Report - nj.exe

Generic Malware SMTP KeyLogger AntiDebug AntiVM PE File .NET EXE OS Processor Check PE32
ScreenShot
Created 2021.06.25 10:25 Machine s1_win7_x6401
Filename nj.exe
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
AI Score
11
Behavior Score
3.6
ZERO API file : clean
VT API (file) 41 detected (malicious, high confidence, GenericKD, Unsafe, Save, TrojanPSW, Agensla, ZemsilF, muW@aybGCPaO, Attribute, HighConfidence, Razy, SpyBotNET, R002C0PFL21, TrojanAitInject, rlhhg, Tiggre, score, ai score=84, GdSda, Static AI, Suspicious PE, RATX, confidence, 100%)
md5 c2655295212060ebffe2e90b4f85e7fe
sha256 25252dc64356eeac34d104ce0527404eb133cb01cb15d0e5c45faa9a78ae5388
ssdeep 6144:+g+x/uTy3KtOYmytpGW4txSxg9eDlYNBOUXHzk:+g+xWTy3K1mVtxSxg9eDkk
imphash 8577e14dc855f7c118af900af77a1ea6
impfuzzy 96:Un7jGnUA0O5ta17tahV8+zmTz0wQcoVgDTIuTg4coTpPbNaYpm2:Un7kUzOHa+VKTg4cupNaYP
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 41 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (15cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
notice KeyLogger Run a KeyLogger memory
notice Network_SMTP_dotNet Communications smtp memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Is_DotNET_EXE (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info win_hook Affect hook table memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

MSVCR90.dll
 0x4200fc fwrite
 0x420100 __CxxExceptionFilter
 0x420104 __CxxRegisterExceptionObject
 0x420108 __CxxDetectRethrow
 0x42010c __CxxUnregisterExceptionObject
 0x420110 memmove_s
 0x420114 ??2@YAPAXI@Z
 0x420118 _invalid_parameter_noinfo
 0x42011c _CxxThrowException
 0x420120 __CxxQueryExceptionSize
 0x420124 calloc
 0x420128 fclose
 0x42012c _crt_debugger_hook
 0x420130 _controlfp_s
 0x420134 _invoke_watson
 0x420138 _except_handler4_common
 0x42013c _decode_pointer
 0x420140 _onexit
 0x420144 _lock
 0x420148 __dllonexit
 0x42014c _unlock
 0x420150 ?_type_info_dtor_internal_method@type_info@@QAEXXZ
 0x420154 ?terminate@@YAXXZ
 0x420158 __set_app_type
 0x42015c ??0exception@std@@QAE@XZ
 0x420160 ??_V@YAXPAX@Z
 0x420164 _encode_pointer
 0x420168 __p__fmode
 0x42016c __p__commode
 0x420170 _adjust_fdiv
 0x420174 __setusermatherr
 0x420178 _encoded_null
 0x42017c __FrameUnwindFilter
 0x420180 sprintf
 0x420184 free
 0x420188 fread
 0x42018c _configthreadlocale
 0x420190 _initterm_e
 0x420194 _initterm
 0x420198 _wcmdln
 0x42019c exit
 0x4201a0 _XcptFilter
 0x4201a4 _exit
 0x4201a8 _cexit
 0x4201ac __wgetmainargs
 0x4201b0 _amsg_exit
 0x4201b4 ??3@YAXPAX@Z
 0x4201b8 ??0exception@std@@QAE@ABV01@@Z
 0x4201bc ?what@exception@std@@UBEPBDXZ
 0x4201c0 ??1exception@std@@UAE@XZ
 0x4201c4 ??0exception@std@@QAE@ABQBD@Z
KERNEL32.dll
 0x420048 CompareFileTime
 0x42004c FileTimeToSystemTime
 0x420050 GetSystemTimes
 0x420054 GetSystemRegistryQuota
 0x420058 ExitThread
 0x42005c VirtualProtect
 0x420060 GetModuleHandleA
 0x420064 GetLastError
 0x420068 LocalAlloc
 0x42006c GetModuleHandleW
 0x420070 SetLastError
 0x420074 GetFileType
 0x420078 LocalFileTimeToFileTime
 0x42007c InterlockedExchange
 0x420080 Sleep
 0x420084 InterlockedCompareExchange
 0x420088 GetStartupInfoW
 0x42008c SetUnhandledExceptionFilter
 0x420090 QueryPerformanceCounter
 0x420094 GetTickCount
 0x420098 GetCurrentThreadId
 0x42009c GetCurrentProcessId
 0x4200a0 GetSystemTimeAsFileTime
 0x4200a4 TerminateProcess
 0x4200a8 GetCurrentProcess
 0x4200ac UnhandledExceptionFilter
 0x4200b0 IsDebuggerPresent
 0x4200b4 LoadLibraryW
 0x4200b8 GetTapeParameters
 0x4200bc IsProcessorFeaturePresent
 0x4200c0 GetNativeSystemInfo
 0x4200c4 GetSystemInfo
USER32.dll
 0x4201d4 CreateWindowExA
 0x4201d8 ShowWindow
 0x4201dc UpdateWindow
 0x4201e0 CreateCaret
 0x4201e4 GetCursor
 0x4201e8 AnyPopup
 0x4201ec GetWindowTextLengthW
 0x4201f0 GetWindowRect
 0x4201f4 GetClientRect
 0x4201f8 LoadIconW
 0x4201fc AdjustWindowRect
GDI32.dll
 0x420010 CreateDIBitmap
 0x420014 CreateEllipticRgn
 0x420018 SetPolyFillMode
 0x42001c StretchBlt
 0x420020 CreateDIBPatternBrush
 0x420024 EndPath
 0x420028 BitBlt
 0x42002c PlayMetaFileRecord
 0x420030 GetPath
 0x420034 FillPath
 0x420038 CreateDCA
 0x42003c BeginPath
 0x420040 CreateCompatibleBitmap
ADVAPI32.dll
 0x420000 RegSetValueW
SHELL32.dll
 0x4201cc DragAcceptFiles
MSIMG32.dll
 0x4200cc AlphaBlend
 0x4200d0 TransparentBlt
COMCTL32.dll
 0x420008 None
WINHTTP.dll
 0x420204 WinHttpConnect
 0x420208 WinHttpOpen
 0x42020c WinHttpSetOption
 0x420210 WinHttpReadData
 0x420214 WinHttpOpenRequest
MSVCP90.dll
 0x4200d8 ??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
 0x4200dc ?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
 0x4200e0 ??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
 0x4200e4 ??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
 0x4200e8 ??_D?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
 0x4200ec ??0?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
 0x4200f0 ??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
 0x4200f4 ??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
msvcm90.dll
 0x420224 ?RegisterModuleUninitializer@@@YAXP$AAVEventHandler@System@@@Z
 0x420228 ?DoDllLanguageSupportValidation@@@YAXXZ
 0x42022c ?ThrowModuleLoadException@@@YAXP$AAVString@System@@P$AAVException@3@@Z
 0x420230 ?DoCallBackInDefaultDomain@@@YAXP6GJPAX@Z0@Z
 0x420234 ?ThrowNestedModuleLoadException@@@YAXP$AAVException@System@@0@Z
 0x420238 ?ThrowModuleLoadException@@@YAXP$AAVString@System@@@Z
mscoree.dll
 0x42021c _CorExeMain

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure