Report - imagen01.jpg

PE File PE32 PE64
ScreenShot
Created 2021.06.15 21:28 Machine s1_win7_x6401
Filename imagen01.jpg
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
12
Behavior Score
7.4
ZERO API file : malware
VT API (file) 43 detected (GenericKD, Unsafe, malicious, confidence, 100%, Attribute, HighConfidence, NsisInject, odady, R069C0WIC20, Artemis, susgen, Tiggre, Hacktool, score, ai score=83, Limpopo, Kronosbot, Konus, G4wbRRZm8RN, Rugmi, GdSda)
md5 793707365df26450bc8642f518a540f0
sha256 7131d78da58eb6b54db8466e0c09d7173da6f05c5615841a73dc6a032648a217
ssdeep 24576:8Ec46GnhPe4h/N5m8loOoYJ/HRz1IgRizQJYiEH0YSXHZTNbf86:8EBQ2xrVEcXfbf86
imphash 019647f8a1eb3148b0e2b8be3fbd329b
impfuzzy 192:f3LhfINwGpxOcdoPOvZyPosFq43kxUvVFut8CXceQObD:/Lh5LK3E33EQeQObD
  Network IP location

Signature (15cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Creates a windows hook that monitors keyboard input (keylogger)
watch Deletes executed files from disk
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Drops a binary and executes it
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality

Rules (4cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://193.23.244.244/tor/status-vote/current/consensus DE Chaos Computer Club e.V. 193.23.244.244 mailcious
https://i.imgur.com/qOLD3Td.png US FASTLY 151.101.40.193 clean
i.imgur.com US FASTLY 151.101.52.193 mailcious
151.101.40.193 US FASTLY 151.101.40.193 mailcious
193.23.244.244 DE Chaos Computer Club e.V. 193.23.244.244 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.DLL
 0x5450f0 EqualSid
 0x5450f4 InitializeAcl
 0x5450f8 OpenProcessToken
 0x5450fc RegCloseKey
 0x545100 RegCreateKeyExA
 0x545104 RegDeleteKeyA
 0x545108 RegEnumKeyA
 0x54510c RegEnumKeyExW
 0x545110 RegOpenKeyA
 0x545114 RegOpenKeyExA
 0x545118 RegQueryValueA
 0x54511c RegQueryValueExA
 0x545120 RegRestoreKeyA
 0x545124 RegSetValueExA
KERNEL32.DLL
 0x5452e4 CloseHandle
 0x5452e8 CompareStringA
 0x5452ec CreateEventA
 0x5452f0 CreateFileA
 0x5452f4 CreateMutexA
 0x5452f8 CreateNamedPipeA
 0x5452fc CreateThread
 0x545300 DeleteCriticalSection
 0x545304 EnterCriticalSection
 0x545308 EnumCalendarInfoA
 0x54530c ExitProcess
 0x545310 FatalAppExitA
 0x545314 FileTimeToDosDateTime
 0x545318 FileTimeToLocalFileTime
 0x54531c FindClose
 0x545320 FindFirstFileA
 0x545324 FindResourceA
 0x545328 FormatMessageA
 0x54532c FreeLibrary
 0x545330 FreeResource
 0x545334 GetACP
 0x545338 GetCPInfo
 0x54533c GetCommandLineA
 0x545340 GetCurrentDirectoryA
 0x545344 GetCurrentProcessId
 0x545348 GetCurrentThreadId
 0x54534c GetDateFormatA
 0x545350 GetDiskFreeSpaceA
 0x545354 GetEnvironmentStrings
 0x545358 GetFileSize
 0x54535c GetFileType
 0x545360 GetLastError
 0x545364 GetLocalTime
 0x545368 GetLocaleInfoA
 0x54536c GetModuleFileNameA
 0x545370 GetModuleHandleA
 0x545374 GetOEMCP
 0x545378 GetProcAddress
 0x54537c GetProcessHeap
 0x545380 GetStartupInfoA
 0x545384 GetStdHandle
 0x545388 GetStringTypeExA
 0x54538c GetStringTypeW
 0x545390 GetSystemInfo
 0x545394 GetSystemTime
 0x545398 GetThreadLocale
 0x54539c GetTickCount
 0x5453a0 GetVersion
 0x5453a4 GetVersionExA
 0x5453a8 GlobalAddAtomA
 0x5453ac GlobalAlloc
 0x5453b0 GlobalDeleteAtom
 0x5453b4 GlobalFindAtomA
 0x5453b8 GlobalFree
 0x5453bc GlobalHandle
 0x5453c0 GlobalLock
 0x5453c4 GlobalMemoryStatus
 0x5453c8 GlobalReAlloc
 0x5453cc GlobalUnlock
 0x5453d0 HeapAlloc
 0x5453d4 HeapFree
 0x5453d8 InitializeCriticalSection
 0x5453dc InterlockedDecrement
 0x5453e0 InterlockedIncrement
 0x5453e4 IsDBCSLeadByte
 0x5453e8 LeaveCriticalSection
 0x5453ec LoadLibraryA
 0x5453f0 LoadLibraryExA
 0x5453f4 LoadResource
 0x5453f8 LocalAlloc
 0x5453fc LocalFree
 0x545400 LockResource
 0x545404 MulDiv
 0x545408 MultiByteToWideChar
 0x54540c OpenEventW
 0x545410 OpenFileMappingA
 0x545414 RaiseException
 0x545418 ReadFile
 0x54541c ReleaseMutex
 0x545420 ResetEvent
 0x545424 RtlUnwind
 0x545428 SearchPathA
 0x54542c SetConsoleCtrlHandler
 0x545430 SetEndOfFile
 0x545434 SetErrorMode
 0x545438 SetEvent
 0x54543c SetFilePointer
 0x545440 SetHandleCount
 0x545444 SetLastError
 0x545448 SetSystemTime
 0x54544c SetThreadLocale
 0x545450 SizeofResource
 0x545454 Sleep
 0x545458 TlsAlloc
 0x54545c TlsFree
 0x545460 TlsGetValue
 0x545464 TlsSetValue
 0x545468 UnhandledExceptionFilter
 0x54546c VirtualAlloc
 0x545470 VirtualFree
 0x545474 VirtualQuery
 0x545478 WaitForSingleObject
 0x54547c WideCharToMultiByte
 0x545480 WriteFile
 0x545484 WriteFileEx
 0x545488 lstrcmpA
 0x54548c lstrcpyA
 0x545490 lstrcpynA
 0x545494 lstrlenA
VERSION.DLL
 0x5454ac GetFileVersionInfoA
 0x5454b0 GetFileVersionInfoSizeA
 0x5454b4 VerQueryValueA
COMCTL32.DLL
 0x545520 ImageList_Add
 0x545524 ImageList_BeginDrag
 0x545528 ImageList_Create
 0x54552c ImageList_Destroy
 0x545530 ImageList_DragEnter
 0x545534 ImageList_DragLeave
 0x545538 ImageList_DragMove
 0x54553c ImageList_DragShowNolock
 0x545540 ImageList_Draw
 0x545544 ImageList_DrawEx
 0x545548 ImageList_EndDrag
 0x54554c ImageList_GetBkColor
 0x545550 ImageList_GetDragImage
 0x545554 ImageList_GetIconSize
 0x545558 ImageList_GetImageCount
 0x54555c ImageList_Read
 0x545560 ImageList_Remove
 0x545564 ImageList_Replace
 0x545568 ImageList_ReplaceIcon
 0x54556c ImageList_SetBkColor
 0x545570 ImageList_SetDragCursorImage
 0x545574 ImageList_SetIconSize
 0x545578 ImageList_Write
 0x54557c None
GDI32.DLL
 0x5456f4 Arc
 0x5456f8 BitBlt
 0x5456fc CombineRgn
 0x545700 CopyEnhMetaFileA
 0x545704 CreateBitmap
 0x545708 CreateBrushIndirect
 0x54570c CreateCompatibleBitmap
 0x545710 CreateCompatibleDC
 0x545714 CreateDIBSection
 0x545718 CreateDIBitmap
 0x54571c CreateFontIndirectA
 0x545720 CreateHalftonePalette
 0x545724 CreatePalette
 0x545728 CreatePenIndirect
 0x54572c CreatePolygonRgn
 0x545730 CreateRectRgn
 0x545734 CreateSolidBrush
 0x545738 DeleteDC
 0x54573c DeleteEnhMetaFile
 0x545740 DeleteObject
 0x545744 Ellipse
 0x545748 EnumFontsA
 0x54574c ExcludeClipRect
 0x545750 ExtCreatePen
 0x545754 ExtSelectClipRgn
 0x545758 ExtTextOutA
 0x54575c GetBitmapBits
 0x545760 GetBkColor
 0x545764 GetBkMode
 0x545768 GetBrushOrgEx
 0x54576c GetClipBox
 0x545770 GetCurrentPositionEx
 0x545774 GetDCOrgEx
 0x545778 GetDIBColorTable
 0x54577c GetDIBits
 0x545780 GetDeviceCaps
 0x545784 GetEnhMetaFileBits
 0x545788 GetEnhMetaFileHeader
 0x54578c GetEnhMetaFilePaletteEntries
 0x545790 GetNearestColor
 0x545794 GetObjectA
 0x545798 GetPaletteEntries
 0x54579c GetPixel
 0x5457a0 GetRgnBox
 0x5457a4 GetStockObject
 0x5457a8 GetSystemPaletteEntries
 0x5457ac GetTextAlign
 0x5457b0 GetTextExtentPoint32A
 0x5457b4 GetTextExtentPointA
 0x5457b8 GetTextMetricsA
 0x5457bc GetWinMetaFileBits
 0x5457c0 GetWindowOrgEx
 0x5457c4 IntersectClipRect
 0x5457c8 LPtoDP
 0x5457cc LineTo
 0x5457d0 MaskBlt
 0x5457d4 MoveToEx
 0x5457d8 PatBlt
 0x5457dc Pie
 0x5457e0 PlayEnhMetaFile
 0x5457e4 PolyPolyline
 0x5457e8 Polygon
 0x5457ec Polyline
 0x5457f0 RealizePalette
 0x5457f4 RectVisible
 0x5457f8 Rectangle
 0x5457fc RestoreDC
 0x545800 RoundRect
 0x545804 SaveDC
 0x545808 SelectClipRgn
 0x54580c SelectObject
 0x545810 SelectPalette
 0x545814 SetBkColor
 0x545818 SetBkMode
 0x54581c SetBrushOrgEx
 0x545820 SetDIBColorTable
 0x545824 SetEnhMetaFileBits
 0x545828 SetMapMode
 0x54582c SetPixel
 0x545830 SetROP2
 0x545834 SetStretchBltMode
 0x545838 SetTextAlign
 0x54583c SetTextColor
 0x545840 SetViewportExtEx
 0x545844 SetViewportOrgEx
 0x545848 SetWinMetaFileBits
 0x54584c SetWindowExtEx
 0x545850 SetWindowOrgEx
 0x545854 StretchBlt
 0x545858 TextOutA
 0x54585c UnrealizeObject
USER32.DLL
 0x545b34 ActivateKeyboardLayout
 0x545b38 AdjustWindowRectEx
 0x545b3c BeginPaint
 0x545b40 CallNextHookEx
 0x545b44 CallWindowProcA
 0x545b48 CharLowerA
 0x545b4c CharLowerBuffA
 0x545b50 CharNextA
 0x545b54 CharToOemA
 0x545b58 CharToOemBuffA
 0x545b5c CharUpperBuffA
 0x545b60 CheckMenuItem
 0x545b64 ChildWindowFromPoint
 0x545b68 ClientToScreen
 0x545b6c CloseClipboard
 0x545b70 CreateIcon
 0x545b74 CreateMenu
 0x545b78 CreatePopupMenu
 0x545b7c CreateWindowExA
 0x545b80 DefFrameProcA
 0x545b84 DefMDIChildProcA
 0x545b88 DefWindowProcA
 0x545b8c DeleteMenu
 0x545b90 DestroyCursor
 0x545b94 DestroyIcon
 0x545b98 DestroyMenu
 0x545b9c DestroyWindow
 0x545ba0 DispatchMessageA
 0x545ba4 DrawEdge
 0x545ba8 DrawFocusRect
 0x545bac DrawFrameControl
 0x545bb0 DrawIcon
 0x545bb4 DrawIconEx
 0x545bb8 DrawMenuBar
 0x545bbc DrawTextA
 0x545bc0 EmptyClipboard
 0x545bc4 EnableMenuItem
 0x545bc8 EnableScrollBar
 0x545bcc EnableWindow
 0x545bd0 EndPaint
 0x545bd4 EnumClipboardFormats
 0x545bd8 EnumThreadWindows
 0x545bdc EnumWindows
 0x545be0 EqualRect
 0x545be4 FillRect
 0x545be8 FindWindowA
 0x545bec FrameRect
 0x545bf0 GetActiveWindow
 0x545bf4 GetCapture
 0x545bf8 GetCaretPos
 0x545bfc GetClassInfoA
 0x545c00 GetClassNameA
 0x545c04 GetClientRect
 0x545c08 GetClipboardData
 0x545c0c GetCursor
 0x545c10 GetCursorPos
 0x545c14 GetDC
 0x545c18 GetDCEx
 0x545c1c GetDesktopWindow
 0x545c20 GetDoubleClickTime
 0x545c24 GetFocus
 0x545c28 GetForegroundWindow
 0x545c2c GetIconInfo
 0x545c30 GetKeyNameTextA
 0x545c34 GetKeyState
 0x545c38 GetKeyboardLayout
 0x545c3c GetKeyboardLayoutList
 0x545c40 GetKeyboardState
 0x545c44 GetKeyboardType
 0x545c48 GetLastActivePopup
 0x545c4c GetMenu
 0x545c50 GetMenuItemCount
 0x545c54 GetMenuItemID
 0x545c58 GetMenuItemInfoA
 0x545c5c GetMenuState
 0x545c60 GetMenuStringA
 0x545c64 GetMessagePos
 0x545c68 GetMessageTime
 0x545c6c GetParent
 0x545c70 GetPropA
 0x545c74 GetScrollInfo
 0x545c78 GetScrollPos
 0x545c7c GetScrollRange
 0x545c80 GetSubMenu
 0x545c84 GetSystemMenu
 0x545c88 GetSystemMetrics
 0x545c8c GetTopWindow
 0x545c90 GetWindow
 0x545c94 GetWindowDC
 0x545c98 GetWindowLongA
 0x545c9c GetWindowPlacement
 0x545ca0 GetWindowRect
 0x545ca4 GetWindowTextA
 0x545ca8 GetWindowThreadProcessId
 0x545cac InflateRect
 0x545cb0 InsertMenuA
 0x545cb4 InsertMenuItemA
 0x545cb8 IntersectRect
 0x545cbc InvalidateRect
 0x545cc0 IsCharAlphaA
 0x545cc4 IsCharAlphaNumericA
 0x545cc8 IsChild
 0x545ccc IsDialogMessageA
 0x545cd0 IsIconic
 0x545cd4 IsRectEmpty
 0x545cd8 IsWindow
 0x545cdc IsWindowEnabled
 0x545ce0 IsWindowVisible
 0x545ce4 IsZoomed
 0x545ce8 KillTimer
 0x545cec LoadBitmapA
 0x545cf0 LoadCursorA
 0x545cf4 LoadIconA
 0x545cf8 LoadKeyboardLayoutA
 0x545cfc LoadStringA
 0x545d00 MapVirtualKeyA
 0x545d04 MapWindowPoints
 0x545d08 MessageBeep
 0x545d0c MessageBoxA
 0x545d10 OemToCharA
 0x545d14 OemToCharBuffA
 0x545d18 OffsetRect
 0x545d1c OpenClipboard
 0x545d20 PeekMessageA
 0x545d24 PostMessageA
 0x545d28 PostQuitMessage
 0x545d2c PtInRect
 0x545d30 RedrawWindow
 0x545d34 RegisterClassA
 0x545d38 RegisterClipboardFormatA
 0x545d3c RegisterWindowMessageA
 0x545d40 ReleaseCapture
 0x545d44 ReleaseDC
 0x545d48 RemoveMenu
 0x545d4c RemovePropA
 0x545d50 ScreenToClient
 0x545d54 ScrollWindow
 0x545d58 ScrollWindowEx
 0x545d5c SendMessageA
 0x545d60 SetActiveWindow
 0x545d64 SetCapture
 0x545d68 SetClassLongA
 0x545d6c SetClipboardData
 0x545d70 SetCursor
 0x545d74 SetFocus
 0x545d78 SetForegroundWindow
 0x545d7c SetKeyboardState
 0x545d80 SetMenu
 0x545d84 SetMenuItemInfoA
 0x545d88 SetParent
 0x545d8c SetPropA
 0x545d90 SetRect
 0x545d94 SetScrollInfo
 0x545d98 SetScrollPos
 0x545d9c SetScrollRange
 0x545da0 SetTimer
 0x545da4 SetWindowLongA
 0x545da8 SetWindowPlacement
 0x545dac SetWindowPos
 0x545db0 SetWindowTextA
 0x545db4 SetWindowsHookExA
 0x545db8 ShowCursor
 0x545dbc ShowOwnedPopups
 0x545dc0 ShowScrollBar
 0x545dc4 ShowWindow
 0x545dc8 SystemParametersInfoA
 0x545dcc TrackPopupMenu
 0x545dd0 TranslateMDISysAccel
 0x545dd4 TranslateMessage
 0x545dd8 UnhookWindowsHookEx
 0x545ddc UnionRect
 0x545de0 UnregisterClassA
 0x545de4 UpdateWindow
 0x545de8 ValidateRect
 0x545dec WaitMessage
 0x545df0 WinHelpA
 0x545df4 WindowFromPoint
 0x545df8 wsprintfA
 0x545dfc GetSysColor
OLE32.DLL
 0x545e28 CLSIDFromString
 0x545e2c CoCreateInstance
 0x545e30 CoGetClassObject
 0x545e34 CoInitialize
 0x545e38 CoTaskMemFree
 0x545e3c CoUninitialize
 0x545e40 IsEqualGUID
 0x545e44 StringFromCLSID
OLEAUT32.DLL
 0x545ed0 CreateErrorInfo
 0x545ed4 GetErrorInfo
 0x545ed8 SafeArrayAccessData
 0x545edc SafeArrayCopy
 0x545ee0 SafeArrayCreate
 0x545ee4 SafeArrayDestroy
 0x545ee8 SafeArrayGetElement
 0x545eec SafeArrayGetLBound
 0x545ef0 SafeArrayGetUBound
 0x545ef4 SafeArrayPtrOfIndex
 0x545ef8 SafeArrayPutElement
 0x545efc SafeArrayRedim
 0x545f00 SafeArrayUnaccessData
 0x545f04 SetErrorInfo
 0x545f08 SysAllocStringLen
 0x545f0c SysFreeString
 0x545f10 SysReAllocStringLen
 0x545f14 VarBoolFromStr
 0x545f18 VarBstrFromBool
 0x545f1c VarBstrFromCy
 0x545f20 VarBstrFromDate
 0x545f24 VarCyFromStr
 0x545f28 VarDateFromStr
 0x545f2c VarI4FromStr
 0x545f30 VarNeg
 0x545f34 VarNot
 0x545f38 VarR8FromStr
 0x545f3c VariantChangeTypeEx
 0x545f40 VariantClear
 0x545f44 VariantCopy
 0x545f48 VariantCopyInd
 0x545f4c VariantInit

EAT(Export Address Table) Library

0x402b68 @@Simsons@Finalize
0x402b58 @@Simsons@Initialize
0x53e630 _Form1
0x40160d __GetExceptDLLinfo
0x52f098 ___CPPdebugHook


Similarity measure (PE file only) - Checking for service failure