Report - suntogether.png

UPX Malicious Library PE32 OS Processor Check PE File
ScreenShot
Created 2021.07.23 07:39 Machine s1_win7_x6401
Filename suntogether.png
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
6.0
ZERO API file : clean
VT API (file)
md5 b64287a77fb567247cb8ec3465974eab
sha256 dd577b807a2bfde9981f688db80b4e73cc5b76a3af99361e9e4d27a84350904c
ssdeep 6144:ybRfnjXFr2KPL3bbHHjYXWOZcy8QGd37ci/fW6/gNXtlTF5yVNU5JhJDCyFE:UZr2SHHmjMd1W6/gNXtrkVQhJDrG
imphash 13012c7764c22db0eea00ae6b1458d85
impfuzzy 24:sjEdlqOf18/8w2/MkgH+fcMMdlpOov+ttJ3qDewHRnlyv0T4UjMZmZrhAG:jjqOf1K+fcMMYbtfnUK0c4ZNAG
  Network IP location

Signature (13cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Terminates another process
info One or more processes crashed
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://38.110.103.113/rob110/TEST22-PC_W617601.BB7F651B5033BB235F798BB349FDBB5B/5/file/ CA BELAIR-TECHNOLOGIES 38.110.103.113 clean
38.110.103.113 CA BELAIR-TECHNOLOGIES 38.110.103.113 mailcious
62.99.76.213 ES Euskaltel S.A. 62.99.76.213 clean
74.85.157.139 PR FUSE 74.85.157.139 mailcious
38.110.103.124 CA BELAIR-TECHNOLOGIES 38.110.103.124 mailcious
38.110.103.18 CA BELAIR-TECHNOLOGIES 38.110.103.18 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x414000 SetEvent
 0x414004 WaitForSingleObject
 0x414008 CreateEventA
 0x41400c lstrlenA
 0x414010 CloseHandle
 0x414014 CancelWaitableTimer
 0x414018 SetWaitableTimer
 0x41401c CreateWaitableTimerA
 0x414020 VirtualAlloc
 0x414024 GetLocaleInfoA
 0x414028 DeleteTimerQueueEx
 0x41402c CreateTimerQueueTimer
 0x414030 CreateTimerQueue
 0x414034 SizeofResource
 0x414038 LoadResource
 0x41403c FindResourceA
 0x414040 SetStdHandle
 0x414044 WriteConsoleW
 0x414048 LoadLibraryW
 0x41404c HeapReAlloc
 0x414050 GetStringTypeW
 0x414054 InterlockedIncrement
 0x414058 InterlockedDecrement
 0x41405c EncodePointer
 0x414060 DecodePointer
 0x414064 Sleep
 0x414068 InitializeCriticalSection
 0x41406c DeleteCriticalSection
 0x414070 EnterCriticalSection
 0x414074 LeaveCriticalSection
 0x414078 RtlUnwind
 0x41407c RaiseException
 0x414080 GetLastError
 0x414084 HeapFree
 0x414088 GetCommandLineA
 0x41408c HeapSetInformation
 0x414090 GetStartupInfoW
 0x414094 HeapAlloc
 0x414098 WideCharToMultiByte
 0x41409c LCMapStringW
 0x4140a0 MultiByteToWideChar
 0x4140a4 GetCPInfo
 0x4140a8 TerminateProcess
 0x4140ac GetCurrentProcess
 0x4140b0 UnhandledExceptionFilter
 0x4140b4 SetUnhandledExceptionFilter
 0x4140b8 IsDebuggerPresent
 0x4140bc TlsAlloc
 0x4140c0 TlsGetValue
 0x4140c4 TlsSetValue
 0x4140c8 TlsFree
 0x4140cc GetModuleHandleW
 0x4140d0 SetLastError
 0x4140d4 GetCurrentThreadId
 0x4140d8 GetProcAddress
 0x4140dc IsProcessorFeaturePresent
 0x4140e0 HeapCreate
 0x4140e4 ExitProcess
 0x4140e8 WriteFile
 0x4140ec GetStdHandle
 0x4140f0 GetModuleFileNameW
 0x4140f4 GetModuleFileNameA
 0x4140f8 FreeEnvironmentStringsW
 0x4140fc GetEnvironmentStringsW
 0x414100 SetHandleCount
 0x414104 InitializeCriticalSectionAndSpinCount
 0x414108 GetFileType
 0x41410c QueryPerformanceCounter
 0x414110 GetTickCount
 0x414114 GetCurrentProcessId
 0x414118 GetSystemTimeAsFileTime
 0x41411c GetConsoleCP
 0x414120 GetConsoleMode
 0x414124 FlushFileBuffers
 0x414128 ReadFile
 0x41412c SetFilePointer
 0x414130 HeapSize
 0x414134 GetLocaleInfoW
 0x414138 GetACP
 0x41413c GetOEMCP
 0x414140 IsValidCodePage
 0x414144 GetUserDefaultLCID
 0x414148 EnumSystemLocalesA
 0x41414c IsValidLocale
 0x414150 CreateFileW
USER32.dll
 0x414158 GetDC

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure