Summary | ZeroBOX

%E9%98%B2%E5%8A%AB%E6%8C%811.0.exe

Farfli Backdoor Generic Malware Hide_EXE Malicious Library UPX PE File DLL OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6403_us June 16, 2024, 9:53 a.m. June 16, 2024, 10:17 a.m.
Size 48.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7f0bf23db6496335d9adf01fb50ec091
SHA256 1f2e39728d627019c482b270eabb614d39100ed910797c6884fc405ae6514412
CRC32 58CC6691
ssdeep 768:zynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67ThPC:Ub1MsHz3JDwhyWr+N95OTga6I
Yara
  • Malicious_Library_Zero - Malicious_Library
  • hide_executable_file - Hide executable file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
142.250.66.129 Active Moloch
120.79.191.234 Active Moloch
216.58.203.78 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleA

buffer: Pinging 127.0.0.1
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: with 32 bytes of data:
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Reply from 127.0.0.1:
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: bytes=32
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: time<1ms
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: TTL=128
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Ping statistics for 127.0.0.1: Packets: Sent = 1, Received = 1, Lost = 0 (0% loss),
console_handle: 0x00000007
1 1 0

WriteConsoleA

buffer: Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
packer Armadillo v1.71
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0000b448 size 0x00000128
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0000b448 size 0x00000128
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0000b598 size 0x000001c6
name RT_GROUP_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0000b570 size 0x00000022
file C:\Users\test22\AppData\Local\Temp\31314376.dll
Time & API Arguments Status Return Repeated

CreateServiceA

service_start_name:
start_type: 2
password:
display_name: Systerm Remocte Data Ssimfulation Ldaye5
filepath: C:\Users\test22\AppData\Local\Temp\%SystemRoot%\System32\svchost.exe -k "Remocte1"
service_name: Remocte1
filepath_r: %SystemRoot%\System32\svchost.exe -k "Remocte1"
desired_access: 983551
service_handle: 0x005c42b8
error_control: 0
service_type: 272
service_manager_handle: 0x005c4358
1 6046392 0
cmdline cmd.exe /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\%E9%98%B2%E5%8A%AB%E6%8C%811.0.exe"
cmdline "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\%E9%98%B2%E5%8A%AB%E6%8C%811.0.exe"
file C:\Users\test22\AppData\Local\Temp\31314376.dll
file C:\Users\test22\AppData\Local\Temp\%E9%98%B2%E5%8A%AB%E6%8C%811.0.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\%E9%98%B2%E5%8A%AB%E6%8C%811.0.exe"
filepath: cmd.exe
1 1 0
cmdline cmd.exe /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\%E9%98%B2%E5%8A%AB%E6%8C%811.0.exe"
cmdline "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\test22\AppData\Local\Temp\%E9%98%B2%E5%8A%AB%E6%8C%811.0.exe"
cmdline ping 127.0.0.1 -n 1
host 142.250.66.129
host 120.79.191.234
host 216.58.203.78
service_name Remocte1 service_path C:\Users\test22\AppData\Local\Temp\%SystemRoot%\System32\svchost.exe -k "Remocte1"
reg_key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Remocte1\Parameters\ServiceDll reg_value C:\Users\test22\AppData\Local\Temp\31314376.dll