Report - 753.exe

Admin Tool (Sysinternals etc ...) Malicious Library UPX AntiDebug AntiVM PE File PE32 PE64
ScreenShot
Created 2021.09.19 11:15 Machine s1_win7_x6401
Filename 753.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
8.6
ZERO API file : malware
VT API (file) 46 detected (malicious, high confidence, origin, GenericKD, Unsafe, Save, MalwareX, confidence, ZexaF, auW@a8m3bHai, Attribute, HighConfidence, Tiny, Lohy, 0NA103II21, Static AI, Malicious PE, XPACK, ai score=84, KVMH017, kcloud, Sabsik, score, Generic@ML, RDML, HYCzEUpYBrFhWCy5trk1yg, susgen)
md5 af3e98549b975158f54ef8b171182d50
sha256 43a1ee058eb0b771d9f9b179cb51a5b56a1c3ae8bdc211edeb8486f89e3bc10f
ssdeep 96:ZeLUneX1Oe4HEWjOIgydPtboynun/AqiCtq9:0AeXcCcP1oynW/Ag
imphash d4fccbf39f0b0e9e3b5577d3527b4e69
impfuzzy 12:I4sX5vBNGx4Gv+GXRzGy5GgYLwbISZOoS3fQAEsy27QDuKmRgFyS:W5vBUVv+GdySZO0N/2kDuKmML
  Network IP location

Signature (19cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
watch Attempts to remove evidence of file being downloaded from the Internet
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process attempted to delay the analysis task.
notice A process created a hidden window
notice An executable file was downloaded by the process 753.exe
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Creates hidden or system file
notice Drops a binary and executes it
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Command line console output was observed
info The executable uses a known packer
info This executable has a PDB path

Rules (16cnts)

Level Name Description Collection
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch UPX_Zero UPX packed file binaries (download)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.215.113.84/etc.exe Unknown 185.215.113.84 clean
185.215.113.84 Unknown 185.215.113.84 malware

Suricata ids

PE API

IAT(Import Address Table) Library

SHLWAPI.dll
 0x402090 PathFileExistsW
MSVCRT.dll
 0x402040 __set_app_type
 0x402044 _except_handler3
 0x402048 __p__fmode
 0x40204c _controlfp
 0x402050 __p__commode
 0x402054 _adjust_fdiv
 0x402058 __setusermatherr
 0x40205c _initterm
 0x402060 __getmainargs
 0x402064 _acmdln
 0x402068 exit
 0x40206c _XcptFilter
 0x402070 _exit
 0x402074 srand
 0x402078 wcslen
 0x40207c rand
 0x402080 memset
WININET.dll
 0x4020a0 InternetCloseHandle
 0x4020a4 InternetOpenUrlW
 0x4020a8 InternetOpenW
 0x4020ac InternetReadFile
urlmon.dll
 0x4020b4 URLDownloadToFileW
KERNEL32.dll
 0x402010 DeleteFileW
 0x402014 WriteFile
 0x402018 Sleep
 0x40201c CreateFileW
 0x402020 GetModuleHandleA
 0x402024 CreateProcessW
 0x402028 CloseHandle
 0x40202c SetFileAttributesW
 0x402030 GetStartupInfoA
 0x402034 GetTickCount
 0x402038 ExpandEnvironmentStringsW
USER32.dll
 0x402098 wsprintfW
ADVAPI32.dll
 0x402000 RegSetValueExW
 0x402004 RegCloseKey
 0x402008 RegOpenKeyExW
SHELL32.dll
 0x402088 ShellExecuteW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure