Report - vpn_client.exe

Generic Malware UPX Malicious Packer Malicious Library PE File OS Processor Check PE32 PNG Format
ScreenShot
Created 2021.08.29 12:43 Machine s1_win7_x6402
Filename vpn_client.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
9.2
ZERO API file : malware
VT API (file) 38 detected (malicious, high confidence, GenericKD, Unsafe, jzbs, XPACK, Attribute, HighConfidence, Pcsh, TrojanVeil, aeuo, ai score=85, kcloud, Wacatac, score, GenericRXAA, Generic@ML, RDMK, bonnXIpeH4ftqcE9yEwxYw, susgen)
md5 b42b568e5b6056dc84df89494d7b68c7
sha256 59d926026fc65ebc3b130a9f65c65676e75eb523482ca81d9a4379eecad68685
ssdeep 49152:wfGHhtTcVMgg7WK8eHUsCOTpHYuxaHD3363spPYgfEXcKiWaUN4tEmoawrh6Gjgk:weXc4Tp4uQDH63spPYgfswrfJAiV
imphash 93a138801d9601e4c36e6274c8b9d111
impfuzzy 24:UbVjhNwO+VuTnvYzoLtXOr6kwmDruMztir6UP:KwO+VIc+XOmG8nP
  Network IP location

Signature (19cnts)

Level Description
danger Executed a process and injected code into it
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
watch Collects information on the system (ipconfig
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
watch Expresses interest in specific running processes
watch Looks for the Windows Idle Time to determine the uptime
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Searches running processes potentially to identify processes for sandbox evasion
notice Sends data using the HTTP POST Method
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PNG_Format_Zero PNG Format binaries (download)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://111.200.45.121:80/upload_info/ CN China Unicom Beijing Province Network 111.200.45.121 clean
111.200.45.121 CN China Unicom Beijing Province Network 111.200.45.121 malware

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x846020 WriteFile
 0x846024 WriteConsoleW
 0x846028 WaitForMultipleObjects
 0x84602c WaitForSingleObject
 0x846030 VirtualQuery
 0x846034 VirtualFree
 0x846038 VirtualAlloc
 0x84603c SwitchToThread
 0x846040 SuspendThread
 0x846044 SetWaitableTimer
 0x846048 SetUnhandledExceptionFilter
 0x84604c SetProcessPriorityBoost
 0x846050 SetEvent
 0x846054 SetErrorMode
 0x846058 SetConsoleCtrlHandler
 0x84605c ResumeThread
 0x846060 QueryFullProcessImageNameA
 0x846064 ProcessIdToSessionId
 0x846068 PostQueuedCompletionStatus
 0x84606c OpenProcess
 0x846070 LoadLibraryA
 0x846074 LoadLibraryW
 0x846078 SetThreadContext
 0x84607c GetThreadContext
 0x846080 GetSystemInfo
 0x846084 GetSystemDirectoryA
 0x846088 GetStdHandle
 0x84608c GetQueuedCompletionStatusEx
 0x846090 GetProcessAffinityMask
 0x846094 GetProcAddress
 0x846098 GetEnvironmentStringsW
 0x84609c GetConsoleMode
 0x8460a0 FreeEnvironmentStringsW
 0x8460a4 ExitProcess
 0x8460a8 DuplicateHandle
 0x8460ac CreateThread
 0x8460b0 CreateIoCompletionPort
 0x8460b4 CreateEventA
 0x8460b8 CloseHandle
 0x8460bc AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure