Report - newApps.exe

NPKI Generic Malware Antivirus PE64 PE File PE32 DLL .NET DLL
ScreenShot
Created 2021.07.13 09:45 Machine s1_win7_x6401
Filename newApps.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
3
Behavior Score
8.6
ZERO API file : clean
VT API (file) 36 detected (DownLoad4, GenericKD, Unsafe, Save, GenCBL, malicious, confidence, YUMT, seskno, DangerousSig, Artemis, npkep, ai score=86, Tnega, score, R002H0DGA21, susgen, H8oAfUsA)
md5 1d3ee4783ce7a30a7fd422f5abe7ba25
sha256 f9fe730178dcb234b908d759db705a9f78c1505df5bd5c09a5369a6f9ed2363b
ssdeep 98304:KRXBy+ZqGGBfu6ETBJjvgQKNHnFDJiy6OL9BAYHRZ2uBO9D6y:UxtZ5G4vTBJ7UHGy6OL9BAKeuqWy
imphash f32b3285ebecf2ab26752aa86ba5f08c
impfuzzy 24:UbVjhN5O+VuT2oLtXOr6kwmDruMztxdEr6UNQtXJHc9NDI5Q8:K5O+VAXOmGx0nAXpcM5Q8
  Network IP location

Signature (21cnts)

Level Description
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
watch Creates a suspicious Powershell process
watch Detects the presence of Wine emulator
watch One or more non-whitelisted processes were created
watch The process powershell.exe wrote an executable file to disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Uses Windows APIs to generate a cryptographic key

Rules (9cnts)

Level Name Description Collection
danger NPKI_Zero File included NPKI binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
info Is_DotNET_DLL (no description) binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0xa41000 WriteFile
 0xa41008 WriteConsoleW
 0xa41010 WaitForMultipleObjects
 0xa41018 WaitForSingleObject
 0xa41020 VirtualQuery
 0xa41028 VirtualFree
 0xa41030 VirtualAlloc
 0xa41038 SwitchToThread
 0xa41040 SuspendThread
 0xa41048 Sleep
 0xa41050 SetWaitableTimer
 0xa41058 SetUnhandledExceptionFilter
 0xa41060 SetProcessPriorityBoost
 0xa41068 SetEvent
 0xa41070 SetErrorMode
 0xa41078 SetConsoleCtrlHandler
 0xa41080 ResumeThread
 0xa41088 PostQueuedCompletionStatus
 0xa41090 LoadLibraryA
 0xa41098 LoadLibraryW
 0xa410a0 SetThreadContext
 0xa410a8 GetThreadContext
 0xa410b0 GetSystemInfo
 0xa410b8 GetSystemDirectoryA
 0xa410c0 GetStdHandle
 0xa410c8 GetQueuedCompletionStatusEx
 0xa410d0 GetProcessAffinityMask
 0xa410d8 GetProcAddress
 0xa410e0 GetEnvironmentStringsW
 0xa410e8 GetConsoleMode
 0xa410f0 FreeEnvironmentStringsW
 0xa410f8 ExitProcess
 0xa41100 DuplicateHandle
 0xa41108 CreateWaitableTimerExW
 0xa41110 CreateThread
 0xa41118 CreateIoCompletionPort
 0xa41120 CreateEventA
 0xa41128 CloseHandle
 0xa41130 AddVectoredExceptionHandler
kernel32.dll
 0xa41140 LocalAlloc
 0xa41148 LocalFree
 0xa41150 GetModuleFileNameW
 0xa41158 GetProcessAffinityMask
 0xa41160 SetProcessAffinityMask
 0xa41168 SetThreadAffinityMask
 0xa41170 Sleep
 0xa41178 ExitProcess
 0xa41180 FreeLibrary
 0xa41188 LoadLibraryA
 0xa41190 GetModuleHandleA
 0xa41198 GetProcAddress
USER32.dll
 0xa411a8 GetProcessWindowStation
 0xa411b0 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure