Report - preloader.exe

PE File OS Processor Check PE32
ScreenShot
Created 2021.07.03 18:29 Machine s1_win7_x6401
Filename preloader.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
4.4
ZERO API file : malware
VT API (file) 34 detected (AIDetect, malware2, malicious, high confidence, guW@aKTiSUoi, Unsafe, Save, Attribute, HighConfidence, AGEN, Artemis, Wacatac, score, ai score=89, R002H09G221, PossibleThreat, confidence)
md5 9ef7986267bda788fec22557df41e6f1
sha256 5edf36f66a907a94f784312aba40f5090418e4a1b404d53d88965ad11fdeec20
ssdeep 3072:z2kNdv6G5BHlLjBRQHiabSttu1wY/q8qhcLskyh7ppkCvPx3:KkN/jF+HbfwY/k7kq53
imphash 379eeb3dff6fa63dd79e7b6f6a70f460
impfuzzy 24:dPOYdMUZtMS17bJnc+pl3eDoTZoEOovbOIhvRRZHu9Fhyj52hb:5OYbtMS17lc+pp/Zc3Wowtub
  Network IP location

Signature (10cnts)

Level Description
danger File has been identified by 34 AntiVirus engines on VirusTotal as malicious
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An executable file was downloaded by the process preloader.exe
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
info Collects information to fingerprint the system (MachineGuid

Rules (5cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (9cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://fikerty.info/app.exe US CLOUDFLARENET 172.67.202.130 malware
http://touchook.info/ US CLOUDFLARENET 104.21.63.133 clean
https://fackerty.info/app.exe US CLOUDFLARENET 172.67.155.53 malware
fikerty.info US CLOUDFLARENET 104.21.76.249 malware
fackerty.info US CLOUDFLARENET 104.21.89.3 malware
touchook.info US CLOUDFLARENET 172.67.145.198 clean
172.67.155.53 US CLOUDFLARENET 172.67.155.53 clean
172.67.145.198 US CLOUDFLARENET 172.67.145.198 mailcious
172.67.202.130 US CLOUDFLARENET 172.67.202.130 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x413008 GetLastError
 0x41300c DeleteFileW
 0x413010 CreateFileW
 0x413014 CreateProcessW
 0x413018 OpenMutexW
 0x41301c DecodePointer
 0x413020 CloseHandle
 0x413024 Sleep
 0x413028 WriteFile
 0x41302c GetConsoleMode
 0x413030 GetConsoleOutputCP
 0x413034 FlushFileBuffers
 0x413038 HeapReAlloc
 0x41303c HeapSize
 0x413040 SetFilePointerEx
 0x413044 GetProcessHeap
 0x413048 UnhandledExceptionFilter
 0x41304c SetUnhandledExceptionFilter
 0x413050 GetCurrentProcess
 0x413054 TerminateProcess
 0x413058 IsProcessorFeaturePresent
 0x41305c QueryPerformanceCounter
 0x413060 GetCurrentProcessId
 0x413064 GetCurrentThreadId
 0x413068 GetSystemTimeAsFileTime
 0x41306c InitializeSListHead
 0x413070 IsDebuggerPresent
 0x413074 GetStartupInfoW
 0x413078 GetModuleHandleW
 0x41307c RtlUnwind
 0x413080 SetLastError
 0x413084 EnterCriticalSection
 0x413088 LeaveCriticalSection
 0x41308c DeleteCriticalSection
 0x413090 InitializeCriticalSectionAndSpinCount
 0x413094 TlsAlloc
 0x413098 TlsGetValue
 0x41309c TlsSetValue
 0x4130a0 TlsFree
 0x4130a4 FreeLibrary
 0x4130a8 GetProcAddress
 0x4130ac LoadLibraryExW
 0x4130b0 RaiseException
 0x4130b4 GetStdHandle
 0x4130b8 GetModuleFileNameW
 0x4130bc ExitProcess
 0x4130c0 GetModuleHandleExW
 0x4130c4 GetCommandLineA
 0x4130c8 GetCommandLineW
 0x4130cc HeapFree
 0x4130d0 HeapAlloc
 0x4130d4 GetFileType
 0x4130d8 FindClose
 0x4130dc FindFirstFileExW
 0x4130e0 FindNextFileW
 0x4130e4 IsValidCodePage
 0x4130e8 GetACP
 0x4130ec GetOEMCP
 0x4130f0 GetCPInfo
 0x4130f4 MultiByteToWideChar
 0x4130f8 WideCharToMultiByte
 0x4130fc GetEnvironmentStringsW
 0x413100 FreeEnvironmentStringsW
 0x413104 SetEnvironmentVariableW
 0x413108 SetStdHandle
 0x41310c GetStringTypeW
 0x413110 CompareStringW
 0x413114 LCMapStringW
 0x413118 WriteConsoleW
ADVAPI32.dll
 0x413000 RegGetValueA
WININET.dll
 0x413120 InternetSetOptionW
 0x413124 InternetConnectW
 0x413128 InternetCloseHandle
 0x41312c HttpSendRequestW
 0x413130 InternetReadFile
 0x413134 HttpQueryInfoW
 0x413138 InternetOpenW
 0x41313c InternetOpenUrlW
 0x413140 HttpOpenRequestW
 0x413144 InternetCrackUrlW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure