Report - rdpclipd.exe

PE File PE32
ScreenShot
Created 2021.06.24 20:51 Machine s1_win7_x6401
Filename rdpclipd.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
4.6
ZERO API file : clean
VT API (file) 53 detected (AIDetect, malware1, malicious, high confidence, Redosdru, Unsafe, Save, confidence, 100%, Domar, dpmsdy, Gencirc, DownLoader16, ZEGOST, SM14, FJYJ, arjxq, ATRAPS, Gen4, ASCommon, Farfli, score, R139782, ai score=89, BScope, Generic@ML, RDMK, +dPQK8sRmgLxemUf9AU4iA, GenAsa, WSlM6c0I2qQ, Static AI, Suspicious PE, susgen)
md5 9356e66f9e704c587c66521fff104ddd
sha256 0a26e5b7a813b49276c7b02470d677db61171701b71e5697fa80cb6518a34865
ssdeep 192:67C2//WhoH9wwvLRkaD7oU/zTVXW0vGY2C+vkfEJD2JswP1oyn5608/:uC2XqoLRka/or0vGYtvADGsm1v6d
imphash 92d3052d4cbf487e84c4f1e98366fff8
impfuzzy 12:JaB+5QGu4Gv+GXRzGy5Fk7GzUJTMJqGOwd9Hydd43QBA/DzCqeJ2:JaB+5T0v+GdXk7+CIqqd243QB0Dz22
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 53 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a service
notice Creates executable files on the filesystem
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
info The executable uses a known packer

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://45.122.138.54/ads/4.jpg HK Guochao Group limited 45.122.138.54 clean
www.152cs.com CN CHINA UNICOM China169 Backbone 222.139.155.85 clean
45.122.138.54 HK Guochao Group limited 45.122.138.54 phishing
222.139.155.85 CN CHINA UNICOM China169 Backbone 222.139.155.85 clean

Suricata ids

PE API

IAT(Import Address Table) Library

MSVCRT.dll
 0x403060 realloc
 0x403064 _controlfp
 0x403068 _except_handler3
 0x40306c __set_app_type
 0x403070 __p__fmode
 0x403074 __p__commode
 0x403078 _adjust_fdiv
 0x40307c __setusermatherr
 0x403080 _initterm
 0x403084 __getmainargs
 0x403088 _acmdln
 0x40308c exit
 0x403090 _XcptFilter
 0x403094 _exit
 0x403098 _CIasin
 0x40309c _ftol
 0x4030a0 printf
 0x4030a4 ??3@YAXPAX@Z
 0x4030a8 ??2@YAPAXI@Z
 0x4030ac malloc
 0x4030b0 free
imagehlp.dll
 0x4030b8 MakeSureDirectoryPathExists
KERNEL32.dll
 0x403000 InterlockedExchange
 0x403004 LocalAlloc
 0x403008 GetStartupInfoA
 0x40300c GetModuleHandleA
 0x403010 SetFilePointer
 0x403014 GetFileSize
 0x403018 ReadFile
 0x40301c CreateFileA
 0x403020 WriteFile
 0x403024 CloseHandle
 0x403028 FreeLibrary
 0x40302c HeapFree
 0x403030 IsBadReadPtr
 0x403034 LoadLibraryA
 0x403038 GetProcAddress
 0x40303c VirtualFree
 0x403040 VirtualProtect
 0x403044 Sleep
 0x403048 VirtualAlloc
 0x40304c GetProcessHeap
 0x403050 HeapAlloc
 0x403054 GetLastError
 0x403058 RaiseException

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure