] |
out dx, al |
int3 |
call far 33ADh : 4F3ADDC0h |
cdq |
iretw |
adc dword ptr [edi+00AA000Ch], esi |
pushad |
rcl dword ptr [ebx+00000000h], cl |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
mov byte ptr [eax+eax], al |
add byte ptr [ebx+00000004h], al |
verw word ptr [ebx+ebp*2+41h] |
inc ebp |
inc edi |
jns 00007FDAA4DD828Bh |
outsb |
push ax |
js 00007FDAA4DD82ACh |
push esp |
jnbe 00007FDAA4DD8274h |
add byte ptr [00000119h], cl |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x7e94 | 0x28 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xb000 | 0xe8bc | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x238 | 0x20 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1000 | 0x160 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x7508 | 0x8000 | False | 0.408599853516 | data | 5.16788060997 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.data | 0x9000 | 0x102c | 0x1000 | False | 0.00634765625 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0xb000 | 0xe8bc | 0xf000 | False | 0.511100260417 | data | 6.35043315796 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
EXE | 0xb8bc | 0xe000 | PE32 executable (GUI) Intel 80386, for MS Windows | English | United States |
RT_ICON | 0xb5d4 | 0x2e8 | data | ||
RT_ICON | 0xb4ac | 0x128 | GLS_BINARY_LSB_FIRST | ||
RT_GROUP_ICON | 0xb488 | 0x24 | data | ||
RT_VERSION | 0xb170 | 0x318 | data | English | United States |
DLL | Import |
---|---|
MSVBVM60.DLL | __vbaStrI2, _CIcos, _adj_fptan, __vbaVarMove, __vbaAryMove, __vbaFreeVar, __vbaLenBstr, __vbaStrVarMove, __vbaEnd, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaRecAnsiToUni, __vbaStrCat, __vbaRecDestruct, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaAryDestruct, __vbaVarForInit, __vbaOnError, _adj_fdiv_m16i, _adj_fdivr_m16i, __vbaVarIndexLoad, _CIsin, __vbaErase, __vbaChkstk, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaCyI2, __vbaAryConstruct2, DllFunctionCall, _adj_fpatan, __vbaRedim, __vbaRecUniToAnsi, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaVarCat, __vbaI2Var, _CIlog, __vbaErrorOverflow, __vbaNew2, __vbaVar2Vec, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, __vbaPowerR8, _adj_fdiv_r, __vbaI4Var, __vbaAryLock, __vbaVarAdd, __vbaStrToAnsi, __vbaVarMod, __vbaFpI4, __vbaRecDestructAnsi, _CIatan, __vbaAryCopy, __vbaStrMove, _allmul, _CItan, __vbaAryUnlock, __vbaVarForNext, _CIexp, __vbaFreeStr |
Description | Data |
---|---|
Translation | 0x0409 0x04b0 |
LegalCopyright | iiUVwFRu |
InternalName | RunExeMemory |
FileVersion | 3.02.0032 |
CompanyName | GMIUlmH |
LegalTrademarks | AvvuzkdkOpbr |
Comments | SqYAQxDQf |
ProductName | xpNrVFB |
ProductVersion | 3.02.0032 |
FileDescription | sQjvjgaspM |
OriginalFilename | RunExeMemory.exe |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
No network behavior found |
---|
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 23:11:51 |
Start date: | 13/03/2021 |
Path: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 102400 bytes |
MD5 hash: | 7F5227030BE3D2EF48AA652AF1EC72B0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Visual Basic |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Windows UI Activities
LPC Port Activities
Start time: | 23:11:51 |
Start date: | 13/03/2021 |
Path: | C:\Users\user\Desktop\s3ZenAQ7m1.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 102400 bytes |
MD5 hash: | 7F5227030BE3D2EF48AA652AF1EC72B0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|
Executed Functions |
---|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 40% |
|
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
C-Code - Quality: 68% |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
Memory Dump Source |
|
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |