Summary | ZeroBOX

Purchase Order.pdf.msc

KeyLogger ScreenShot AntiDebug AntiVM
Category Machine Started Completed
FILE s1_win7_x6401 April 28, 2025, 4:56 p.m. April 28, 2025, 4:58 p.m.
Size 148.8KB
Type XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
MD5 490df99cbb5c295e25a0234d86ab1d98
SHA256 ac93d1ff5029663ae1589e45c39859234ca5cf3af61bde11af512855a34ca481
CRC32 44E79951
ssdeep 384:RFvyOBs7D0Yk4RFp4jYistqgaqakyBI92vPGOWPnQB+CdFpK:ntmJFpcYiPgaXa92qYzdFpK
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2732
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000007304c000
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2732
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000002a00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 1452
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004700000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2732
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x000007fffff90000
process_handle: 0xffffffffffffffff
1 0 0
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description Run a KeyLogger rule KeyLogger
CTX xml.unknown.dump
ALYac Dump:Generic.MSC.Kimsuky.A.FFFFFFFE
VIPRE Dump:Generic.MSC.Kimsuky.A.FFFFFFFE
Arcabit Dump:Generic.MSC.Kimsuky.A.FFFFFFFE
BitDefender Dump:Generic.MSC.Kimsuky.A.FFFFFFFE
MicroWorld-eScan Dump:Generic.MSC.Kimsuky.A.FFFFFFFE
Emsisoft Dump:Generic.MSC.Kimsuky.A.FFFFFFFE (B)
Ikarus Trojan-Downloader.XML.Agent
Google Detected
GData Dump:Generic.MSC.Kimsuky.A.FFFFFFFE
Process injection Process 2548 resumed a thread in remote process 2636
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000284
suspend_count: 1
process_identifier: 2636
1 0 0