Report - gut.exe

UPX DGA DNS Socket Create Service Sniff Audio Escalate priviledges KeyLogger Code injection HTTP Internet API FTP ScreenShot Http API Steal credential Downloader P2P AntiDebug AntiVM PE32 PE File
ScreenShot
Created 2021.07.21 08:39 Machine s1_win7_x6401
Filename gut.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
10.2
ZERO API file : clean
VT API (file) 15 detected (AIDetect, malware2, malicious, high confidence, QVM05, Unsafe, Attribute, HighConfidence, FileRepMalware, Generic ML PUA, score, Artemis, GenKryptik, DPIE, susgen)
md5 af64a7df92d3f72407194dd17b013c86
sha256 33b1629dc01123f78d568c7638f33ca6619834daad9866f666c00062920b13da
ssdeep 12288:4szqT1gEnXaAbWRBOQW/xgYwRTtIvsECmW6l4l1G2YaNlRSsM7/Ssdpk6dz:4sOOSaAbWPOQWZ6ltIvy2AfSF764z
imphash 25123f7d748b46edefb4a7db9e8db89d
impfuzzy 192:oN3syeuuasSUvK9cpoHX8jBf7XcHGKsM1Q+POQHE:O38a599Ohw1vPOQk
  Network IP location

Signature (22cnts)

Level Description
watch Allocates execute permission to another process indicative of possible code injection
watch Creates a thread using CreateRemoteThread in a non-child process indicative of process injection
watch Deletes executed files from disk
watch File has been identified by 15 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
watch Manipulates memory of a non-child process indicative of process injection
watch Network activity contains more than one unique useragent
watch One or more of the buffers contains an embedded PE file
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Command line console output was observed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (36cnts)

Level Name Description Collection
watch Network_Downloader File Downloader memory
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice Code_injection Code injection with CreateRemoteThread in a remote process memory
notice Create_Service Create a windows service memory
notice Escalate_priviledges Escalate priviledges memory
notice KeyLogger Run a KeyLogger memory
notice local_credential_Steal Steal credential memory
notice Network_DGA Communication using DGA memory
notice Network_DNS Communications use DNS memory
notice Network_FTP Communications over FTP memory
notice Network_HTTP Communications over HTTP memory
notice Network_P2P_Win Communications over P2P network memory
notice Network_TCP_Socket Communications over RAW Socket memory
notice ScreenShot Take ScreenShot memory
notice Sniff_Audio Record Audio memory
notice Str_Win32_Http_API Match Windows Http API call memory
notice Str_Win32_Internet_API Match Windows Inet API call memory
info anti_dbg Checks if being debugged memory
info antisb_threatExpert Anti-Sandbox checks for ThreatExpert memory
info Check_Dlls (no description) memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerCheck__RemoteAPI (no description) memory
info DebuggerException__ConsoleCtrl (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info win_hook Affect hook table memory

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://cdn.discordapp.com/attachments/857209250014167043/867060366416936981/Kxojjlwczyhqbgtipcqvfxyhsdorxpz Unknown 162.159.135.233 clean
cdn.discordapp.com Unknown 162.159.129.233 malware
162.159.135.233 Unknown 162.159.135.233 malware

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x491828 SysFreeString
 0x49182c SysReAllocStringLen
 0x491830 SysAllocStringLen
advapi32.dll
 0x491838 RegQueryValueExA
 0x49183c RegOpenKeyExA
 0x491840 RegCloseKey
user32.dll
 0x491848 GetKeyboardType
 0x49184c DestroyWindow
 0x491850 LoadStringA
 0x491854 MessageBoxA
 0x491858 CharNextA
kernel32.dll
 0x491860 GetACP
 0x491864 Sleep
 0x491868 VirtualFree
 0x49186c VirtualAlloc
 0x491870 GetCurrentThreadId
 0x491874 InterlockedDecrement
 0x491878 InterlockedIncrement
 0x49187c VirtualQuery
 0x491880 WideCharToMultiByte
 0x491884 MultiByteToWideChar
 0x491888 lstrlenA
 0x49188c lstrcpynA
 0x491890 LoadLibraryExA
 0x491894 GetThreadLocale
 0x491898 GetStartupInfoA
 0x49189c GetProcAddress
 0x4918a0 GetModuleHandleA
 0x4918a4 GetModuleFileNameA
 0x4918a8 GetLocaleInfoA
 0x4918ac GetLastError
 0x4918b0 GetCommandLineA
 0x4918b4 FreeLibrary
 0x4918b8 FindFirstFileA
 0x4918bc FindClose
 0x4918c0 ExitProcess
 0x4918c4 ExitThread
 0x4918c8 CreateThread
 0x4918cc CompareStringA
 0x4918d0 WriteFile
 0x4918d4 UnhandledExceptionFilter
 0x4918d8 SetFilePointer
 0x4918dc SetEndOfFile
 0x4918e0 RtlUnwind
 0x4918e4 ReadFile
 0x4918e8 RaiseException
 0x4918ec GetStdHandle
 0x4918f0 GetFileSize
 0x4918f4 GetFileType
 0x4918f8 CreateFileA
 0x4918fc CloseHandle
kernel32.dll
 0x491904 TlsSetValue
 0x491908 TlsGetValue
 0x49190c LocalAlloc
 0x491910 GetModuleHandleA
user32.dll
 0x491918 CreateWindowExA
 0x49191c WindowFromPoint
 0x491920 WaitMessage
 0x491924 ValidateRect
 0x491928 UpdateWindow
 0x49192c UnregisterClassA
 0x491930 UnionRect
 0x491934 UnhookWindowsHookEx
 0x491938 TranslateMessage
 0x49193c TranslateMDISysAccel
 0x491940 TrackPopupMenu
 0x491944 SystemParametersInfoA
 0x491948 ShowWindow
 0x49194c ShowScrollBar
 0x491950 ShowOwnedPopups
 0x491954 SetWindowsHookExA
 0x491958 SetWindowTextA
 0x49195c SetWindowPos
 0x491960 SetWindowPlacement
 0x491964 SetWindowLongW
 0x491968 SetWindowLongA
 0x49196c SetTimer
 0x491970 SetScrollRange
 0x491974 SetScrollPos
 0x491978 SetScrollInfo
 0x49197c SetRect
 0x491980 SetPropA
 0x491984 SetParent
 0x491988 SetMenuItemInfoA
 0x49198c SetMenu
 0x491990 SetKeyboardState
 0x491994 SetForegroundWindow
 0x491998 SetFocus
 0x49199c SetCursor
 0x4919a0 SetClipboardData
 0x4919a4 SetClassLongA
 0x4919a8 SetCaretPos
 0x4919ac SetCapture
 0x4919b0 SetActiveWindow
 0x4919b4 SendMessageW
 0x4919b8 SendMessageA
 0x4919bc ScrollWindowEx
 0x4919c0 ScrollWindow
 0x4919c4 ScreenToClient
 0x4919c8 RemovePropA
 0x4919cc RemoveMenu
 0x4919d0 ReleaseDC
 0x4919d4 ReleaseCapture
 0x4919d8 RegisterWindowMessageA
 0x4919dc RegisterClipboardFormatA
 0x4919e0 RegisterClassA
 0x4919e4 RedrawWindow
 0x4919e8 PtInRect
 0x4919ec PostQuitMessage
 0x4919f0 PostMessageA
 0x4919f4 PeekMessageW
 0x4919f8 PeekMessageA
 0x4919fc OpenClipboard
 0x491a00 OffsetRect
 0x491a04 OemToCharA
 0x491a08 MsgWaitForMultipleObjects
 0x491a0c MessageBoxA
 0x491a10 MessageBeep
 0x491a14 MapWindowPoints
 0x491a18 MapVirtualKeyA
 0x491a1c LoadStringA
 0x491a20 LoadKeyboardLayoutA
 0x491a24 LoadIconA
 0x491a28 LoadCursorA
 0x491a2c LoadBitmapA
 0x491a30 KillTimer
 0x491a34 IsZoomed
 0x491a38 IsWindowVisible
 0x491a3c IsWindowUnicode
 0x491a40 IsWindowEnabled
 0x491a44 IsWindow
 0x491a48 IsRectEmpty
 0x491a4c IsIconic
 0x491a50 IsDialogMessageW
 0x491a54 IsDialogMessageA
 0x491a58 IsChild
 0x491a5c IsCharAlphaNumericA
 0x491a60 IsCharAlphaA
 0x491a64 InvalidateRect
 0x491a68 IntersectRect
 0x491a6c InsertMenuItemA
 0x491a70 InsertMenuA
 0x491a74 InflateRect
 0x491a78 GetWindowThreadProcessId
 0x491a7c GetWindowTextA
 0x491a80 GetWindowRect
 0x491a84 GetWindowPlacement
 0x491a88 GetWindowLongW
 0x491a8c GetWindowLongA
 0x491a90 GetWindowDC
 0x491a94 GetTopWindow
 0x491a98 GetSystemMetrics
 0x491a9c GetSystemMenu
 0x491aa0 GetSysColorBrush
 0x491aa4 GetSysColor
 0x491aa8 GetSubMenu
 0x491aac GetScrollRange
 0x491ab0 GetScrollPos
 0x491ab4 GetScrollInfo
 0x491ab8 GetPropA
 0x491abc GetParent
 0x491ac0 GetWindow
 0x491ac4 GetMessageTime
 0x491ac8 GetMessagePos
 0x491acc GetMenuStringA
 0x491ad0 GetMenuState
 0x491ad4 GetMenuItemInfoA
 0x491ad8 GetMenuItemID
 0x491adc GetMenuItemCount
 0x491ae0 GetMenu
 0x491ae4 GetLastActivePopup
 0x491ae8 GetKeyboardState
 0x491aec GetKeyboardLayoutNameA
 0x491af0 GetKeyboardLayoutList
 0x491af4 GetKeyboardLayout
 0x491af8 GetKeyState
 0x491afc GetKeyNameTextA
 0x491b00 GetIconInfo
 0x491b04 GetForegroundWindow
 0x491b08 GetFocus
 0x491b0c GetDoubleClickTime
 0x491b10 GetDlgItem
 0x491b14 GetDesktopWindow
 0x491b18 GetDCEx
 0x491b1c GetDC
 0x491b20 GetCursorPos
 0x491b24 GetCursor
 0x491b28 GetClipboardData
 0x491b2c GetClientRect
 0x491b30 GetClassLongA
 0x491b34 GetClassInfoA
 0x491b38 GetCaretPos
 0x491b3c GetCapture
 0x491b40 GetActiveWindow
 0x491b44 FrameRect
 0x491b48 FindWindowA
 0x491b4c FillRect
 0x491b50 EqualRect
 0x491b54 EnumWindows
 0x491b58 EnumThreadWindows
 0x491b5c EnumClipboardFormats
 0x491b60 EnumChildWindows
 0x491b64 EndPaint
 0x491b68 EnableWindow
 0x491b6c EnableScrollBar
 0x491b70 EnableMenuItem
 0x491b74 EmptyClipboard
 0x491b78 DrawTextA
 0x491b7c DrawMenuBar
 0x491b80 DrawIconEx
 0x491b84 DrawIcon
 0x491b88 DrawFrameControl
 0x491b8c DrawFocusRect
 0x491b90 DrawEdge
 0x491b94 DispatchMessageW
 0x491b98 DispatchMessageA
 0x491b9c DestroyWindow
 0x491ba0 DestroyMenu
 0x491ba4 DestroyIcon
 0x491ba8 DestroyCursor
 0x491bac DestroyCaret
 0x491bb0 DeleteMenu
 0x491bb4 DefWindowProcA
 0x491bb8 DefMDIChildProcA
 0x491bbc DefFrameProcA
 0x491bc0 CreatePopupMenu
 0x491bc4 CreateMenu
 0x491bc8 CreateIcon
 0x491bcc CreateCaret
 0x491bd0 CloseClipboard
 0x491bd4 ClientToScreen
 0x491bd8 CheckMenuItem
 0x491bdc CallWindowProcA
 0x491be0 CallNextHookEx
 0x491be4 BeginPaint
 0x491be8 CharNextA
 0x491bec CharLowerBuffA
 0x491bf0 CharLowerA
 0x491bf4 CharUpperBuffA
 0x491bf8 CharToOemA
 0x491bfc AdjustWindowRectEx
 0x491c00 ActivateKeyboardLayout
gdi32.dll
 0x491c08 UnrealizeObject
 0x491c0c StretchBlt
 0x491c10 SetWindowOrgEx
 0x491c14 SetWindowExtEx
 0x491c18 SetWinMetaFileBits
 0x491c1c SetViewportOrgEx
 0x491c20 SetViewportExtEx
 0x491c24 SetTextColor
 0x491c28 SetStretchBltMode
 0x491c2c SetROP2
 0x491c30 SetPixel
 0x491c34 SetMapMode
 0x491c38 SetEnhMetaFileBits
 0x491c3c SetDIBColorTable
 0x491c40 SetBrushOrgEx
 0x491c44 SetBkMode
 0x491c48 SetBkColor
 0x491c4c SelectPalette
 0x491c50 SelectObject
 0x491c54 SelectClipRgn
 0x491c58 SaveDC
 0x491c5c RestoreDC
 0x491c60 Rectangle
 0x491c64 RectVisible
 0x491c68 RealizePalette
 0x491c6c PolyPolyline
 0x491c70 PlayEnhMetaFile
 0x491c74 PatBlt
 0x491c78 MoveToEx
 0x491c7c MaskBlt
 0x491c80 LineTo
 0x491c84 IntersectClipRect
 0x491c88 GetWindowOrgEx
 0x491c8c GetWinMetaFileBits
 0x491c90 GetTextMetricsA
 0x491c94 GetTextExtentPointA
 0x491c98 GetTextExtentPoint32A
 0x491c9c GetSystemPaletteEntries
 0x491ca0 GetStockObject
 0x491ca4 GetRgnBox
 0x491ca8 GetPixel
 0x491cac GetPaletteEntries
 0x491cb0 GetObjectA
 0x491cb4 GetEnhMetaFilePaletteEntries
 0x491cb8 GetEnhMetaFileHeader
 0x491cbc GetEnhMetaFileBits
 0x491cc0 GetDeviceCaps
 0x491cc4 GetDIBits
 0x491cc8 GetDIBColorTable
 0x491ccc GetDCOrgEx
 0x491cd0 GetCurrentPositionEx
 0x491cd4 GetClipBox
 0x491cd8 GetBrushOrgEx
 0x491cdc GetBitmapBits
 0x491ce0 GdiFlush
 0x491ce4 ExtTextOutA
 0x491ce8 ExtCreatePen
 0x491cec ExcludeClipRect
 0x491cf0 DeleteObject
 0x491cf4 DeleteEnhMetaFile
 0x491cf8 DeleteDC
 0x491cfc CreateSolidBrush
 0x491d00 CreatePenIndirect
 0x491d04 CreatePalette
 0x491d08 CreateHalftonePalette
 0x491d0c CreateFontIndirectA
 0x491d10 CreateDIBitmap
 0x491d14 CreateDIBSection
 0x491d18 CreateCompatibleDC
 0x491d1c CreateCompatibleBitmap
 0x491d20 CreateBrushIndirect
 0x491d24 CreateBitmap
 0x491d28 CopyEnhMetaFileA
 0x491d2c BitBlt
version.dll
 0x491d34 VerQueryValueA
 0x491d38 GetFileVersionInfoSizeA
 0x491d3c GetFileVersionInfoA
kernel32.dll
 0x491d44 lstrcpyA
 0x491d48 WriteFile
 0x491d4c WaitForSingleObject
 0x491d50 VirtualQuery
 0x491d54 VirtualProtect
 0x491d58 VirtualAlloc
 0x491d5c SizeofResource
 0x491d60 SetThreadLocale
 0x491d64 SetFilePointer
 0x491d68 SetEvent
 0x491d6c SetErrorMode
 0x491d70 SetEndOfFile
 0x491d74 ResumeThread
 0x491d78 ResetEvent
 0x491d7c ReadFile
 0x491d80 MulDiv
 0x491d84 LockResource
 0x491d88 LoadResource
 0x491d8c LoadLibraryA
 0x491d90 LeaveCriticalSection
 0x491d94 InitializeCriticalSection
 0x491d98 GlobalUnlock
 0x491d9c GlobalLock
 0x491da0 GlobalFree
 0x491da4 GlobalFindAtomA
 0x491da8 GlobalDeleteAtom
 0x491dac GlobalAlloc
 0x491db0 GlobalAddAtomA
 0x491db4 GetVersionExA
 0x491db8 GetVersion
 0x491dbc GetTickCount
 0x491dc0 GetThreadLocale
 0x491dc4 GetStdHandle
 0x491dc8 GetProcAddress
 0x491dcc GetModuleHandleA
 0x491dd0 GetModuleFileNameA
 0x491dd4 GetLocaleInfoA
 0x491dd8 GetLocalTime
 0x491ddc GetLastError
 0x491de0 GetFullPathNameA
 0x491de4 GetFileAttributesA
 0x491de8 GetExitCodeThread
 0x491dec GetDiskFreeSpaceA
 0x491df0 GetDateFormatA
 0x491df4 GetCurrentThreadId
 0x491df8 GetCurrentProcessId
 0x491dfc GetCPInfo
 0x491e00 FreeResource
 0x491e04 InterlockedIncrement
 0x491e08 InterlockedExchange
 0x491e0c InterlockedDecrement
 0x491e10 FreeLibrary
 0x491e14 FormatMessageA
 0x491e18 FindResourceA
 0x491e1c EnumCalendarInfoA
 0x491e20 EnterCriticalSection
 0x491e24 DeleteCriticalSection
 0x491e28 CreateThread
 0x491e2c CreateFileA
 0x491e30 CreateEventA
 0x491e34 CompareStringA
 0x491e38 CloseHandle
advapi32.dll
 0x491e40 RegQueryValueExA
 0x491e44 RegOpenKeyExA
 0x491e48 RegFlushKey
 0x491e4c RegCloseKey
kernel32.dll
 0x491e54 Sleep
oleaut32.dll
 0x491e5c SafeArrayPtrOfIndex
 0x491e60 SafeArrayGetUBound
 0x491e64 SafeArrayGetLBound
 0x491e68 SafeArrayCreate
 0x491e6c VariantChangeType
 0x491e70 VariantCopy
 0x491e74 VariantClear
 0x491e78 VariantInit
comctl32.dll
 0x491e80 _TrackMouseEvent
 0x491e84 ImageList_SetIconSize
 0x491e88 ImageList_GetIconSize
 0x491e8c ImageList_Write
 0x491e90 ImageList_Read
 0x491e94 ImageList_GetDragImage
 0x491e98 ImageList_DragShowNolock
 0x491e9c ImageList_DragMove
 0x491ea0 ImageList_DragLeave
 0x491ea4 ImageList_DragEnter
 0x491ea8 ImageList_EndDrag
 0x491eac ImageList_BeginDrag
 0x491eb0 ImageList_Remove
 0x491eb4 ImageList_DrawEx
 0x491eb8 ImageList_Replace
 0x491ebc ImageList_Draw
 0x491ec0 ImageList_GetBkColor
 0x491ec4 ImageList_SetBkColor
 0x491ec8 ImageList_Add
 0x491ecc ImageList_GetImageCount
 0x491ed0 ImageList_Destroy
 0x491ed4 ImageList_Create
shell32.dll
 0x491edc ShellExecuteA
 0x491ee0 SHFileOperationA
comdlg32.dll
 0x491ee8 GetSaveFileNameA
 0x491eec GetOpenFileNameA
kernel32.dll
 0x491ef4 MulDiv

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure