Report - 46.exe

tor PE File PE32
ScreenShot
Created 2021.05.04 11:21 Machine s1_win7_x6401
Filename 46.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
12.6
ZERO API file : malware
VT API (file) 38 detected (malicious, high confidence, Mint, Zard, Unsafe, Attribute, HighConfidence, Phorpiex, CoinminerX, EQE@80vxxy, Static AI, Malicious PE, XPACK, ai score=89, Caynamer, score, Dlder, BScope, dGZlOgUN9lLDNPuMzg, Outbreak, ZexaF, auW@a0A3T4li, confidence, 100%)
md5 0a6569e45a3a38f7168f4c4aa0594627
sha256 ad74f606e358fb7f6db9a5652d0a60310d069ac108934a72d0352e5fa9248b38
ssdeep 96:L1YtYF8d/XFvRxR2xs9it95PtboynunSzCt4:L12jWbr5P1oynWSq
imphash 3cdafced2b335e7dc14e96cb2f655c00
impfuzzy 12:I4sQGX5u4Gy+GXRzGy5hwBc7bwYLIS73ORB9OdCmEsy2ugW:cX50y+GdgBc6S73Ov9OS/2jW
  Network IP location

Signature (23cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger Disables Windows Security features
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
watch Attempts to remove evidence of file being downloaded from the Internet
watch Communicates with host for which no DNS query was performed
watch Connects to an IRC server
watch Installs itself for autorun at Windows startup
watch Modifies security center warnings
watch Network activity contains more than one unique useragent
watch Network communications indicative of possible code injection originated from the process lsass.exe
watch One or more of the buffers contains an embedded PE file
watch Operates on local firewall's policies and settings
notice A process attempted to delay the analysis task.
notice An executable file was downloaded by the process 46.exe
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
info The executable uses a known packer
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (4cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (19cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://193.11.164.243:9030/tor/server/fp/2ce96a8a1da032664c90f574affbece18a6e8dfc+2ce9be1fc88b9d0fa03f387c9e4f000b5d4b2ae9+2cf4cb359b5763fd60e91651d829d9cdbe7e236f.z SE SUNET SUNET Swedish University Network 193.11.164.243 clean
http://23.129.64.201/tor/status-vote/current/consensus.z US EMERALD-ONION 23.129.64.201 1277 mailcious
http://131.188.40.189:443/tor/server/fp/2ce96a8a1da032664c90f574affbece18a6e8dfc+2ce9be1fc88b9d0fa03f387c9e4f000b5d4b2ae9+2cf4cb359b5763fd60e91651d829d9cdbe7e236f.z DE Verein zur Foerderung eines Deutschen Forschungsnetzes e.V. 131.188.40.189 mailcious
http://api.wipmania.com/ FR Online S.a.s. 212.83.168.196 clean
http://149.56.45.200:9030/tor/server/fp/023ebbc57beb7f45473b3dc2aa811fb3aaba4466+02928855bfad787f8b363f21860d1e7d156e0655+03c3069e814e296eb18776eb61b1ecb754ed89fe+0500ce70b0b3b7bba261bd7a60c753e40d56c5b8+050689f70b3bd4cde2b5cf5f46632dbb7759f3eb+06bbeaa6f7 CA OVH SAS 149.56.45.200 mailcious
http://185.215.113.93/cc22 Unknown 185.215.113.93 clean
http://185.215.113.93/pepwn.exe Unknown 185.215.113.93 malware
http://185.215.113.93/cc11 Unknown 185.215.113.93 1276 mailcious
api.wipmania.com FR Online S.a.s. 212.83.168.196 clean
23.129.64.201 US EMERALD-ONION 23.129.64.201 mailcious
130.185.250.214 Unknown 130.185.250.214 clean
173.75.39.61 US UUNET 173.75.39.61 clean
212.83.168.196 FR Online S.a.s. 212.83.168.196 clean
46.105.121.228 FR OVH SAS 46.105.121.228 clean
141.255.162.34 CH Private Layer INC 141.255.162.34 clean
193.11.164.243 SE SUNET SUNET Swedish University Network 193.11.164.243 clean
185.215.113.93 Unknown 185.215.113.93 malware
131.188.40.189 DE Verein zur Foerderung eines Deutschen Forschungsnetzes e.V. 131.188.40.189 mailcious
149.56.45.200 CA OVH SAS 149.56.45.200 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

SHLWAPI.dll
 0x402084 PathFileExistsW
MSVCRT.dll
 0x402038 __p__fmode
 0x40203c __set_app_type
 0x402040 __p__commode
 0x402044 _controlfp
 0x402048 _adjust_fdiv
 0x40204c __setusermatherr
 0x402050 _initterm
 0x402054 __getmainargs
 0x402058 _acmdln
 0x40205c exit
 0x402060 _XcptFilter
 0x402064 _exit
 0x402068 srand
 0x40206c rand
 0x402070 memset
 0x402074 _except_handler3
WININET.dll
 0x402094 InternetOpenW
 0x402098 InternetOpenUrlW
 0x40209c InternetCloseHandle
 0x4020a0 InternetReadFile
urlmon.dll
 0x4020a8 URLDownloadToFileW
KERNEL32.dll
 0x402000 CopyFileA
 0x402004 GetTickCount
 0x402008 CloseHandle
 0x40200c DeleteFileW
 0x402010 CreateProcessW
 0x402014 Sleep
 0x402018 CopyFileW
 0x40201c DeleteFileA
 0x402020 GetModuleHandleA
 0x402024 GetStartupInfoA
 0x402028 CreateFileW
 0x40202c ExpandEnvironmentStringsW
 0x402030 WriteFile
USER32.dll
 0x40208c wsprintfW
SHELL32.dll
 0x40207c ShellExecuteW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure