Report - 46911997163.exe

ScreenShot
Created 2021.04.16 18:51 Machine s1_win7_x6401
Filename 46911997163.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
AI Score Not founds Behavior Score
4.4
ZERO API file : malware
VT API (file) 18 detected (New or modified X97M, Ole2, druvzi, GenDownloader, Presenoker, Artemis, Unsafe, R002H0CIP19, CLASSIC)
md5 66e25d4c12fb491e0a5c5b8dcd9fa85a
sha256 719773cb460bbc9727a5287e754edd398ead64879d229afb6130638e5dde9d19
ssdeep 196608:x4zB7jSSso98MbfUZ+aBZVPgYY5hn3WMKrXsQX1lnkM7W4eluPlEf:x4ZSS8Of++a1ItDnGTIQXvnH7W4elus
imphash 4a09e13dffd1254b086a50c0614d1c3e
impfuzzy 48:gONOJbY7qKp4pnACSviFLHZXpNV6U0uECKQG+NpT71xH/wt4hxFA:gONebY7qlpqSu
  Network IP location

Signature (12cnts)

Level Description
watch File has been identified by 18 AntiVirus engines on VirusTotal as malicious
watch Libraries known to be associated with a CVE were requested (may be False Positive)
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks whether any human activity is being performed by constantly checking whether the foreground window changed
notice Creates (office) documents on the filesystem
notice Creates a shortcut to an executable file
notice Foreign language identified in PE resource
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info The executable uses a known packer

Rules (15cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (download)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
notice Str_Win32_Http_API Match Windows Http API call binaries (download)
notice Str_Win32_Internet_API Match Windows Inet API call binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info HasOverlay Overlay Check binaries (upload)
info HasRichSignature Rich Signature Check binaries (upload)
info IsPacked Entropy Check binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info Microsoft_Office_Document_Zero Microsoft Office Document Signature Zero binaries (download)
info network_http Communications over HTTP binaries (download)
info Str_Win32_Wininet_Library Match Windows Inet API library declaration binaries (download)
info win_files_operation Affect private profile binaries (upload)
info win_registry Affect system registries binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40b018 ReadFile
 0x40b01c CreateFileA
 0x40b020 GetModuleFileNameA
 0x40b024 WaitForSingleObject
 0x40b028 CreateProcessA
 0x40b02c SetFilePointer
 0x40b030 SetCurrentDirectoryA
 0x40b034 GetCurrentDirectoryA
 0x40b038 MoveFileExA
 0x40b03c DeleteFileA
 0x40b040 SetFileAttributesA
 0x40b044 GetFileAttributesA
 0x40b048 lstrcatA
 0x40b04c CreateDirectoryA
 0x40b050 MapViewOfFile
 0x40b054 CreateFileMappingA
 0x40b058 GlobalAlloc
 0x40b05c GlobalReAlloc
 0x40b060 GlobalSize
 0x40b064 GlobalFree
 0x40b068 GlobalHandle
 0x40b06c WriteFile
 0x40b070 _lclose
 0x40b074 SetFileTime
 0x40b078 LocalFileTimeToFileTime
 0x40b07c DosDateTimeToFileTime
 0x40b080 GetTempPathA
 0x40b084 MulDiv
 0x40b088 GetSystemDirectoryA
 0x40b08c GetWindowsDirectoryA
 0x40b090 UnmapViewOfFile
 0x40b094 lstrcpyA
 0x40b098 lstrlenA
 0x40b09c GlobalUnlock
 0x40b0a0 GlobalLock
 0x40b0a4 LoadLibraryA
 0x40b0a8 GetModuleHandleA
 0x40b0ac GetStartupInfoA
 0x40b0b0 GetStringTypeA
 0x40b0b4 LCMapStringW
 0x40b0b8 GetStringTypeW
 0x40b0bc MultiByteToWideChar
 0x40b0c0 RtlUnwind
 0x40b0c4 LCMapStringA
 0x40b0c8 GetStdHandle
 0x40b0cc SetHandleCount
 0x40b0d0 GetFileType
 0x40b0d4 GetProcAddress
 0x40b0d8 CloseHandle
 0x40b0dc GetCommandLineA
 0x40b0e0 GetVersion
 0x40b0e4 GetEnvironmentStrings
 0x40b0e8 WideCharToMultiByte
 0x40b0ec GetEnvironmentStringsW
 0x40b0f0 FreeEnvironmentStringsA
 0x40b0f4 UnhandledExceptionFilter
 0x40b0f8 FreeEnvironmentStringsW
 0x40b0fc TerminateProcess
 0x40b100 GetCurrentProcess
 0x40b104 VirtualFree
 0x40b108 HeapCreate
 0x40b10c GetVersionExA
 0x40b110 GetEnvironmentVariableA
 0x40b114 HeapReAlloc
 0x40b118 VirtualAlloc
 0x40b11c HeapFree
 0x40b120 HeapAlloc
 0x40b124 GetOEMCP
 0x40b128 HeapDestroy
 0x40b12c GetCPInfo
 0x40b130 ExitProcess
 0x40b134 GetACP
USER32.dll
 0x40b150 SetWindowTextA
 0x40b154 EndDialog
 0x40b158 MoveWindow
 0x40b15c GetSystemMetrics
 0x40b160 GetWindowRect
 0x40b164 SetPropA
 0x40b168 RemovePropA
 0x40b16c SendDlgItemMessageA
 0x40b170 GetDlgItemTextA
 0x40b174 DialogBoxParamA
 0x40b178 MessageBoxA
 0x40b17c GetWindowTextA
 0x40b180 wsprintfA
 0x40b184 TranslateMessage
 0x40b188 PeekMessageA
 0x40b18c IsDialogMessageA
 0x40b190 SetDlgItemTextA
 0x40b194 DispatchMessageA
 0x40b198 GetPropA
 0x40b19c CreateDialogParamA
 0x40b1a0 IsWindow
 0x40b1a4 DestroyWindow
 0x40b1a8 SetWindowLongA
 0x40b1ac GetWindowLongA
ADVAPI32.dll
 0x40b000 RegQueryValueExA
 0x40b004 RegOpenKeyExA
 0x40b008 RegCloseKey
SHELL32.dll
 0x40b13c DragQueryFileA
 0x40b140 SHChangeNotify
 0x40b144 ShellExecuteA
 0x40b148 DragFinish
COMCTL32.dll
 0x40b010 None

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure