Report - MMP2.exe

Glupteba
ScreenShot
Created 2021.04.05 14:35 Machine s1_win7_x6402
Filename MMP2.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
3.8
ZERO API file : clean
VT API (file) 44 detected (AIDetect, malware1, malicious, high confidence, GenericKDZ, Crypmod, HwoCVgsA, Save, Kryptik, ZexaF, sqX@amrmA8oG, Attribute, HighConfidence, HKGH, PWSX, UrSnif, ugqep, kcloud, Ymacco, score, MalPE, R414431, ai score=100, Obscure, CLOUD, Static AI, Malicious PE, Unsafe, HKGD, GdSda, confidence, 100%)
md5 5c6ef834006bdc8697576a9af6cea2b6
sha256 45ed95c173fd2df5f05f42c2121698db4484f032344c874e552cf1592d2a88ca
ssdeep 3072:LcsTOLnrKgxSDuZRAn0ypQIcuN5nSeUOn2O/Xk1vkCSo6Xkx1c1eQITUXUpGaO/j:IsKPPpIQIWeU+P/KkCb6Sc1e5tGPUf6f
imphash 1c8e2b3290de49dd010a7b2f8dc06fd6
impfuzzy 48:vtXKHpsjOFnKCGpLJ0SCSOCWrpdx+f5OCh6vMZJch/cBZDO:lXKJsy8Jl0rSYrzx+f5bhcMZ+h/cr6
  Network IP location

Signature (8cnts)

Level Description
danger File has been identified by 44 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Tries to unhook Windows functions monitored by Cuckoo
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (11cnts)

Level Name Description Collection
danger Trojan_Win32_Glupteba_1_Zero Trojan Win32 Glupteba binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasDebugData DebugData Check binaries (upload)
info HasOverlay Overlay Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsPacked Entropy Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info win_files_operation Affect private profile binaries (upload)
info win_mutex Create or check mutex binaries (upload)
info win_private_profile Affect private profile binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x416000 SetDefaultCommConfigA
 0x416004 CreateMutexW
 0x416008 SetThreadContext
 0x41600c lstrlenA
 0x416010 SetLocalTime
 0x416014 GetCPInfo
 0x416018 BuildCommDCBAndTimeoutsA
 0x41601c SetUnhandledExceptionFilter
 0x416020 LoadLibraryExW
 0x416024 GetCommState
 0x416028 ReadConsoleOutputAttribute
 0x41602c CreateJobObjectW
 0x416030 GetNamedPipeHandleStateA
 0x416034 GetProfileSectionA
 0x416038 CancelWaitableTimer
 0x41603c GetProcessPriorityBoost
 0x416040 WriteFile
 0x416044 SetProcessPriorityBoost
 0x416048 GetPrivateProfileIntA
 0x41604c LoadLibraryW
 0x416050 _hread
 0x416054 LeaveCriticalSection
 0x416058 HeapValidate
 0x41605c GetBinaryTypeA
 0x416060 SetSystemPowerState
 0x416064 FindNextVolumeMountPointW
 0x416068 GetComputerNameA
 0x41606c GetStdHandle
 0x416070 FreeLibraryAndExitThread
 0x416074 GetLastError
 0x416078 GetCurrentDirectoryW
 0x41607c SetLastError
 0x416080 GetProcAddress
 0x416084 VirtualAlloc
 0x416088 SetVolumeLabelW
 0x41608c OpenMutexA
 0x416090 LocalAlloc
 0x416094 BeginUpdateResourceA
 0x416098 GetCommMask
 0x41609c AddAtomA
 0x4160a0 WaitForMultipleObjects
 0x4160a4 SetSystemTime
 0x4160a8 SetEnvironmentVariableA
 0x4160ac GetOEMCP
 0x4160b0 DebugBreakProcess
 0x4160b4 VirtualProtect
 0x4160b8 EnumDateFormatsW
 0x4160bc LocalSize
 0x4160c0 DeleteFileW
 0x4160c4 TlsFree
 0x4160c8 CommConfigDialogW
 0x4160cc lstrcpyA
 0x4160d0 ReadFile
 0x4160d4 GetLargestConsoleWindowSize
 0x4160d8 GetSystemDefaultLangID
 0x4160dc WideCharToMultiByte
 0x4160e0 InterlockedIncrement
 0x4160e4 InterlockedDecrement
 0x4160e8 InterlockedCompareExchange
 0x4160ec InterlockedExchange
 0x4160f0 MultiByteToWideChar
 0x4160f4 Sleep
 0x4160f8 InitializeCriticalSection
 0x4160fc DeleteCriticalSection
 0x416100 EnterCriticalSection
 0x416104 HeapFree
 0x416108 DeleteFileA
 0x41610c TerminateProcess
 0x416110 GetCurrentProcess
 0x416114 UnhandledExceptionFilter
 0x416118 IsDebuggerPresent
 0x41611c GetModuleHandleW
 0x416120 ExitProcess
 0x416124 GetCommandLineA
 0x416128 GetStartupInfoA
 0x41612c RtlUnwind
 0x416130 RaiseException
 0x416134 LCMapStringW
 0x416138 LCMapStringA
 0x41613c GetStringTypeW
 0x416140 SetStdHandle
 0x416144 GetFileType
 0x416148 GetConsoleCP
 0x41614c GetConsoleMode
 0x416150 HeapAlloc
 0x416154 HeapCreate
 0x416158 VirtualFree
 0x41615c HeapReAlloc
 0x416160 TlsGetValue
 0x416164 TlsAlloc
 0x416168 TlsSetValue
 0x41616c GetCurrentThreadId
 0x416170 GetModuleFileNameA
 0x416174 LoadLibraryA
 0x416178 InitializeCriticalSectionAndSpinCount
 0x41617c FreeEnvironmentStringsA
 0x416180 GetEnvironmentStrings
 0x416184 FreeEnvironmentStringsW
 0x416188 GetEnvironmentStringsW
 0x41618c SetHandleCount
 0x416190 QueryPerformanceCounter
 0x416194 GetTickCount
 0x416198 GetCurrentProcessId
 0x41619c GetSystemTimeAsFileTime
 0x4161a0 GetStringTypeA
 0x4161a4 HeapSize
 0x4161a8 GetACP
 0x4161ac IsValidCodePage
 0x4161b0 GetUserDefaultLCID
 0x4161b4 GetLocaleInfoA
 0x4161b8 EnumSystemLocalesA
 0x4161bc IsValidLocale
 0x4161c0 WriteConsoleA
 0x4161c4 GetConsoleOutputCP
 0x4161c8 WriteConsoleW
 0x4161cc SetFilePointer
 0x4161d0 GetLocaleInfoW
 0x4161d4 CreateFileA
 0x4161d8 CloseHandle
 0x4161dc FlushFileBuffers
USER32.dll
 0x4161e4 GetAncestor

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure