Report - shattgojas.exe

PE File PE32
ScreenShot
Created 2021.09.07 18:57 Machine s1_win7_x6402
Filename shattgojas.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
1.0
ZERO API file : malware
VT API (file) 33 detected (Razy, Generic Obfuscated, Unsafe, malicious, ELIG, Attribute, HighConfidence, ccmw, TrojanX, Generic@ML, RDML, E6EUSfvJrr05vJDrNP8+Jw, ZPACK, Sabsik, score, ZexaF, luW@a4tvszdi, ai score=81, BScope, Injects, Static AI, Malicious PE, susgen, confidence, 100%)
md5 3dd433076befeaeb67f2e9aee5207b9a
sha256 8744b1bba11ed42a3e422599468f9d7aa117bf7264875591a82ebbf1dc4dbffa
ssdeep 1536:rrhRpJvQmBRn7PGCbzEyUUFcST5UigiBwOM:rrhRromBlPGCUyUUFjbB
imphash 0162c0d4b083e9259ae3a5f11034f58d
impfuzzy 12:UhJRAvy1mPBQ/DXnzKp3XOiqIKSTs2Elowti4LKLLn/MAINcccF:UrRA6s2/Dj0nRuSTHEjXLKLLn+NcccF
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 33 AntiVirus engines on VirusTotal as malicious

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
img.neko.airforce US DIGITALOCEAN-ASN 167.172.239.151 mailcious
167.172.239.151 US DIGITALOCEAN-ASN 167.172.239.151 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

WININET.dll
 0x402040 FindFirstUrlCacheEntryExW
 0x402044 IncrementUrlCacheHeaderData
 0x402048 GetUrlCacheHeaderData
 0x40204c FindFirstUrlCacheContainerA
 0x402050 FtpRemoveDirectoryW
 0x402054 InternetGoOnline
 0x402058 GetUrlCacheEntryInfoA
MSACM32.dll
 0x40201c acmDriverMessage
 0x402020 acmFilterEnumW
RESUTILS.dll
 0x402028 ResUtilGetResourceNameDependency
 0x40202c ResUtilSetPropertyParameterBlock
 0x402030 ResUtilAddUnknownProperties
 0x402034 ResUtilFindSzProperty
 0x402038 ResUtilStopResourceService
urlmon.dll
 0x402068 URLDownloadToFileW
 0x40206c HlinkSimpleNavigateToString
 0x402070 Extract
 0x402074 CoGetClassObjectFromURL
 0x402078 URLOpenPullStreamW
 0x40207c RegisterMediaTypeClass
COMDLG32.dll
 0x402000 GetOpenFileNameA
 0x402004 GetOpenFileNameW
 0x402008 ReplaceTextA
 0x40200c ChooseColorW
 0x402010 FindTextW
 0x402014 FindTextA
ole32.dll
 0x402060 CoInstall

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure