Report - 456.exe

Worm Phorpiex Malicious Packer UPX Malicious Library PE File PE32
ScreenShot
Created 2021.08.15 13:11 Machine s1_win7_x6401
Filename 456.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
6.6
ZERO API file : clean
VT API (file) 34 detected (Malicious, high confidence, MulDrop18, GenericKD, Artemis, Save, Starter, ali2000005, ZexaE, ruW@aGlBEvmi, Attribute, HighConfidence, Sysn, ai score=99, KVMH017, kcloud, Phonzy, score, ClipBanker, CLASSIC, Static AI, Malicious PE, Behavior, susgen, GdSda, confidence, HgIASaUA)
md5 39d6ec1892af37c0fd5c5c2ea89ea782
sha256 439386a1dfa86c57251f8ee7eeafe15170f6999a97dfeb257ea139829af601c7
ssdeep 1536:Pi/RkUpybMbsLs6Hfo0uC3ItNmWPsh4U16wnrg/xSMxWRL7C9ki2FZ9DPnak9P8N:ewznY8ItNHGNr2vW79XIa+5k4
imphash e28242db9ee32a240d22ee7a94384b35
impfuzzy 96:Olfp+EA41zaNGb+Izx3tjxB6jf0aYifuux7krk+ao492G:zxGbn6jf0TiftxFcG
  Network IP location

Signature (15cnts)

Level Description
danger File has been identified by 34 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch Operates on local firewall's policies and settings
notice A process created a hidden window
notice Communication to multiple IPs on high port numbers possibly indicative of a peer-to-peer (P2P) or non-standard command and control protocol
notice Connects to SIP Stun Server
notice Creates a suspicious process
notice Creates hidden or system file
notice One or more potentially interesting buffers were extracted
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Command line console output was observed
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
danger Win_Worm_Phorpiex a worm which spreads via removable drives and network drives. binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
stun.sipgate.net DE [netzquadrat] GmbH 217.10.68.152 clean
217.10.68.145 DE [netzquadrat] GmbH 217.10.68.145 clean
217.116.122.143 DE [netzquadrat] GmbH 217.116.122.143 clean
79.141.72.138 RU OOO Network of data-centers Selectel 79.141.72.138 clean
79.141.72.52 RU OOO Network of data-centers Selectel 79.141.72.52 clean
79.141.72.156 RU OOO Network of data-centers Selectel 79.141.72.156 clean

Suricata ids

PE API

IAT(Import Address Table) Library

urlmon.dll
 0x4203a4 URLDownloadToFileW
KERNEL32.dll
 0x420048 GetTickCount
 0x42004c DeleteTimerQueueTimer
 0x420050 LeaveCriticalSection
 0x420054 EnterCriticalSection
 0x420058 InitializeCriticalSection
 0x42005c DeleteCriticalSection
 0x420060 SwitchToThread
 0x420064 CreateIoCompletionPort
 0x420068 GetModuleFileNameW
 0x42006c TerminateThread
 0x420070 PostQueuedCompletionStatus
 0x420074 DeleteFileW
 0x420078 FlushViewOfFile
 0x42007c GetCurrentProcessId
 0x420080 GetCurrentThreadId
 0x420084 GetQueuedCompletionStatus
 0x420088 WaitForMultipleObjects
 0x42008c Sleep
 0x420090 HeapAlloc
 0x420094 HeapReAlloc
 0x420098 GetProcessHeap
 0x42009c HeapFree
 0x4200a0 OpenProcess
 0x4200a4 FindClose
 0x4200a8 FindNextFileW
 0x4200ac FindFirstFileW
 0x4200b0 LocalFree
 0x4200b4 CreateProcessW
 0x4200b8 lstrcmpiW
 0x4200bc FlushFileBuffers
 0x4200c0 WriteFile
 0x4200c4 GetLastError
 0x4200c8 SetFilePointer
 0x4200cc GetFileSizeEx
 0x4200d0 ReleaseMutex
 0x4200d4 CreateMutexW
 0x4200d8 GetNativeSystemInfo
 0x4200dc MultiByteToWideChar
 0x4200e0 WideCharToMultiByte
 0x4200e4 GetModuleHandleW
 0x4200e8 ExpandEnvironmentStringsW
 0x4200ec CreateTimerQueueTimer
 0x4200f0 ExitProcess
 0x4200f4 CopyFileW
 0x4200f8 SetFileAttributesW
 0x4200fc CreateDirectoryW
 0x420100 lstrcmpW
 0x420104 GlobalFree
 0x420108 GlobalUnlock
 0x42010c GlobalLock
 0x420110 GlobalAlloc
 0x420114 MoveFileExW
 0x420118 GetDriveTypeW
 0x42011c DeviceIoControl
 0x420120 GetVolumeNameForVolumeMountPointW
 0x420124 GetSystemDirectoryW
 0x420128 GetVolumeInformationW
 0x42012c FindVolumeClose
 0x420130 FindNextVolumeW
 0x420134 FindFirstVolumeW
 0x420138 CreateFileA
 0x42013c GetLocaleInfoA
 0x420140 GetStringTypeW
 0x420144 GetStringTypeA
 0x420148 LCMapStringW
 0x42014c LCMapStringA
 0x420150 WriteConsoleW
 0x420154 GetConsoleOutputCP
 0x420158 WriteConsoleA
 0x42015c SetStdHandle
 0x420160 HeapSize
 0x420164 InitializeCriticalSectionAndSpinCount
 0x420168 lstrcatW
 0x42016c GetExitCodeThread
 0x420170 lstrlenW
 0x420174 UnmapViewOfFile
 0x420178 CreateFileW
 0x42017c GetFileSize
 0x420180 CreateFileMappingW
 0x420184 MapViewOfFile
 0x420188 LoadLibraryA
 0x42018c GetProcAddress
 0x420190 FileTimeToSystemTime
 0x420194 lstrcpynW
 0x420198 WaitForSingleObject
 0x42019c TerminateProcess
 0x4201a0 CloseHandle
 0x4201a4 lstrlenA
 0x4201a8 GetThreadId
 0x4201ac ExitThread
 0x4201b0 CreateThread
 0x4201b4 GetSystemTimeAsFileTime
 0x4201b8 RtlUnwind
 0x4201bc GetCurrentProcess
 0x4201c0 UnhandledExceptionFilter
 0x4201c4 SetUnhandledExceptionFilter
 0x4201c8 IsDebuggerPresent
 0x4201cc IsValidCodePage
 0x4201d0 GetOEMCP
 0x4201d4 GetACP
 0x4201d8 GetCPInfo
 0x4201dc RaiseException
 0x4201e0 GetCommandLineA
 0x4201e4 GetStartupInfoA
 0x4201e8 GetConsoleMode
 0x4201ec GetConsoleCP
 0x4201f0 QueryPerformanceCounter
 0x4201f4 GetFileType
 0x4201f8 SetHandleCount
 0x4201fc GetEnvironmentStringsW
 0x420200 FreeEnvironmentStringsW
 0x420204 GetEnvironmentStrings
 0x420208 FreeEnvironmentStringsA
 0x42020c GetModuleFileNameA
 0x420210 GetStdHandle
 0x420214 InterlockedDecrement
 0x420218 SetLastError
 0x42021c InterlockedIncrement
 0x420220 TlsFree
 0x420224 TlsSetValue
 0x420228 TlsAlloc
 0x42022c TlsGetValue
 0x420230 VirtualAlloc
 0x420234 VirtualFree
 0x420238 HeapCreate
USER32.dll
 0x4202b0 EmptyClipboard
 0x4202b4 DefWindowProcW
 0x4202b8 GetClipboardData
 0x4202bc GetPriorityClipboardFormat
 0x4202c0 DefWindowProcA
 0x4202c4 DispatchMessageW
 0x4202c8 GetShellWindow
 0x4202cc GetWindowThreadProcessId
 0x4202d0 SetClipboardData
 0x4202d4 TranslateMessage
 0x4202d8 GetMessageW
 0x4202dc RegisterClassExW
 0x4202e0 wsprintfW
 0x4202e4 UnregisterClassW
 0x4202e8 DestroyWindow
 0x4202ec RemoveClipboardFormatListener
 0x4202f0 AddClipboardFormatListener
 0x4202f4 CreateWindowExW
 0x4202f8 PostThreadMessageW
 0x4202fc OpenClipboard
 0x420300 CloseClipboard
 0x420304 CharLowerW
ADVAPI32.dll
 0x420000 RegCloseKey
 0x420004 RegOpenKeyExW
 0x420008 RegCreateKeyExW
 0x42000c RevertToSelf
 0x420010 ImpersonateLoggedOnUser
 0x420014 ConvertStringSecurityDescriptorToSecurityDescriptorW
 0x420018 CryptAcquireContextA
 0x42001c CryptReleaseContext
 0x420020 CryptCreateHash
 0x420024 CryptHashData
 0x420028 CryptVerifySignatureA
 0x42002c CryptDestroyHash
 0x420030 CryptImportKey
 0x420034 CryptGetKeyParam
 0x420038 CryptDestroyKey
 0x42003c OpenProcessToken
 0x420040 RegSetValueExW
SHELL32.dll
 0x420264 ShellExecuteExW
 0x420268 None
 0x42026c SHChangeNotify
 0x420270 SHGetFolderPathW
 0x420274 ShellExecuteW
ole32.dll
 0x420394 CoCreateInstance
 0x420398 CoInitializeEx
 0x42039c CoUninitialize
OLEAUT32.dll
 0x420250 SysFreeString
 0x420254 SysAllocString
WS2_32.dll
 0x420338 htonl
 0x42033c ntohl
 0x420340 ntohs
 0x420344 htons
 0x420348 recvfrom
 0x42034c setsockopt
 0x420350 sendto
 0x420354 inet_ntoa
 0x420358 freeaddrinfo
 0x42035c closesocket
 0x420360 getsockname
 0x420364 connect
 0x420368 socket
 0x42036c WSAGetLastError
 0x420370 WSARecvFrom
 0x420374 WSASendTo
 0x420378 ind
 0x42037c WSAStartup
 0x420380 WSACleanup
 0x420384 inet_addr
 0x420388 WSASocketW
 0x42038c getaddrinfo
SHLWAPI.dll
 0x42027c PathCombineW
 0x420280 StrToIntA
 0x420284 StrDupW
 0x420288 PathFindExtensionW
 0x42028c PathFileExistsW
 0x420290 StrStrNIW
 0x420294 StrCmpNIW
 0x420298 StrStrIW
 0x42029c PathAddExtensionW
 0x4202a0 PathStripToRootW
 0x4202a4 PathAppendW
 0x4202a8 PathRemoveFileSpecW
MPR.dll
 0x420240 WNetCloseEnum
 0x420244 WNetEnumResourceW
 0x420248 WNetOpenEnumW
WININET.dll
 0x42030c InternetOpenUrlW
 0x420310 InternetCrackUrlW
 0x420314 InternetOpenW
 0x420318 InternetConnectW
 0x42031c HttpOpenRequestW
 0x420320 HttpAddRequestHeadersW
 0x420324 HttpSendRequestW
 0x420328 HttpQueryInfoW
 0x42032c InternetReadFile
 0x420330 InternetCloseHandle
RPCRT4.dll
 0x42025c UuidCreate

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure