File 797ca9d112537b75_winngphas.exe

Size 65.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e5f574e202ab8d8c1c934dd5b765514d
SHA1 c667509b254aa9e68aed7dfe2f9beac2993f9e29
SHA256 797ca9d112537b756e13c8e91496e878dbf9abc4e29907128f5e27b1d76c49ce
SHA512
60341b479f3b2395e2bbfe9d3a81a4256c99a4331b5e59db9a34c91b98a3b8654d002b86a89b294e20d0bf2fa65f93d942f0ed2a12a66ac1af7577e899913632
CRC32 62B7E9C5
ssdeep None
Yara None matched

Score

This file is very suspicious, with a score of 10 out of 10!

Please notice: The scoring system is currently still in development and should be considered an alpha feature.


Autosubmit

Parent_Task_ID:6585835

Feedback

Expecting different results? Send us this analysis and we will inspect it. Click here

Information on Execution

Analysis
Category Started Completed Duration Routing Logs
FILE July 2, 2025, 12:06 p.m. July 2, 2025, 12:12 p.m. 391 seconds internet Show Analyzer Log
Show Cuckoo Log

Analyzer Log

2025-06-24 21:23:40,000 [analyzer] DEBUG: Starting analyzer from: C:\tmpdrdvpd
2025-06-24 21:23:40,015 [analyzer] DEBUG: Pipe server name: \??\PIPE\KAilIQEdKoHihOGYVBQtciTVil
2025-06-24 21:23:40,015 [analyzer] DEBUG: Log pipe server name: \??\PIPE\FPMoTEPiWaMXTMWcuEwYVibb
2025-06-24 21:23:40,015 [analyzer] DEBUG: No analysis package specified, trying to detect it automagically.
2025-06-24 21:23:40,030 [analyzer] INFO: Automatically selected analysis package "exe"
2025-06-24 21:23:40,453 [analyzer] DEBUG: Started auxiliary module Curtain
2025-06-24 21:23:40,453 [analyzer] DEBUG: Started auxiliary module DbgView
2025-06-24 21:23:40,983 [analyzer] DEBUG: Started auxiliary module Disguise
2025-06-24 21:23:41,187 [analyzer] DEBUG: Loaded monitor into process with pid 508
2025-06-24 21:23:41,187 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2025-06-24 21:23:41,187 [analyzer] DEBUG: Started auxiliary module Human
2025-06-24 21:23:41,203 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2025-06-24 21:23:41,203 [analyzer] DEBUG: Started auxiliary module Reboot
2025-06-24 21:23:41,265 [analyzer] DEBUG: Started auxiliary module RecentFiles
2025-06-24 21:23:41,265 [analyzer] DEBUG: Started auxiliary module Screenshots
2025-06-24 21:23:41,265 [analyzer] DEBUG: Started auxiliary module Sysmon
2025-06-24 21:23:41,280 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-06-24 21:23:41,437 [lib.api.process] INFO: Successfully executed process from path u'C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\797ca9d112537b75_winngphas.exe' with arguments '' and pid 2872
2025-06-24 21:23:41,592 [analyzer] DEBUG: Loaded monitor into process with pid 2872
2025-06-24 21:23:41,750 [analyzer] INFO: Added new file to list with pid 2872 and path C:\Windows\system.ini
2025-06-24 21:23:41,765 [analyzer] INFO: Added new file to list with pid 2872 and path C:\Users\Administrator\AppData\Local\Temp\fdyyo.exe
2025-06-24 21:23:42,046 [analyzer] DEBUG: Loaded monitor into process with pid 1600
2025-06-24 21:23:42,046 [analyzer] INFO: Injected into process with pid 1600 and name u'dwm.exe'
2025-06-24 21:23:42,390 [analyzer] DEBUG: Loaded monitor into process with pid 1624
2025-06-24 21:23:42,390 [analyzer] INFO: Injected into process with pid 1624 and name u'taskhost.exe'
2025-06-24 21:23:42,687 [analyzer] DEBUG: Loaded monitor into process with pid 1728
2025-06-24 21:23:42,703 [analyzer] INFO: Injected into process with pid 1728 and name u'explorer.exe'
2025-06-24 21:23:42,703 [analyzer] WARNING: Received request to inject Cuckoo processes, skipping it.
2025-06-24 21:23:42,967 [analyzer] DEBUG: Loaded monitor into process with pid 2920
2025-06-24 21:23:42,967 [analyzer] INFO: Injected into process with pid 2920 and name u'mobsync.exe'
2025-06-24 21:23:42,983 [analyzer] WARNING: Received request to inject Cuckoo processes, skipping it.
2025-06-24 21:23:44,437 [analyzer] INFO: Process with pid 2920 has terminated
2025-06-24 21:24:02,437 [analyzer] INFO: Process with pid 2872 has terminated
2025-06-24 21:27:00,453 [analyzer] INFO: Analysis timeout hit, terminating analysis.
2025-06-24 21:27:01,608 [analyzer] INFO: Terminating remaining processes before shutdown.
2025-06-24 21:27:01,608 [lib.api.process] INFO: Successfully terminated process with pid 1600.
2025-06-24 21:27:01,608 [lib.api.process] INFO: Successfully terminated process with pid 1624.
2025-06-24 21:27:01,608 [lib.api.process] INFO: Successfully terminated process with pid 1728.
2025-06-24 21:27:01,625 [analyzer] INFO: Analysis completed.

Cuckoo Log

2025-07-02 12:06:04,929 [cuckoo.core.scheduler] INFO: Task #6631094: acquired machine win7x6412 (label=win7x6412)
2025-07-02 12:06:04,951 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.212 for task #6631094
2025-07-02 12:06:05,379 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 2743391 (interface=vboxnet0, host=192.168.168.212)
2025-07-02 12:06:05,850 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6412
2025-07-02 12:06:13,103 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6412 to vmcloak
2025-07-02 12:07:50,392 [cuckoo.core.guest] INFO: Starting analysis #6631094 on guest (id=win7x6412, ip=192.168.168.212)
2025-07-02 12:07:51,398 [cuckoo.core.guest] DEBUG: win7x6412: not ready yet
2025-07-02 12:07:56,435 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6412, ip=192.168.168.212)
2025-07-02 12:07:56,509 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6412, ip=192.168.168.212, monitor=latest, size=6660546)
2025-07-02 12:07:57,987 [cuckoo.core.resultserver] DEBUG: Task #6631094: live log analysis.log initialized.
2025-07-02 12:07:59,006 [cuckoo.core.resultserver] DEBUG: Task #6631094 is sending a BSON stream
2025-07-02 12:07:59,496 [cuckoo.core.resultserver] DEBUG: Task #6631094 is sending a BSON stream
2025-07-02 12:07:59,615 [cuckoo.core.resultserver] DEBUG: Task #6631094: File upload for 'files/e3b0c44298fc1c14_2329d2c'
2025-07-02 12:07:59,619 [cuckoo.core.resultserver] DEBUG: Task #6631094 uploaded file length: 0
2025-07-02 12:07:59,808 [cuckoo.core.resultserver] DEBUG: Task #6631094 is sending a BSON stream
2025-07-02 12:08:00,067 [cuckoo.core.resultserver] DEBUG: Task #6631094 is sending a BSON stream
2025-07-02 12:08:00,281 [cuckoo.core.resultserver] DEBUG: Task #6631094: File upload for 'shots/0001.jpg'
2025-07-02 12:08:00,303 [cuckoo.core.resultserver] DEBUG: Task #6631094: File upload for 'files/aef73e2e6fa6c6ae_fdyyo.exe'
2025-07-02 12:08:00,306 [cuckoo.core.resultserver] DEBUG: Task #6631094 uploaded file length: 66561
2025-07-02 12:08:00,317 [cuckoo.core.resultserver] DEBUG: Task #6631094 uploaded file length: 133475
2025-07-02 12:08:00,417 [cuckoo.core.resultserver] DEBUG: Task #6631094 is sending a BSON stream
2025-07-02 12:08:00,710 [cuckoo.core.resultserver] DEBUG: Task #6631094 is sending a BSON stream
2025-07-02 12:08:12,861 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:08:28,013 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:08:43,134 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:08:58,260 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:09:13,492 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:09:29,162 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:09:44,689 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:10:00,115 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:10:15,197 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:10:30,293 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:10:45,664 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:11:00,761 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:11:15,915 [cuckoo.core.guest] DEBUG: win7x6412: analysis #6631094 still processing
2025-07-02 12:11:18,572 [cuckoo.core.resultserver] DEBUG: Task #6631094: File upload for 'curtain/1750793220.66.curtain.log'
2025-07-02 12:11:18,602 [cuckoo.core.resultserver] DEBUG: Task #6631094 uploaded file length: 36
2025-07-02 12:11:19,345 [cuckoo.core.resultserver] DEBUG: Task #6631094: File upload for 'sysmon/1750793221.45.sysmon.xml'
2025-07-02 12:11:19,521 [cuckoo.core.resultserver] DEBUG: Task #6631094 uploaded file length: 12037158
2025-07-02 12:11:19,550 [cuckoo.core.resultserver] DEBUG: Task #6631094: File upload for 'files/444f9c7bbf216cbe_system.ini'
2025-07-02 12:11:19,552 [cuckoo.core.resultserver] DEBUG: Task #6631094 uploaded file length: 256
2025-07-02 12:11:19,563 [cuckoo.core.resultserver] DEBUG: Task #6631094 had connection reset for <Context for LOG>
2025-07-02 12:11:22,133 [cuckoo.core.guest] INFO: win7x6412: analysis completed successfully
2025-07-02 12:11:22,155 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks
2025-07-02 12:11:22,200 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer
2025-07-02 12:11:23,121 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6412 to path /srv/cuckoo/cwd/storage/analyses/6631094/memory.dmp
2025-07-02 12:11:23,122 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6412
2025-07-02 12:12:34,346 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.212 for task #6631094
2025-07-02 12:12:35,481 [cuckoo.core.scheduler] DEBUG: Released database task #6631094
2025-07-02 12:12:35,523 [cuckoo.core.scheduler] INFO: Task #6631094: analysis procedure completed

Signatures

Allocates read-write-execute memory (usually to unpack itself) (2 events)
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2872
region_size: 17539072
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00780000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2872
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00780000
process_handle: 0xffffffff
1 0 0
Queries for the computername (1 event)
Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: VLDRQGXYF
1 1 0
One or more processes crashed (1 event)
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
797ca9d112537b75_winngphas+0x2dcc @ 0x402dcc

exception.instruction_r: 8a 08 40 84 c9 75 f9 2b c2 c7 45 fc fe ff ff ff
exception.symbol: lstrlen+0x1a lstrcmpW-0x3f kernelbase+0xad97
exception.instruction: mov cl, byte ptr [eax]
exception.module: KERNELBASE.dll
exception.exception_code: 0xc0000005
exception.offset: 44439
exception.address: 0x75a8ad97
registers.esp: 7864112
registers.edi: 2155347991
registers.eax: 2155347991
registers.ebp: 7864152
registers.edx: 2155347992
registers.ebx: 8618388
registers.esi: 4205005
registers.ecx: 98
1 0 0
One or more potentially interesting buffers were extracted, these generally contain injected code, configuration data, etc.
A process attempted to delay the analysis task. (1 event)
description 797ca9d112537b75_winngphas.exe tried to sleep 124 seconds, actually delayed analysis time by 124 seconds
Creates executable files on the filesystem (1 event)
file C:\Users\Administrator\AppData\Local\Temp\fdyyo.exe
Drops an executable to the user AppData folder (1 event)
file C:\Users\Administrator\AppData\Local\Temp\fdyyo.exe
Searches running processes potentially to identify processes for sandbox evasion, code injection or memory dumping (3 events)
The binary likely contains encrypted or compressed data indicative of a packer (2 events)
section {u'size_of_data': u'0x00010200', u'virtual_address': u'0x00001000', u'entropy': 7.985872798092249, u'name': u'.text', u'virtual_size': u'0x00011000'} entropy 7.98587279809 description A section with a high entropy has been found
entropy 1.0 description Overall entropy of this PE file is high
Raised Suricata alerts (1 event)
suricata Stamus Networks MS-SRVS service - NetrShareEnum
Allocates execute permission to another process indicative of possible code injection (13 events)
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1600
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00280000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001e0
1 0 0

NtAllocateVirtualMemory

process_identifier: 1624
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01da0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 1728
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01dc0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001e0
1 0 0

NtAllocateVirtualMemory

process_identifier: 1804
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00090000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 1804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000e0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 2920
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00150000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001e0
1 0 0

NtAllocateVirtualMemory

process_identifier: 3000
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00550000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 3000
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005b0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 2872
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03f70000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 2872
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03f80000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 1600
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01d30000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000298
1 0 0

NtAllocateVirtualMemory

process_identifier: 1624
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06d20000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000029c
1 0 0

NtAllocateVirtualMemory

process_identifier: 1728
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03b00000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000298
1 0 0
Installs itself for autorun at Windows startup (1 event)
file C:\Windows\system.ini
Operates on local firewall's policies and settings (1 event)
registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
Creates a thread using CreateRemoteThread in a non-child process indicative of process injection (17 events)
Process injection Process 2872 created a remote thread in non-child process 1600
Process injection Process 2872 created a remote thread in non-child process 1624
Process injection Process 2872 created a remote thread in non-child process 1728
Process injection Process 2872 created a remote thread in non-child process 1804
Process injection Process 2872 created a remote thread in non-child process 2920
Process injection Process 2872 created a remote thread in non-child process 3000
Time & API Arguments Status Return Repeated

CreateRemoteThread

thread_identifier: 0
process_identifier: 1600
function_address: 0x00280000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x000001e0
0 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 1624
function_address: 0x01da0000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x0000021c
0 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 1728
function_address: 0x01dc0000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x000001e0
0 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 1804
function_address: 0x00090000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x0000021c
1 552 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 1804
function_address: 0x000e0000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x0000021c
1 556 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 2920
function_address: 0x00150000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x000001e0
0 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 3000
function_address: 0x00550000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x0000021c
1 592 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 3000
function_address: 0x005b0000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x0000021c
1 596 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 1600
function_address: 0x01d30000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x00000298
0 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 1624
function_address: 0x06d20000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x0000029c
0 0

CreateRemoteThread

thread_identifier: 0
process_identifier: 1728
function_address: 0x03b00000
flags: 0
stack_size: 0
parameter: 0x00000000
process_handle: 0x00000298
0 0
Manipulates memory of a non-child process indicative of process injection (20 events)
Process injection Process 2872 manipulating memory of non-child process 1600
Process injection Process 2872 manipulating memory of non-child process 1624
Process injection Process 2872 manipulating memory of non-child process 1728
Process injection Process 2872 manipulating memory of non-child process 1804
Process injection Process 2872 manipulating memory of non-child process 2920
Process injection Process 2872 manipulating memory of non-child process 3000
Process injection Process 2872 manipulating memory of non-child process 2872
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1600
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00280000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001e0
1 0 0

NtAllocateVirtualMemory

process_identifier: 1624
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01da0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 1728
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01dc0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001e0
1 0 0

NtAllocateVirtualMemory

process_identifier: 1804
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00090000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 1804
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000e0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 2920
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00150000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x000001e0
1 0 0

NtAllocateVirtualMemory

process_identifier: 3000
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00550000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 3000
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005b0000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 2872
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03f70000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 2872
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03f80000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000021c
1 0 0

NtAllocateVirtualMemory

process_identifier: 1600
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x01d30000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000298
1 0 0

NtAllocateVirtualMemory

process_identifier: 1624
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06d20000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000029c
1 0 0

NtAllocateVirtualMemory

process_identifier: 1728
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x03b00000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x00000298
1 0 0
Modifies security center warnings (12 events)
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntiVirusOverride
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallOverride
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UacDisableNotify
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntiVirusDisableNotify
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify
Attempts to modify Explorer settings to prevent hidden files from being displayed (1 event)
registry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden
Disables Windows Security features (10 events)
description attempts to disable user access control registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA
description attempts to disable antivirus notifications registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride
description attempts to disable antivirus notifications registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify
description attempts to disable firewall notifications registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify
description attempts to disable firewall notifications registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride
description attempts to disable windows update notifications registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify
description disables user access control notifications registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify
description attempts to disable windows firewall registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall
description attempts to disable firewall exceptions registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions
description attempts to disable firewall notifications registry HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications
File has been identified by 14 AntiVirus engine on IRMA as malicious (14 events)
G Data Antivirus (Windows) Virus: Trojan.SalityStub.F (Engine A)
Avast Core Security (Linux) Win32:Sality [Inf]
C4S ClamAV (Linux) Win.Trojan.Small-5420
Trend Micro SProtect (Linux) PE_SALITY.SM-O
Trellix (Linux) PWS-Zbot.gen.yh trojan
WithSecure (Linux) Malware.W32/Sality.AT
eScan Antivirus (Linux) Trojan.SalityStub.F(DB)
ESET Security (Windows) Win32/Sality.NBA virus
Sophos Anti-Virus (Linux) Troj/SalLoad-C
DrWeb Antivirus (Linux) Win32.Sector.22
ClamAV (Linux) Win.Trojan.Small-5420
Bitdefender Antivirus (Linux) Trojan.SalityStub.F
Kaspersky Standard (Windows) Trojan.Win32.Small.cox
Emsisoft Commandline Scanner (Windows) Trojan.SalityStub.F (B)
Screenshots
Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action VT Location
No hosts contacted.
Cuckoo

We're processing your submission... This could take a few seconds.