Report - Protecteded.exe

AntiDebug AntiVM PE32 PE File
ScreenShot
Created 2021.06.30 10:14 Machine s1_win7_x6402
Filename Protecteded.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
10.4
ZERO API file : clean
VT API (file) 50 detected (AIDetect, malware2, malicious, high confidence, Razy, Unsafe, Save, FLFY, Attribute, HighConfidence, EPJG, R002H0CFS21, PWSX, Solmyr, Auto, AGEN, Inject4, VirRansom, Score, KVM006, kcloud, Zbot, Artemis, ai score=83, BScope, TrojanPSW, Racealer, CLASSIC, susgen, PossibleThreat, HykCPkQA)
md5 db77d643f56c5e832b3b67492debaedd
sha256 90cf380fe740fe0238b6657feee9905d2f03a6945bcde6db01f24948a3a41a7a
ssdeep 49152:sW6O75oig21VgjmeqP0QE8oIw+P3Rp/exp969:sVb869qNpoIw+PfQT2
imphash 4dfea731e342ecfb5ceb366d5bafbbf1
impfuzzy 48:c4FmAz/l1wzxQQZwgowbbV2gkH1xR3Yl39Pjw419xoT+ytmFNjWc4jMhHw+pxmHy:+Az/l1GxQQZfoubogkH1xRuNPjl19xQG
  Network IP location

Signature (21cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Communicates with host for which no DNS query was performed
watch Creates a windows hook that monitors keyboard input (keylogger)
watch Installs an hook procedure to monitor for mouse events
watch Looks for the Windows Idle Time to determine the uptime
watch One or more of the buffers contains an embedded PE file
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Connects to a Dynamic DNS Domain
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks amount of memory in system
info One or more processes crashed
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (10cnts)

Level Name Description Collection
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
csoltero.duckdns.org NL Danilenko, Artyom 194.5.98.207 clean
194.5.98.207 NL Danilenko, Artyom 194.5.98.207 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x58b000 GetProcAddress
 0x58b004 RtlMoveMemory
 0x58b008 GetModuleHandleW
 0x58b00c WriteFile
 0x58b010 RtlFillMemory
MSVBVM60.DLL
 0x58b018 __vbaVarSub
 0x58b01c __vbaStrI2
 0x58b020 _CIcos
 0x58b024 _adj_fptan
 0x58b028 __vbaVarMove
 0x58b02c __vbaStrI4
 0x58b030 __vbaVarVargNofree
 0x58b034 __vbaFreeVar
 0x58b038 __vbaAryMove
 0x58b03c __vbaStrVarMove
 0x58b040 __vbaLenBstr
 0x58b044 __vbaFreeVarList
 0x58b048 _adj_fdiv_m64
 0x58b04c None
 0x58b050 __vbaFreeObjList
 0x58b054 __vbaStrErrVarCopy
 0x58b058 _adj_fprem1
 0x58b05c __vbaStrCat
 0x58b060 __vbaSetSystemError
 0x58b064 __vbaHresultCheckObj
 0x58b068 __vbaLenVar
 0x58b06c _adj_fdiv_m32
 0x58b070 __vbaAryDestruct
 0x58b074 __vbaObjSet
 0x58b078 None
 0x58b07c _adj_fdiv_m16i
 0x58b080 __vbaObjSetAddref
 0x58b084 _adj_fdivr_m16i
 0x58b088 __vbaVarTstLt
 0x58b08c __vbaRefVarAry
 0x58b090 __vbaBoolVarNull
 0x58b094 _CIsin
 0x58b098 None
 0x58b09c __vbaChkstk
 0x58b0a0 EVENT_SINK_AddRef
 0x58b0a4 None
 0x58b0a8 None
 0x58b0ac __vbaVarLikeVar
 0x58b0b0 DllFunctionCall
 0x58b0b4 _adj_fpatan
 0x58b0b8 __vbaRedim
 0x58b0bc EVENT_SINK_Release
 0x58b0c0 __vbaNew
 0x58b0c4 _CIsqrt
 0x58b0c8 EVENT_SINK_QueryInterface
 0x58b0cc __vbaStr2Vec
 0x58b0d0 __vbaExceptHandler
 0x58b0d4 __vbaStrToUnicode
 0x58b0d8 _adj_fprem
 0x58b0dc _adj_fdivr_m64
 0x58b0e0 None
 0x58b0e4 __vbaFPException
 0x58b0e8 None
 0x58b0ec __vbaStrVarVal
 0x58b0f0 __vbaUbound
 0x58b0f4 __vbaVarCat
 0x58b0f8 None
 0x58b0fc _CIlog
 0x58b100 __vbaNew2
 0x58b104 __vbaR8Str
 0x58b108 _adj_fdiv_m32i
 0x58b10c _adj_fdivr_m32i
 0x58b110 __vbaStrCopy
 0x58b114 __vbaI4Str
 0x58b118 __vbaFreeStrList
 0x58b11c _adj_fdivr_m32
 0x58b120 _adj_fdiv_r
 0x58b124 None
 0x58b128 __vbaI4Var
 0x58b12c __vbaAryLock
 0x58b130 __vbaVarAdd
 0x58b134 __vbaStrToAnsi
 0x58b138 __vbaVarDup
 0x58b13c __vbaVarCopy
 0x58b140 None
 0x58b144 _CIatan
 0x58b148 __vbaStrMove
 0x58b14c __vbaCastObj
 0x58b150 __vbaAryCopy
 0x58b154 _allmul
 0x58b158 _CItan
 0x58b15c __vbaAryUnlock
 0x58b160 None
 0x58b164 _CIexp
 0x58b168 __vbaFreeStr
 0x58b16c __vbaFreeObj

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure