Report - bd.exe

AntiDebug AntiVM PE File PE32 DLL
ScreenShot
Created 2021.08.28 17:46 Machine s1_win7_x6401
Filename bd.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
1
Behavior Score
11.4
ZERO API file : malware
VT API (file) 39 detected (malicious, high confidence, GenericKD, Unsafe, confidence, Kryptik, Eldorado, Attribute, HighConfidence, HMFJ, score, MalwareX, Artemis, ai score=81, ASMalwS, kcloud, Woreflint, BScope, Convagent, WECl2SFp+p4, Krypt, GenKryptik, FJJT, ZexaF, jy2@ayQzsSci, GdSda)
md5 e4c49f9d53f701a8e2edecc9dd8a5057
sha256 90b9d553b4883ed20e3273a86351f103d10b012dab0c82179bb6b5bfcc188b88
ssdeep 3072:NgS1Vn/bFL4NM9fmbv1e2s05UOsDs5rdt0EVZXtK9LYHxdj/sJEFOTlZ:pN8M9fmxHsYjtFVvK1Kdj/WE4TlZ
imphash 340cbb019799ff7ed95694815ec3e316
impfuzzy 48:l8Lfp55iLSe6NZ4Wvwt8tGAtjZzuLoECACAQvkt7ZWXbi8RMEr6Fp6tKEIyDvrQ7:l8LfpHi4tSnt/ax79FSHsIxn9Ke7
  Network IP location

Signature (26cnts)

Level Description
danger File has been identified by 39 AntiVirus engines on VirusTotal as malicious
watch Attempts to access Bitcoin/ALTCoin wallets
watch Checks the CPU name from registry
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Deletes executed files from disk
watch Harvests credentials from local email clients
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An executable file was downloaded by the process bd.exe
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info Queries for the computername
info Tries to locate where the browsers are installed

Rules (14cnts)

Level Name Description Collection
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://91.243.44.250/public/sqlite3.dll RU Petersburg Internet Network ltd. 91.243.44.250 clean
http://91.243.44.250/kVpR1jIWa.php RU Petersburg Internet Network ltd. 91.243.44.250 clean
91.243.44.250 RU Petersburg Internet Network ltd. 91.243.44.250 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40813c DeleteAtom
 0x408140 GetModuleHandleA
 0x408144 CreateTimerQueue
 0x408148 GetVersion
 0x40814c GetSystemInfo
 0x408150 GetCurrentThreadId
 0x408154 GetCurrentProcessId
 0x408158 GetCurrentProcess
 0x40815c WaitForMultipleObjects
 0x408160 CreateEventW
 0x408164 CreateMutexW
 0x408168 LeaveCriticalSection
 0x40816c EnterCriticalSection
 0x408170 AddAtomW
 0x408174 GetProcessHeap
 0x408178 HeapCreate
 0x40817c QueryPerformanceFrequency
 0x408180 UnlockFileEx
 0x408184 SetFilePointerEx
 0x408188 GetCommandLineW
 0x40818c SetFilePointer
 0x408190 LockFileEx
 0x408194 GetLogicalDrives
 0x408198 GetFileSizeEx
 0x40819c GetFileSize
 0x4081a0 GetFileInformationByHandle
 0x4081a4 CreateFileW
 0x4081a8 InitializeCriticalSection
USER32.dll
 0x4081b0 LoadIconA
 0x4081b4 DestroyIcon
 0x4081b8 IsDialogMessageA
 0x4081bc DestroyCursor
 0x4081c0 LoadCursorA
 0x4081c4 CheckMenuRadioItem
 0x4081c8 FindWindowA
 0x4081cc SetWindowLongA
 0x4081d0 GetWindowLongA
 0x4081d4 GetSysColorBrush
 0x4081d8 GetSysColor
 0x4081dc ChildWindowFromPoint
 0x4081e0 ClientToScreen
 0x4081e4 SetCursor
 0x4081e8 MessageBoxA
 0x4081ec GetWindowRect
 0x4081f0 GetClientRect
 0x4081f4 GetWindowTextA
 0x4081f8 SetWindowTextA
 0x4081fc RedrawWindow
 0x408200 InvalidateRect
 0x408204 SetActiveWindow
 0x408208 SetMenuItemInfoA
 0x40820c InsertMenuItemA
 0x408210 TrackPopupMenu
 0x408214 RemoveMenu
 0x408218 AppendMenuA
 0x40821c GetSubMenu
 0x408220 EnableMenuItem
 0x408224 CheckMenuItem
 0x408228 DestroyMenu
 0x40822c CreatePopupMenu
 0x408230 GetSystemMenu
 0x408234 GetMenu
 0x408238 GetSystemMetrics
 0x40823c TranslateAcceleratorA
 0x408240 DestroyAcceleratorTable
 0x408244 LoadAcceleratorsA
 0x408248 EnableWindow
 0x40824c KillTimer
 0x408250 SetTimer
 0x408254 GetActiveWindow
 0x408258 SetFocus
 0x40825c CharLowerBuffA
 0x408260 CharUpperA
 0x408264 EmptyClipboard
 0x408268 EnumClipboardFormats
 0x40826c GetClipboardData
 0x408270 SetClipboardData
 0x408274 CloseClipboard
 0x408278 OpenClipboard
 0x40827c DefDlgProcA
 0x408280 SendDlgItemMessageA
 0x408284 IsDlgButtonChecked
 0x408288 CheckRadioButton
 0x40828c CheckDlgButton
 0x408290 GetDlgItemTextA
 0x408294 SetDlgItemTextA
 0x408298 SetDlgItemInt
 0x40829c GetDlgItem
 0x4082a0 EndDialog
 0x4082a4 DialogBoxParamA
 0x4082a8 CreateDialogParamA
 0x4082ac SetWindowPlacement
 0x4082b0 GetWindowPlacement
 0x4082b4 SetWindowPos
 0x4082b8 MoveWindow
 0x4082bc DestroyWindow
 0x4082c0 IsMenu
 0x4082c4 wvsprintfA
 0x4082c8 wsprintfA
 0x4082cc GetMessageA
 0x4082d0 TranslateMessage
 0x4082d4 DispatchMessageA
 0x4082d8 IsWindow
 0x4082dc GetClassInfoA
 0x4082e0 UnregisterClassA
 0x4082e4 RegisterClassA
 0x4082e8 CallWindowProcA
 0x4082ec PostQuitMessage
 0x4082f0 PostMessageA
 0x4082f4 SendMessageA
 0x4082f8 GetCursorPos
GDI32.dll
 0x40803c GetTextCharacterExtra
 0x408040 GetTextExtentPoint32W
 0x408044 GetFontUnicodeRanges
 0x408048 GetCharWidthI
 0x40804c RemoveFontResourceExW
 0x408050 RemoveFontMemResourceEx
 0x408054 GetRandomRgn
 0x408058 PatBlt
 0x40805c RestoreDC
 0x408060 ResetDCW
 0x408064 RemoveFontResourceW
 0x408068 RoundRect
 0x40806c SelectClipRgn
 0x408070 GetObjectType
 0x408074 GetDIBits
 0x408078 GetCurrentObject
 0x40807c GetCharABCWidthsW
 0x408080 GetCharWidthFloatW
 0x408084 GetCharWidth32W
 0x408088 GetROP2
 0x40808c ExtFloodFill
 0x408090 EqualRgn
 0x408094 EnumFontFamiliesW
 0x408098 DeleteObject
 0x40809c GetStockObject
 0x4080a0 CreateFontIndirectA
 0x4080a4 OffsetRgn
 0x4080a8 SelectObject
 0x4080ac GdiSetBatchLimit
 0x4080b0 UnrealizeObject
 0x4080b4 SetViewportOrgEx
 0x4080b8 PolylineTo
 0x4080bc PolyBezierTo
 0x4080c0 LPtoDP
 0x4080c4 GetObjectW
 0x4080c8 GetObjectA
 0x4080cc GetArcDirection
 0x4080d0 StrokePath
 0x4080d4 GetPath
 0x4080d8 FillPath
 0x4080dc AbortPath
 0x4080e0 SetDIBColorTable
 0x4080e4 ModifyWorldTransform
 0x4080e8 SetWinMetaFileBits
 0x4080ec GetEnhMetaFilePaletteEntries
 0x4080f0 GetEnhMetaFileHeader
 0x4080f4 EnumEnhMetaFile
 0x4080f8 GdiTransparentBlt
 0x4080fc GdiAlphaBlend
 0x408100 SetTextJustification
 0x408104 SetTextAlign
 0x408108 SetTextColor
 0x40810c SetSystemPaletteUse
 0x408110 SetRectRgn
 0x408114 StretchBlt
 0x408118 SetLayout
 0x40811c SetGraphicsMode
 0x408120 SetDIBitsToDevice
 0x408124 SetBitmapBits
 0x408128 SetBkMode
 0x40812c SetDCPenColor
 0x408130 SetDCBrushColor
 0x408134 Chord
WINSPOOL.DRV
 0x408300 ScheduleJob
 0x408304 ReadPrinter
 0x408308 FindFirstPrinterChangeNotification
 0x40830c FindClosePrinterChangeNotification
COMDLG32.dll
 0x408030 GetSaveFileNameA
 0x408034 GetOpenFileNameA
ADVAPI32.dll
 0x408000 GetUserNameA
 0x408004 RegQueryValueExA
 0x408008 OpenProcessToken
 0x40800c AdjustTokenPrivileges
 0x408010 DecryptFileW
 0x408014 LookupPrivilegeValueA
 0x408018 RegSetValueA
 0x40801c RegCloseKey
 0x408020 RegCreateKeyA
 0x408024 RegDeleteKeyA
 0x408028 RegOpenKeyExA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure