ScreenShot
Created 2021.04.28 07:42 Machine s1_win7_x6402
Filename 195145.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
4.4
ZERO API file : clean
VT API (file) 10 detected (malicious, high confidence, Unsafe, Cobalt, SMOKELOADER, CLOUD)
md5 5b5a730628dc9eba2c12530d225c2f70
sha256 e54f38d06a4f11e1b92bb7454e70c949d3e1a4db83894db1ab76e9d64146ee06
ssdeep 6144:cZluCr7KHcEbEv+fKmwULUV8BoZM3q3Bur1VLcfZ1odtBk5Aum2m3axwRIeWWWWi:8Qb14ULr03Bur1Vgx1CtiyN9KxwRI
imphash a6d9b7f182ef1cfe180f692d89ecc759
impfuzzy 24:8tJ8JacCW+XOeOXxo1gUdcDD1ncL2K9M3a0W6FBvpuvenjujb/MG95XGDZIkoDqE:CJBXOeOXxo1ycNYPIeg/RJGVIkoqE
  Network IP location

Signature (10cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Deletes executed files from disk
watch File has been identified by 10 AntiVirus engines on VirusTotal as malicious
notice A process attempted to delay the analysis task.
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
info Queries for the computername

Rules (5cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature Zero binaries (upload)
info IsWindowsGUI (no description) binaries (upload)
info win_files_operation Affect private profile binaries (upload)
info win_registry Affect system registries binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://dimentos.com/bg CA OVH SAS 192.99.178.145 clean
http://dimentos.com/btn_bg CA OVH SAS 192.99.178.145 clean
192.99.178.145 CA OVH SAS 192.99.178.145 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x4c4310 ImpersonateAnonymousToken
 0x4c4318 ImpersonateLoggedOnUser
 0x4c4320 ImpersonateNamedPipeClient
 0x4c4328 NotifyChangeEventLog
 0x4c4330 OpenEventLogA
 0x4c4338 ReadEventLogA
 0x4c4340 RegCloseKey
KERNEL32.dll
 0x4c4350 CloseHandle
 0x4c4358 CreateFileA
 0x4c4360 CreatePipe
 0x4c4368 CreateProcessA
 0x4c4370 DeleteCriticalSection
 0x4c4378 DeleteFileA
 0x4c4380 EnterCriticalSection
 0x4c4388 FindNextStreamW
 0x4c4390 FlushConsoleInputBuffer
 0x4c4398 FlushFileBuffers
 0x4c43a0 GetBinaryTypeA
 0x4c43a8 GetCurrentProcess
 0x4c43b0 GetCurrentProcessId
 0x4c43b8 GetCurrentThreadId
 0x4c43c0 GetExitCodeProcess
 0x4c43c8 GetHandleInformation
 0x4c43d0 GetLargestConsoleWindowSize
 0x4c43d8 GetLastError
 0x4c43e0 GetProcAddress
 0x4c43e8 GetStartupInfoA
 0x4c43f0 GetSystemTimeAsFileTime
 0x4c43f8 GetTempFileNameA
 0x4c4400 GetTempPathA
 0x4c4408 GetTickCount
 0x4c4410 InitializeCriticalSection
 0x4c4418 LeaveCriticalSection
 0x4c4420 LoadLibraryA
 0x4c4428 OpenEventA
 0x4c4430 PurgeComm
 0x4c4438 QueryPerformanceCounter
 0x4c4440 ReadFile
 0x4c4448 ReleaseMutex
 0x4c4450 RtlAddFunctionTable
 0x4c4458 RtlCaptureContext
 0x4c4460 RtlLookupFunctionEntry
 0x4c4468 RtlVirtualUnwind
 0x4c4470 SetCommBreak
 0x4c4478 SetCommMask
 0x4c4480 SetCurrentDirectoryA
 0x4c4488 SetEndOfFile
 0x4c4490 SetEnvironmentVariableA
 0x4c4498 SetEvent
 0x4c44a0 SetUnhandledExceptionFilter
 0x4c44a8 Sleep
 0x4c44b0 TerminateProcess
 0x4c44b8 TlsGetValue
 0x4c44c0 UnhandledExceptionFilter
 0x4c44c8 VirtualProtect
 0x4c44d0 VirtualQuery
 0x4c44d8 WaitForSingleObject
 0x4c44e0 WaitForSingleObjectEx
 0x4c44e8 WaitNamedPipeA
msvcrt.dll
 0x4c44f8 __C_specific_handler
 0x4c4500 __getmainargs
 0x4c4508 __initenv
 0x4c4510 __iob_func
 0x4c4518 __lconv_init
 0x4c4520 __set_app_type
 0x4c4528 __setusermatherr
 0x4c4530 _acmdln
 0x4c4538 _amsg_exit
 0x4c4540 _cexit
 0x4c4548 _fmode
 0x4c4550 _initterm
 0x4c4558 _onexit
 0x4c4560 _snprintf
 0x4c4568 abort
 0x4c4570 calloc
 0x4c4578 exit
 0x4c4580 fprintf
 0x4c4588 free
 0x4c4590 fwrite
 0x4c4598 malloc
 0x4c45a0 memcpy
 0x4c45a8 signal
 0x4c45b0 strlen
 0x4c45b8 strncmp
 0x4c45c0 vfprintf

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure