Report - c0dda7a83d4cc964b37957b563b1b6ff6fd64256.smile

Gen1 Gen2 Malicious Library Malicious Packer ASPack UPX PE File OS Processor Check PE32 DLL
ScreenShot
Created 2021.09.11 15:25 Machine s1_win7_x6401
Filename c0dda7a83d4cc964b37957b563b1b6ff6fd64256.smile
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
8.2
ZERO API file : malware
VT API (file) 35 detected (AIDetect, malware2, malicious, high confidence, score, GenericRXJR, Unsafe, confidence, Zusy, Attribute, HighConfidence, Raccoon, Racealer, MalwareX, Static AI, Malicious PE, AGEN, Sabsik, BScope, ai score=80, CLASSIC, Racoon, ZexaF, JqW@aWTUtAj, Genetic)
md5 fa3bea9c92a88ee35e69036fd79c9169
sha256 8d83c8cd1c00fda08e1e524c4be95484070cfe1a87b38162a31cd6c86aec566b
ssdeep 12288:HPyvUhuDGncJlujEpr8qEFRkbNZ5tWDmp4NAc15Kp3CIF5j1QwZPDrE:Qwckyr8RkJXampEhoPa2PDw
imphash 35279f0bcb93fbb246a2ff5f9995bdc1
impfuzzy 96:WrznXQjOqeX23mGz8v0LVGxgcpVeceb4nlEHdkNAM6lYo:wjX2eX2A9e8lAdkNeYo
  Network IP location

Signature (19cnts)

Level Description
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
watch Appends a known CryptoMix ransomware file extension to files that have been encrypted
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Harvests credentials from local email clients
notice A process created a hidden window
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Sends data using the HTTP POST Method
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info Tries to locate where the browsers are installed

Rules (14cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
watch ASPack_Zero ASPack packed file binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)

Network (7cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://5.181.156.77//l/f/_ImE03sB3dP17SpzLfMM/43003380ff8ec12ed78991d097ba13f61b7c0204 MD MivoCloud SRL 5.181.156.77 clean
http://5.181.156.77/ MD MivoCloud SRL 5.181.156.77 clean
http://5.181.156.77//l/f/_ImE03sB3dP17SpzLfMM/3363f52ac827a35d92214b8e5136f72be3acbb8d MD MivoCloud SRL 5.181.156.77 clean
https://telete.in/bibaramensup DE Hetzner Online GmbH 195.201.225.248 clean
telete.in DE Hetzner Online GmbH 195.201.225.248 mailcious
195.201.225.248 DE Hetzner Online GmbH 195.201.225.248 mailcious
5.181.156.77 MD MivoCloud SRL 5.181.156.77 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x46d088 WaitForSingleObject
 0x46d08c GetModuleHandleA
 0x46d090 GetLocaleInfoA
 0x46d094 Sleep
 0x46d098 RemoveDirectoryTransactedA
 0x46d09c GetUserDefaultLCID
 0x46d0a0 CreateThread
 0x46d0a4 GetLastError
 0x46d0a8 DeleteFileA
 0x46d0ac HeapAlloc
 0x46d0b0 lstrcpynA
 0x46d0b4 lstrcmpiW
 0x46d0b8 GetModuleFileNameA
 0x46d0bc GetCurrentProcess
 0x46d0c0 GetSystemPowerStatus
 0x46d0c4 CreateMutexA
 0x46d0c8 OpenProcess
 0x46d0cc CreateToolhelp32Snapshot
 0x46d0d0 MultiByteToWideChar
 0x46d0d4 GetSystemWow64DirectoryW
 0x46d0d8 GetTimeZoneInformation
 0x46d0dc OpenMutexA
 0x46d0e0 Process32NextW
 0x46d0e4 GlobalAlloc
 0x46d0e8 GetEnvironmentVariableA
 0x46d0ec Process32FirstW
 0x46d0f0 GlobalFree
 0x46d0f4 GetSystemInfo
 0x46d0f8 GetLogicalDriveStringsA
 0x46d0fc GlobalMemoryStatusEx
 0x46d100 WideCharToMultiByte
 0x46d104 CreateProcessA
 0x46d108 GetComputerNameA
 0x46d10c UnmapViewOfFile
 0x46d110 GetFileInformationByHandle
 0x46d114 CloseHandle
 0x46d118 GetLocalTime
 0x46d11c CreateFileMappingA
 0x46d120 MapViewOfFile
 0x46d124 GetTickCount
 0x46d128 SetStdHandle
 0x46d12c FreeEnvironmentStringsW
 0x46d130 GetEnvironmentStringsW
 0x46d134 GetOEMCP
 0x46d138 GetACP
 0x46d13c IsValidCodePage
 0x46d140 HeapReAlloc
 0x46d144 OutputDebugStringW
 0x46d148 lstrlenA
 0x46d14c GetFileSize
 0x46d150 lstrcpyW
 0x46d154 lstrcatW
 0x46d158 GetVersionExW
 0x46d15c lstrlenW
 0x46d160 CreateDirectoryA
 0x46d164 lstrcpyA
 0x46d168 SystemTimeToFileTime
 0x46d16c CreateFileA
 0x46d170 GetFileAttributesA
 0x46d174 LocalFileTimeToFileTime
 0x46d178 SetCurrentDirectoryA
 0x46d17c GetCurrentDirectoryA
 0x46d180 SetFilePointer
 0x46d184 SetFileTime
 0x46d188 WriteFile
 0x46d18c ReadFile
 0x46d190 FindClose
 0x46d194 GetDriveTypeA
 0x46d198 CopyFileTransactedA
 0x46d19c FreeLibrary
 0x46d1a0 GetProcessHeap
 0x46d1a4 LocalFree
 0x46d1a8 GetProcAddress
 0x46d1ac LoadLibraryA
 0x46d1b0 LocalAlloc
 0x46d1b4 DeleteFileTransactedA
 0x46d1b8 SetEnvironmentVariableW
 0x46d1bc ReadConsoleW
 0x46d1c0 EnumSystemLocalesW
 0x46d1c4 IsValidLocale
 0x46d1c8 GetLocaleInfoW
 0x46d1cc LCMapStringW
 0x46d1d0 CompareStringW
 0x46d1d4 GetTimeFormatW
 0x46d1d8 GetDateFormatW
 0x46d1dc GetConsoleMode
 0x46d1e0 GetConsoleCP
 0x46d1e4 FlushFileBuffers
 0x46d1e8 GetFileSizeEx
 0x46d1ec HeapSize
 0x46d1f0 GetCommandLineW
 0x46d1f4 GetCommandLineA
 0x46d1f8 WriteConsoleW
 0x46d1fc GetModuleFileNameW
 0x46d200 GetFileType
 0x46d204 GetStdHandle
 0x46d208 GetModuleHandleExW
 0x46d20c HeapFree
 0x46d210 FileTimeToSystemTime
 0x46d214 CreateDirectoryTransactedA
 0x46d218 ExitProcess
 0x46d21c LoadLibraryExW
 0x46d220 TlsFree
 0x46d224 TlsSetValue
 0x46d228 TlsGetValue
 0x46d22c TlsAlloc
 0x46d230 InitializeCriticalSectionAndSpinCount
 0x46d234 SetLastError
 0x46d238 RaiseException
 0x46d23c RtlUnwind
 0x46d240 TerminateProcess
 0x46d244 InitializeSListHead
 0x46d248 GetSystemTimeAsFileTime
 0x46d24c GetCurrentThreadId
 0x46d250 GetCurrentProcessId
 0x46d254 QueryPerformanceCounter
 0x46d258 GetModuleHandleW
 0x46d25c GetStartupInfoW
 0x46d260 SetUnhandledExceptionFilter
 0x46d264 UnhandledExceptionFilter
 0x46d268 IsDebuggerPresent
 0x46d26c IsProcessorFeaturePresent
 0x46d270 GetCPInfo
 0x46d274 SetCurrentDirectoryW
 0x46d278 CreateDirectoryW
 0x46d27c CreateFileW
 0x46d280 FindFirstFileExW
 0x46d284 FindNextFileW
 0x46d288 GetFileAttributesExW
 0x46d28c SetEndOfFile
 0x46d290 SetFilePointerEx
 0x46d294 AreFileApisANSI
 0x46d298 DeviceIoControl
 0x46d29c CopyFileW
 0x46d2a0 CreateHardLinkW
 0x46d2a4 GetFileInformationByHandleEx
 0x46d2a8 CreateSymbolicLinkW
 0x46d2ac FormatMessageA
 0x46d2b0 EnterCriticalSection
 0x46d2b4 LeaveCriticalSection
 0x46d2b8 InitializeCriticalSectionEx
 0x46d2bc DeleteCriticalSection
 0x46d2c0 EncodePointer
 0x46d2c4 DecodePointer
 0x46d2c8 LCMapStringEx
 0x46d2cc GetStringTypeW
USER32.dll
 0x46d2f4 wsprintfW
 0x46d2f8 wsprintfA
 0x46d2fc GetWindowRect
 0x46d300 GetSystemMetrics
 0x46d304 GetWindowDC
 0x46d308 EnumDisplayDevicesA
 0x46d30c GetDesktopWindow
GDI32.dll
 0x46d060 BitBlt
 0x46d064 SaveDC
 0x46d068 SelectObject
 0x46d06c CreateDIBSection
 0x46d070 CreateCompatibleDC
 0x46d074 GetDeviceCaps
 0x46d078 DeleteDC
 0x46d07c RestoreDC
 0x46d080 DeleteObject
ADVAPI32.dll
 0x46d000 GetTokenInformation
 0x46d004 CryptGetHashParam
 0x46d008 CryptDestroyHash
 0x46d00c RegQueryValueExA
 0x46d010 GetUserNameA
 0x46d014 CreateProcessWithTokenW
 0x46d018 OpenProcessToken
 0x46d01c RegOpenKeyExA
 0x46d020 ConvertSidToStringSidW
 0x46d024 DuplicateTokenEx
 0x46d028 RegQueryValueExW
 0x46d02c CryptReleaseContext
 0x46d030 RegCloseKey
 0x46d034 RegEnumKeyExW
 0x46d038 RegOpenKeyExW
 0x46d03c CryptAcquireContextA
 0x46d040 CredEnumerateW
 0x46d044 CredFree
 0x46d048 CryptCreateHash
 0x46d04c CryptHashData
SHELL32.dll
 0x46d2d4 SHGetFolderPathA
 0x46d2d8 ShellExecuteA
 0x46d2dc SHGetSpecialFolderPathW
ole32.dll
 0x46d39c CoInitialize
 0x46d3a0 CoUninitialize
 0x46d3a4 CoTaskMemFree
 0x46d3a8 CoCreateInstance
USERENV.dll
 0x46d314 GetUserProfileDirectoryA
ktmw32.dll
 0x46d38c CreateTransaction
 0x46d390 RollbackTransaction
 0x46d394 CommitTransaction
crypt.dll
 0x46d344 BCryptDecrypt
 0x46d348 BCryptDestroyKey
 0x46d34c BCryptGenerateSymmetricKey
 0x46d350 BCryptOpenAlgorithmProvider
 0x46d354 BCryptCloseAlgorithmProvider
 0x46d358 BCryptSetProperty
CRYPT32.dll
 0x46d054 CryptStringToBinaryA
 0x46d058 CryptUnprotectData
SHLWAPI.dll
 0x46d2e4 StrCmpNW
 0x46d2e8 StrToIntA
 0x46d2ec StrStrIW
WINHTTP.dll
 0x46d31c WinHttpSendRequest
 0x46d320 WinHttpConnect
 0x46d324 WinHttpQueryDataAvailable
 0x46d328 WinHttpOpenRequest
 0x46d32c WinHttpCloseHandle
 0x46d330 WinHttpOpen
 0x46d334 WinHttpSetOption
 0x46d338 WinHttpReceiveResponse
 0x46d33c WinHttpReadData
gdiplus.dll
 0x46d360 GdiplusStartup
 0x46d364 GdipGetImageEncodersSize
 0x46d368 GdipFree
 0x46d36c GdipDisposeImage
 0x46d370 GdipCreateBitmapFromHBITMAP
 0x46d374 GdipAlloc
 0x46d378 GdipCloneImage
 0x46d37c GdipGetImageEncoders
 0x46d380 GdiplusShutdown
 0x46d384 GdipSaveImageToFile

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure