Report - httpd.exe

Emotet Gen2 Gen1 Generic Malware Malicious Library UPX Malicious Packer Downloader DNS Socket Create Service BitCoin Escalate priviledges KeyLogger Code injection AntiDebug AntiVM PE File OS Processor Check PE32 PE64 DLL
ScreenShot
Created 2021.09.05 16:47 Machine s1_win7_x6401
Filename httpd.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
10.6
ZERO API file : malware
VT API (file) 33 detected (Mint, Zard, Unsafe, malicious, ZexaF, JuW@aKdFqNci, Static AI, Suspicious PE, gfejo, Tnega, score, BScope, Glupteba, ai score=86, Behavior, susgen)
VT API (url)
md5 0fa802e8a7eafd690f71460f97be0140
sha256 df787884cb15802a125a3aab9b0e15c55952db0b8825814cc8e7ddde24249ad1
ssdeep 12288:wAc9dbM4F1Gtsra204wDOs8t1VMa7V8ceU6/IEzkNwRyZ8FuTyCtN8wtIy:BKdbM4F1GtseJTKGceU6/I/wRj9gL
imphash bafb5d14bcfe53a31e955e0f42b2f373
impfuzzy 24:V0DgNjeOxTT9tMS1O9Gc+XOJBliPyNGzpa9ro0OovbOgOPZMv5jMAnlEZHu9oBDB:SOxNtMS1O9Gc+qtNGzUZ+3TPZG6oE
  Network IP location

Signature (25cnts)

Level Description
danger File has been identified by 33 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Created a service where a service was also not started
watch Detects Virtual Machines through their custom firmware
watch Installs itself for autorun at Windows startup
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An executable file was downloaded by the process httpd.exe
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Potentially malicious URLs were found in the process memory dump
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Resolves a suspicious Top Level Domain (TLD)
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info This executable has a PDB path

Rules (32cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_2_Zero Win32 Trojan Emotet binaries (download)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Network_Downloader File Downloader memory
watch UPX_Zero UPX packed file binaries (download)
notice BitCoin Perform crypto currency mining memory
notice Code_injection Code injection with CreateRemoteThread in a remote process memory
notice Create_Service Create a windows service memory
notice Escalate_priviledges Escalate priviledges memory
notice KeyLogger Run a KeyLogger memory
notice Network_DNS Communications use DNS memory
notice Network_TCP_Socket Communications over RAW Socket memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)

Network (9cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://down.fuck-jp.ru/redis-server.exe US CLOUDFLARENET 172.67.132.245 clean
http://api.fuck-jp.ru/run64.txt US CLOUDFLARENET 104.21.5.45 clean
http://api.fuck-jp.ru/url64.txt US CLOUDFLARENET 104.21.5.45 clean
down.fuck-jp.ru US CLOUDFLARENET 104.21.5.45 malware
pool.fuck-jp.ru RU Chelyabinsk-Signal LLC 185.144.31.44 clean
api.fuck-jp.ru US CLOUDFLARENET 172.67.132.245 clean
172.67.132.245 US CLOUDFLARENET 172.67.132.245 malware
45.147.228.207 DE combahton GmbH 45.147.228.207 clean
185.144.31.44 RU Chelyabinsk-Signal LLC 185.144.31.44 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x47301c LoadLibraryA
 0x473020 GetProcAddress
 0x473024 GetModuleFileNameA
 0x473028 GetWindowsDirectoryA
 0x47302c WaitForSingleObject
 0x473030 WriteConsoleW
 0x473034 CopyFileA
 0x473038 DeleteFileA
 0x47303c CreateFileW
 0x473040 HeapSize
 0x473044 GetTimeZoneInformation
 0x473048 HeapReAlloc
 0x47304c SetConsoleCtrlHandler
 0x473050 UnhandledExceptionFilter
 0x473054 SetUnhandledExceptionFilter
 0x473058 GetCurrentProcess
 0x47305c TerminateProcess
 0x473060 IsProcessorFeaturePresent
 0x473064 QueryPerformanceCounter
 0x473068 GetCurrentProcessId
 0x47306c GetCurrentThreadId
 0x473070 GetSystemTimeAsFileTime
 0x473074 InitializeSListHead
 0x473078 IsDebuggerPresent
 0x47307c GetStartupInfoW
 0x473080 GetModuleHandleW
 0x473084 FormatMessageA
 0x473088 EnterCriticalSection
 0x47308c LeaveCriticalSection
 0x473090 DeleteCriticalSection
 0x473094 LocalFree
 0x473098 EncodePointer
 0x47309c DecodePointer
 0x4730a0 MultiByteToWideChar
 0x4730a4 WideCharToMultiByte
 0x4730a8 SetLastError
 0x4730ac InitializeCriticalSectionAndSpinCount
 0x4730b0 CreateEventW
 0x4730b4 SwitchToThread
 0x4730b8 TlsAlloc
 0x4730bc TlsGetValue
 0x4730c0 TlsSetValue
 0x4730c4 TlsFree
 0x4730c8 GetTickCount
 0x4730cc CompareStringW
 0x4730d0 LCMapStringW
 0x4730d4 GetLocaleInfoW
 0x4730d8 GetStringTypeW
 0x4730dc GetCPInfo
 0x4730e0 RaiseException
 0x4730e4 RtlUnwind
 0x4730e8 InterlockedPushEntrySList
 0x4730ec InterlockedFlushSList
 0x4730f0 GetLastError
 0x4730f4 FreeLibrary
 0x4730f8 LoadLibraryExW
 0x4730fc ExitProcess
 0x473100 GetModuleHandleExW
 0x473104 GetStdHandle
 0x473108 WriteFile
 0x47310c GetModuleFileNameW
 0x473110 GetCommandLineA
 0x473114 GetCommandLineW
 0x473118 GetCurrentThread
 0x47311c HeapAlloc
 0x473120 HeapFree
 0x473124 GetDateFormatW
 0x473128 GetTimeFormatW
 0x47312c IsValidLocale
 0x473130 GetUserDefaultLCID
 0x473134 EnumSystemLocalesW
 0x473138 GetFileType
 0x47313c CloseHandle
 0x473140 FlushFileBuffers
 0x473144 GetConsoleCP
 0x473148 GetConsoleMode
 0x47314c ReadFile
 0x473150 GetFileSizeEx
 0x473154 SetFilePointerEx
 0x473158 ReadConsoleW
 0x47315c GetFileAttributesExW
 0x473160 OutputDebugStringW
 0x473164 FindClose
 0x473168 FindFirstFileExW
 0x47316c FindNextFileW
 0x473170 IsValidCodePage
 0x473174 GetACP
 0x473178 GetOEMCP
 0x47317c GetEnvironmentStringsW
 0x473180 FreeEnvironmentStringsW
 0x473184 SetEnvironmentVariableW
 0x473188 SetStdHandle
 0x47318c GetProcessHeap
 0x473190 SetEndOfFile
ADVAPI32.dll
 0x473000 CreateServiceA
 0x473004 CloseServiceHandle
 0x473008 RegSetValueExA
 0x47300c RegOpenKeyExA
 0x473010 RegCloseKey
 0x473014 OpenSCManagerA
SHELL32.dll
 0x473198 ShellExecuteExA
 0x47319c ShellExecuteA
WININET.dll
 0x4731a4 DeleteUrlCacheEntry

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure