Report - hv.exe

Gen2 ASPack Malicious Library Malicious Packer PE File PE32 OS Processor Check
ScreenShot
Created 2021.09.07 19:12 Machine s1_win7_x6401
Filename hv.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
7.8
ZERO API file : malware
VT API (file) 49 detected (SpyEyesaND, SpyEyes, malicious, high confidence, GenericKD, GenericRXMI, Unsafe, confidence, 100%, ZexaF, ou2@aaJWp7hi, RTCJ, Attribute, HighConfidence, AARD, TinyNuke, R002C0PGB21, ouzrw, ASMalwS, Mamson, score, ai score=81, BScope, Fuerboos, XUAvosWD, Static AI, Suspicious PE, InvalidSig, GdSda)
md5 385eccb9e711368035f0f329f98255ec
sha256 1e80bf1bca4a8841d973e8bf1f88e2d7cce3160793f23b2351db0aa7ea23af4e
ssdeep 3072:zASUot4cIAg0Fuj7M1iUa2LQR/wkLsrA5vmUBmHHcTnoeYYHIwG1Opm92BuiFwdn:eLAORwAtmBHHc8eY5XOpwiFEHt1CB5O
imphash f2b2e356d2d0eb1b0d5da0b0d4f5e934
impfuzzy 48:PKZGvBUsuMzLtwS1Ec+JZiXuHvyz8tjIz5n6GL4Cj5SUAQKQuR7ArHlnnon:PypsuMXtwS1Ec+Ju7E/CjK
  Network IP location

Signature (18cnts)

Level Description
danger File has been identified by 49 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch Uses suspicious command line tools or Windows utilities
watch Uses Sysinternals tools in order to add additional command line functionality
notice A process attempted to delay the analysis task.
notice A process created a hidden window
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (7cnts)

Level Name Description Collection
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://37.49.230.185/bp/gate.php?017BD04FB3BF45B68167E EE Estro Web Services Private Limited 37.49.230.185 clean
37.49.230.185 EE Estro Web Services Private Limited 37.49.230.185 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x435050 Process32First
 0x435054 TerminateProcess
 0x435058 ReleaseMutex
 0x43505c OpenProcess
 0x435060 CreateToolhelp32Snapshot
 0x435064 Process32Next
 0x435068 GetModuleFileNameA
 0x43506c MultiByteToWideChar
 0x435070 SystemTimeToFileTime
 0x435074 WideCharToMultiByte
 0x435078 GetSystemTime
 0x43507c IsWow64Process
 0x435080 SetEndOfFile
 0x435084 HeapSize
 0x435088 GetConsoleOutputCP
 0x43508c FlushFileBuffers
 0x435090 CreateFileW
 0x435094 GetProcessHeap
 0x435098 EnumSystemLocalesW
 0x43509c GetUserDefaultLCID
 0x4350a0 IsValidLocale
 0x4350a4 SetStdHandle
 0x4350a8 SetEnvironmentVariableW
 0x4350ac FreeEnvironmentStringsW
 0x4350b0 GetEnvironmentStringsW
 0x4350b4 GetOEMCP
 0x4350b8 GetACP
 0x4350bc IsValidCodePage
 0x4350c0 FindNextFileW
 0x4350c4 FindFirstFileExW
 0x4350c8 FindClose
 0x4350cc HeapReAlloc
 0x4350d0 GetFileType
 0x4350d4 ReadConsoleW
 0x4350d8 GetConsoleMode
 0x4350dc GetComputerNameW
 0x4350e0 CreateMutexA
 0x4350e4 CreateDirectoryA
 0x4350e8 CreateFileA
 0x4350ec CopyFileA
 0x4350f0 WriteFile
 0x4350f4 GetProcAddress
 0x4350f8 GetWindowsDirectoryA
 0x4350fc GetVersionExA
 0x435100 lstrcpyA
 0x435104 GetModuleHandleA
 0x435108 TerminateThread
 0x43510c lstrcatA
 0x435110 lstrcmpA
 0x435114 WaitForSingleObject
 0x435118 CloseHandle
 0x43511c LoadLibraryA
 0x435120 Sleep
 0x435124 GetCurrentProcess
 0x435128 SetFilePointerEx
 0x43512c HeapAlloc
 0x435130 GetFileAttributesExW
 0x435134 CreateProcessW
 0x435138 GetExitCodeProcess
 0x43513c HeapFree
 0x435140 GetCommandLineW
 0x435144 GetCommandLineA
 0x435148 GetModuleFileNameW
 0x43514c GetStdHandle
 0x435150 GetModuleHandleExW
 0x435154 ExitProcess
 0x435158 ReadFile
 0x43515c WriteConsoleW
 0x435160 LoadLibraryExW
 0x435164 FreeLibrary
 0x435168 RtlUnwind
 0x43516c RaiseException
 0x435170 GetCPInfo
 0x435174 GetStringTypeW
 0x435178 GetLocaleInfoW
 0x43517c LCMapStringW
 0x435180 CompareStringW
 0x435184 DecodePointer
 0x435188 EncodePointer
 0x43518c UnhandledExceptionFilter
 0x435190 SetUnhandledExceptionFilter
 0x435194 IsProcessorFeaturePresent
 0x435198 QueryPerformanceCounter
 0x43519c GetCurrentProcessId
 0x4351a0 GetCurrentThreadId
 0x4351a4 GetSystemTimeAsFileTime
 0x4351a8 InitializeSListHead
 0x4351ac IsDebuggerPresent
 0x4351b0 GetStartupInfoW
 0x4351b4 GetModuleHandleW
 0x4351b8 GetLastError
 0x4351bc EnterCriticalSection
 0x4351c0 LeaveCriticalSection
 0x4351c4 DeleteCriticalSection
 0x4351c8 SetLastError
 0x4351cc InitializeCriticalSectionAndSpinCount
 0x4351d0 SwitchToThread
 0x4351d4 TlsAlloc
 0x4351d8 TlsGetValue
 0x4351dc TlsSetValue
 0x4351e0 TlsFree
USER32.dll
 0x435208 MoveWindow
 0x43520c SendMessageA
 0x435210 PrintWindow
 0x435214 MenuItemFromPoint
 0x435218 FindWindowA
 0x43521c GetTopWindow
 0x435220 GetWindowLongA
 0x435224 CloseDesktop
 0x435228 GetWindowPlacement
 0x43522c WindowFromPoint
 0x435230 ScreenToClient
 0x435234 PostMessageA
 0x435238 IsWindowVisible
 0x43523c GetDC
 0x435240 PtInRect
 0x435244 ChildWindowFromPoint
 0x435248 ReleaseDC
 0x43524c RealGetWindowClassA
 0x435250 GetMenuItemID
 0x435254 CharUpperBuffA
 0x435258 wsprintfA
 0x43525c MessageBoxA
 0x435260 GetWindow
 0x435264 GetWindowRect
GDI32.dll
 0x435028 BitBlt
 0x43502c CreateCompatibleBitmap
 0x435030 SelectObject
 0x435034 CreateCompatibleDC
 0x435038 StretchBlt
 0x43503c GetDIBits
 0x435040 DeleteDC
 0x435044 SetStretchBltMode
 0x435048 DeleteObject
COMDLG32.dll
 0x435020 GetOpenFileNameA
ADVAPI32.dll
 0x435000 RegSetValueExA
 0x435004 RegEnumKeyA
 0x435008 RegCloseKey
 0x43500c RegOpenKeyA
 0x435010 RegQueryValueExA
 0x435014 RegOpenKeyExA
 0x435018 GetUserNameW
SHELL32.dll
 0x4351e8 SHAppBarMessage
 0x4351ec SHFileOperationA
 0x4351f0 SHGetFolderPathA
WS2_32.dll
 0x435290 closesocket
 0x435294 gethostbyname
 0x435298 WSAStartup
 0x43529c send
 0x4352a0 socket
 0x4352a4 connect
 0x4352a8 recv
 0x4352ac htons
SHLWAPI.dll
 0x4351f8 StrChrA
 0x4351fc StrToIntA
 0x435200 PathFileExistsA
WININET.dll
 0x43526c InternetOpenUrlA
 0x435270 InternetReadFile
 0x435274 InternetConnectA
 0x435278 HttpSendRequestA
 0x43527c InternetCloseHandle
 0x435280 InternetOpenA
 0x435284 HttpOpenRequestA
 0x435288 HttpQueryInfoA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure