ScreenShot
Created | 2021.07.02 18:33 | Machine | s1_win7_x6402 |
Filename | pat.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 28 detected (AIDetect, malware1, malicious, high confidence, Artemis, Unsafe, Save, confidence, Attribute, HighConfidence, VMProtect, HashCity, R + Mal, VMProtBad, XPACK, PSWTroj, kcloud, Tnega, score, R426616, ZexaF, @BW@auesfFi, Generic@ML, RDML, ozipnu8w60GHoLYNBO6C6w, Static AI, Malicious PE, susgen, QVM19) | ||
md5 | 571d311fc434e77de22206602a9131d3 | ||
sha256 | 04a3b0f970d1689d6c1d6859c81ef3f41f1a503baf4275188e848548b2669950 | ||
ssdeep | 98304:u+F4gz3TK6AWl/7COZo5Bx66vH/6V/wsmgxBrEw1lhDJX6SWE9n4GT9xEr2Rh+e:u+FMWlzCD5npIhmaAUIJE9BTTGK+e | ||
imphash | b0a3c6817c3bc91463a81826e090915c | ||
impfuzzy | 12:DBLkFCXbL4MQ5kBZGoQtXJxZGb9AJcDfA5kLfP9m:9LkSYMQ58QtXJHc9NDI5Q8 |
Network IP location
Signature (18cnts)
Level | Description |
---|---|
warning | File has been identified by 28 AntiVirus engines on VirusTotal as malicious |
watch | Attempts to access Bitcoin/ALTCoin wallets |
watch | Communicates with host for which no DNS query was performed |
watch | Disables proxy possibly for traffic interception |
watch | Harvests credentials from local FTP client softwares |
watch | Harvests information related to installed instant messenger clients |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Searches running processes potentially to identify processes for sandbox evasion |
notice | Sends data using the HTTP POST Method |
notice | Steals private information from local Internet browsers |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is likely packed with VMProtect |
info | Checks amount of memory in system |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | Tries to locate where the browsers are installed |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | VMProtect_Zero | VMProtect packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (5cnts) ?
Suricata ids
ET HUNTING Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0xd51000 GetVersionExA
USER32.dll
0xd51008 GetDC
GDI32.dll
0xd51010 DeleteObject
SHLWAPI.dll
0xd51018 PathFindExtensionW
gdiplus.dll
0xd51020 GdipSaveImageToFile
WININET.dll
0xd51028 InternetWriteFile
WTSAPI32.dll
0xd51030 WTSSendMessageW
KERNEL32.dll
0xd51038 VirtualQuery
USER32.dll
0xd51040 GetProcessWindowStation
KERNEL32.dll
0xd51048 LocalAlloc
0xd5104c LocalFree
0xd51050 GetModuleFileNameW
0xd51054 GetProcessAffinityMask
0xd51058 SetProcessAffinityMask
0xd5105c SetThreadAffinityMask
0xd51060 Sleep
0xd51064 ExitProcess
0xd51068 FreeLibrary
0xd5106c LoadLibraryA
0xd51070 GetModuleHandleA
0xd51074 GetProcAddress
USER32.dll
0xd5107c GetProcessWindowStation
0xd51080 GetUserObjectInformationW
EAT(Export Address Table) is none
KERNEL32.dll
0xd51000 GetVersionExA
USER32.dll
0xd51008 GetDC
GDI32.dll
0xd51010 DeleteObject
SHLWAPI.dll
0xd51018 PathFindExtensionW
gdiplus.dll
0xd51020 GdipSaveImageToFile
WININET.dll
0xd51028 InternetWriteFile
WTSAPI32.dll
0xd51030 WTSSendMessageW
KERNEL32.dll
0xd51038 VirtualQuery
USER32.dll
0xd51040 GetProcessWindowStation
KERNEL32.dll
0xd51048 LocalAlloc
0xd5104c LocalFree
0xd51050 GetModuleFileNameW
0xd51054 GetProcessAffinityMask
0xd51058 SetProcessAffinityMask
0xd5105c SetThreadAffinityMask
0xd51060 Sleep
0xd51064 ExitProcess
0xd51068 FreeLibrary
0xd5106c LoadLibraryA
0xd51070 GetModuleHandleA
0xd51074 GetProcAddress
USER32.dll
0xd5107c GetProcessWindowStation
0xd51080 GetUserObjectInformationW
EAT(Export Address Table) is none