Report - wango666.exe

Gen2 Gen1 RAT Generic Malware UPX Malicious Library Malicious Packer Anti_VM ScreenShot Downloader DNS Socket PDF AntiDebug AntiVM PE File OS Processor Check PE32 .NET DLL DLL PNG Format PE64 JPEG Format
ScreenShot
Created 2021.08.18 11:37 Machine s1_win7_x6401
Filename wango666.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
8.0
ZERO API file : malware
VT API (file) 37 detected (GenericKD, HgIASaMA, Deyma, Kryptik, Eldorado, Attribute, HighConfidence, ACYJ, Malicious, Ursu, Malware@#3ko08bgbszs5o, DownLoader41, AveMaria, R002C0WHG21, TrojDownloader, kcloud, Artemis, ai score=81, TrojanPSW, Convagent, confidence, 100%)
md5 a9d35b3546a908c804d177020daefcb0
sha256 45193fa14de60908b958e3f268ef46457acbbe4d7b63784a8dc177a510528827
ssdeep 196608:XPGZKb8EmARpfMWw93Axfy46VqPFUXd8hSXJTkWOg0rmt+kK1:+o7pa9wVaqcd8hSZkWOgOmHq
imphash d619eda1a774da262071361b928bb2e4
impfuzzy 48:hylnpVOIDk/6AecfYtTE0c1GT+KQ4zuFbv:hylpVNDk/FecfYtT9c4gv
  Network IP location

Signature (17cnts)

Level Description
danger File has been identified by 37 AntiVirus engines on VirusTotal as malicious
watch Attempts to identify installed AV products by installation directory
watch Communicates with host for which no DNS query was performed
watch Deletes executed files from disk
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Sends data using the HTTP POST Method
notice Yara rule detected in process memory
info Checks amount of memory in system

Rules (35cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Network_Downloader File Downloader memory
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
notice Network_DNS Communications use DNS memory
notice Network_TCP_Socket Communications over RAW Socket memory
notice PDF_Format_Z PDF Format binaries (download)
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Is_DotNET_DLL (no description) binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info JPEG_Format_Zero JPEG Format binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info PNG_Format_Zero PNG Format binaries (download)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)
info Win_Backdoor_AsyncRAT_Zero Win Backdoor AsyncRAT binaries (download)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.215.113.20/gb9fskvS/index.php Unknown 185.215.113.20 clean
http://185.215.113.20/gb9fskvS/index.php?scr=1 Unknown 185.215.113.20 clean
185.215.113.20 Unknown 185.215.113.20 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40700c LoadLibraryA
 0x407010 lstrcpyA
 0x407014 lstrcatA
 0x407018 lstrlenA
 0x40701c GetSystemDirectoryA
 0x407020 GetProcAddress
 0x407024 GetModuleHandleA
 0x407028 _lclose
 0x40702c GetModuleFileNameA
 0x407030 _lread
 0x407034 _llseek
 0x407038 _lopen
 0x40703c _lwrite
 0x407040 _lcreat
 0x407044 CreateDirectoryA
 0x407048 SetCurrentDirectoryA
 0x40704c GetDiskFreeSpaceA
 0x407050 GetFileAttributesA
 0x407054 CompareStringA
 0x407058 DeleteFileA
 0x40705c GetTempPathA
 0x407060 GetCurrentDirectoryA
 0x407064 CloseHandle
 0x407068 GetExitCodeProcess
 0x40706c GetLastError
 0x407070 LocalFree
 0x407074 GetCurrentProcess
 0x407078 MoveFileExA
 0x40707c GetStringTypeW
 0x407080 MultiByteToWideChar
 0x407084 LCMapStringW
 0x407088 HeapReAlloc
 0x40708c RtlUnwind
 0x407090 HeapSize
 0x407094 Sleep
 0x407098 RemoveDirectoryA
 0x40709c FreeLibrary
 0x4070a0 IsValidCodePage
 0x4070a4 GetOEMCP
 0x4070a8 GetModuleHandleW
 0x4070ac ExitProcess
 0x4070b0 DecodePointer
 0x4070b4 HeapFree
 0x4070b8 HeapAlloc
 0x4070bc GetCommandLineA
 0x4070c0 HeapSetInformation
 0x4070c4 GetStartupInfoW
 0x4070c8 InitializeCriticalSectionAndSpinCount
 0x4070cc DeleteCriticalSection
 0x4070d0 LeaveCriticalSection
 0x4070d4 EnterCriticalSection
 0x4070d8 EncodePointer
 0x4070dc LoadLibraryW
 0x4070e0 UnhandledExceptionFilter
 0x4070e4 SetUnhandledExceptionFilter
 0x4070e8 IsDebuggerPresent
 0x4070ec TerminateProcess
 0x4070f0 TlsAlloc
 0x4070f4 TlsGetValue
 0x4070f8 TlsSetValue
 0x4070fc TlsFree
 0x407100 InterlockedIncrement
 0x407104 SetLastError
 0x407108 GetCurrentThreadId
 0x40710c InterlockedDecrement
 0x407110 WriteFile
 0x407114 GetStdHandle
 0x407118 GetModuleFileNameW
 0x40711c IsProcessorFeaturePresent
 0x407120 HeapCreate
 0x407124 FreeEnvironmentStringsW
 0x407128 WideCharToMultiByte
 0x40712c GetEnvironmentStringsW
 0x407130 SetHandleCount
 0x407134 GetFileType
 0x407138 QueryPerformanceCounter
 0x40713c GetTickCount
 0x407140 GetCurrentProcessId
 0x407144 GetSystemTimeAsFileTime
 0x407148 GetCPInfo
 0x40714c GetACP
USER32.dll
 0x40715c TranslateMessage
 0x407160 DispatchMessageA
 0x407164 PeekMessageA
 0x407168 wsprintfA
 0x40716c LoadCursorA
 0x407170 SetCursor
 0x407174 MessageBoxA
 0x407178 MsgWaitForMultipleObjects
ADVAPI32.dll
 0x407000 GetTokenInformation
 0x407004 OpenProcessToken
SHELL32.dll
 0x407154 ShellExecuteExA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure