Report - task.exe

PE64 PE File
ScreenShot
Created 2021.09.13 09:32 Machine s1_win7_x6401
Filename task.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
9
Behavior Score
5.2
ZERO API file : clean
VT API (file) 14 detected (malicious, high confidence, confidence, Genome, CoinminerX, Srwq, Static AI, Malicious PE, Bingoml, Unsafe, Score, susgen)
md5 5120630343cdfdc8698f7ce9d9991894
sha256 9831ce1230a68322d442ae5732a4974846e7c9ab7318c41d7382a986428fcb8e
ssdeep 3072:u7lm+ZrvtFckqaGuI5x5puWpMoSFQ9oToqMrdhHI3IIad69/N:uEIrZBIPfp7Sq9tdZI3IIw6dN
imphash 6b9c23a9a3b4c46610e49aa6cdf719fa
impfuzzy 3:oTE4ps0JWBJAEPw1MO/OywS9KTXzhAXwEQaxRegp3:oTaBJAEoZ/OEGDzyRzd
  Network IP location

Signature (12cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Created a service where a service was also not started
watch File has been identified by 14 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
notice Creates executable files on the filesystem
notice Foreign language identified in PE resource
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
info Checks if process is being debugged by a debugger
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (4cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://154.91.1.118/java.exe HK HK Broadband Network Ltd. 154.91.1.118 5127 malware
http://154.91.1.118/WinRing0x64.sys HK HK Broadband Network Ltd. 154.91.1.118 clean
xmr.f2pool.com CN Hangzhou Alibaba Advertising Co.,Ltd. 203.107.32.162 mailcious
154.91.1.118 HK HK Broadband Network Ltd. 154.91.1.118 malware
203.107.32.162 CN Hangzhou Alibaba Advertising Co.,Ltd. 203.107.32.162 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x14004727c OpenServiceW
KERNEL32.DLL
 0x14004728c LoadLibraryA
 0x140047294 ExitProcess
 0x14004729c GetProcAddress
 0x1400472a4 VirtualProtect
USER32.dll
 0x1400472b4 GetMessageW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure