ScreenShot
Created | 2021.10.01 18:21 | Machine | s1_win7_x6402 |
Filename | 1110888466.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 21 detected (AIDetect, malware2, malicious, high confidence, Save, Kryptik, HMRW, Convagent, Generic ML PUA, Injuke, Casdet, score, Generic@ML, RDML, BdObePV6+mFFhvyt6xkJ3g, Static AI, Suspicious PE, FLKJ, ZexaF, Su0@a04FSrdk, PWSX, confidence) | ||
md5 | 1330be0f9459506cfd3d972082f3cb0e | ||
sha256 | c0da5841ddfc29dc9eea7d8d9e42d981385602f21025ec47798d302c3ef50096 | ||
ssdeep | 24576:xry2uXzmcuN/rHhPw3mHMLNXJqKZa5jQQiE3soduAP/f49Y0wGIS:xunQN/rBPwWH+7ZJGdXP/Q9YTS | ||
imphash | ae9f6a32bb8b03dce37903edbc855ba1 | ||
impfuzzy | 48:J9F2OcLKc1XFjRWDYgeBtDX+Kc+pnCHFa:JqFLKc1XF8EdBtDX+Kc+pnMFa |
Network IP location
Signature (36cnts)
Level | Description |
---|---|
danger | Executed a process and injected code into it |
warning | File has been identified by 21 AntiVirus engines on VirusTotal as malicious |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Collects information about installed applications |
watch | Communicates with host for which no DNS query was performed |
watch | Executes one or more WMI queries |
watch | Harvests credentials from local FTP client softwares |
watch | Looks for the Windows Idle Time to determine the uptime |
watch | One or more of the buffers contains an embedded PE file |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates executable files on the filesystem |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | Executes one or more WMI queries which can be used to identify virtual machines |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Queries for potentially installed applications |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | Steals private information from local Internet browsers |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The file contains an unknown PE resource name possibly indicative of a packer |
info | This executable has a PDB path |
info | Tries to locate where the browsers are installed |
info | Uses Windows APIs to generate a cryptographic key |
Rules (17cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
info | anti_dbg | Checks if being debugged | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | JPEG_Format_Zero | JPEG Format | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x428000 GetLastError
0x428004 SetLastError
0x428008 FormatMessageW
0x42800c GetFileType
0x428010 GetStdHandle
0x428014 WriteFile
0x428018 ReadFile
0x42801c FlushFileBuffers
0x428020 SetEndOfFile
0x428024 SetFilePointer
0x428028 SetFileTime
0x42802c CloseHandle
0x428030 CreateFileW
0x428034 CreateDirectoryW
0x428038 SetFileAttributesW
0x42803c GetFileAttributesW
0x428040 DeleteFileW
0x428044 MoveFileW
0x428048 FindClose
0x42804c FindFirstFileW
0x428050 FindNextFileW
0x428054 GetVersionExW
0x428058 GetCurrentDirectoryW
0x42805c GetFullPathNameW
0x428060 FoldStringW
0x428064 GetModuleFileNameW
0x428068 GetModuleHandleW
0x42806c FindResourceW
0x428070 FreeLibrary
0x428074 GetProcAddress
0x428078 GetCurrentProcessId
0x42807c ExitProcess
0x428080 SetThreadExecutionState
0x428084 Sleep
0x428088 LoadLibraryW
0x42808c GetSystemDirectoryW
0x428090 CompareStringW
0x428094 AllocConsole
0x428098 FreeConsole
0x42809c AttachConsole
0x4280a0 WriteConsoleW
0x4280a4 TzSpecificLocalTimeToSystemTime
0x4280a8 SystemTimeToFileTime
0x4280ac FileTimeToLocalFileTime
0x4280b0 LocalFileTimeToFileTime
0x4280b4 FileTimeToSystemTime
0x4280b8 GetCPInfo
0x4280bc IsDBCSLeadByte
0x4280c0 MultiByteToWideChar
0x4280c4 WideCharToMultiByte
0x4280c8 GlobalAlloc
0x4280cc LockResource
0x4280d0 GlobalLock
0x4280d4 GlobalUnlock
0x4280d8 GlobalFree
0x4280dc LoadResource
0x4280e0 SizeofResource
0x4280e4 SetCurrentDirectoryW
0x4280e8 GetExitCodeProcess
0x4280ec WaitForSingleObject
0x4280f0 GetLocalTime
0x4280f4 GetTickCount
0x4280f8 MapViewOfFile
0x4280fc UnmapViewOfFile
0x428100 CreateFileMappingW
0x428104 OpenFileMappingW
0x428108 GetCommandLineW
0x42810c SetEnvironmentVariableW
0x428110 ExpandEnvironmentStringsW
0x428114 GetTempPathW
0x428118 MoveFileExW
0x42811c GetLocaleInfoW
0x428120 GetTimeFormatW
0x428124 GetDateFormatW
0x428128 GetNumberFormatW
0x42812c SetFilePointerEx
0x428130 GetConsoleMode
0x428134 GetConsoleCP
0x428138 HeapSize
0x42813c SetStdHandle
0x428140 GetProcessHeap
0x428144 RaiseException
0x428148 GetSystemInfo
0x42814c VirtualProtect
0x428150 VirtualQuery
0x428154 LoadLibraryExA
0x428158 IsProcessorFeaturePresent
0x42815c IsDebuggerPresent
0x428160 UnhandledExceptionFilter
0x428164 SetUnhandledExceptionFilter
0x428168 GetStartupInfoW
0x42816c QueryPerformanceCounter
0x428170 GetCurrentThreadId
0x428174 GetSystemTimeAsFileTime
0x428178 InitializeSListHead
0x42817c GetCurrentProcess
0x428180 TerminateProcess
0x428184 RtlUnwind
0x428188 EncodePointer
0x42818c EnterCriticalSection
0x428190 LeaveCriticalSection
0x428194 DeleteCriticalSection
0x428198 InitializeCriticalSectionAndSpinCount
0x42819c TlsAlloc
0x4281a0 TlsGetValue
0x4281a4 TlsSetValue
0x4281a8 TlsFree
0x4281ac LoadLibraryExW
0x4281b0 QueryPerformanceFrequency
0x4281b4 GetModuleHandleExW
0x4281b8 GetModuleFileNameA
0x4281bc GetACP
0x4281c0 HeapFree
0x4281c4 HeapAlloc
0x4281c8 HeapReAlloc
0x4281cc GetStringTypeW
0x4281d0 LCMapStringW
0x4281d4 FindFirstFileExA
0x4281d8 FindNextFileA
0x4281dc IsValidCodePage
0x4281e0 GetOEMCP
0x4281e4 GetCommandLineA
0x4281e8 GetEnvironmentStringsW
0x4281ec FreeEnvironmentStringsW
0x4281f0 DecodePointer
gdiplus.dll
0x4281f8 GdiplusShutdown
0x4281fc GdiplusStartup
0x428200 GdipCreateHBITMAPFromBitmap
0x428204 GdipCreateBitmapFromStreamICM
0x428208 GdipCreateBitmapFromStream
0x42820c GdipDisposeImage
0x428210 GdipCloneImage
0x428214 GdipFree
0x428218 GdipAlloc
EAT(Export Address Table) Library
KERNEL32.dll
0x428000 GetLastError
0x428004 SetLastError
0x428008 FormatMessageW
0x42800c GetFileType
0x428010 GetStdHandle
0x428014 WriteFile
0x428018 ReadFile
0x42801c FlushFileBuffers
0x428020 SetEndOfFile
0x428024 SetFilePointer
0x428028 SetFileTime
0x42802c CloseHandle
0x428030 CreateFileW
0x428034 CreateDirectoryW
0x428038 SetFileAttributesW
0x42803c GetFileAttributesW
0x428040 DeleteFileW
0x428044 MoveFileW
0x428048 FindClose
0x42804c FindFirstFileW
0x428050 FindNextFileW
0x428054 GetVersionExW
0x428058 GetCurrentDirectoryW
0x42805c GetFullPathNameW
0x428060 FoldStringW
0x428064 GetModuleFileNameW
0x428068 GetModuleHandleW
0x42806c FindResourceW
0x428070 FreeLibrary
0x428074 GetProcAddress
0x428078 GetCurrentProcessId
0x42807c ExitProcess
0x428080 SetThreadExecutionState
0x428084 Sleep
0x428088 LoadLibraryW
0x42808c GetSystemDirectoryW
0x428090 CompareStringW
0x428094 AllocConsole
0x428098 FreeConsole
0x42809c AttachConsole
0x4280a0 WriteConsoleW
0x4280a4 TzSpecificLocalTimeToSystemTime
0x4280a8 SystemTimeToFileTime
0x4280ac FileTimeToLocalFileTime
0x4280b0 LocalFileTimeToFileTime
0x4280b4 FileTimeToSystemTime
0x4280b8 GetCPInfo
0x4280bc IsDBCSLeadByte
0x4280c0 MultiByteToWideChar
0x4280c4 WideCharToMultiByte
0x4280c8 GlobalAlloc
0x4280cc LockResource
0x4280d0 GlobalLock
0x4280d4 GlobalUnlock
0x4280d8 GlobalFree
0x4280dc LoadResource
0x4280e0 SizeofResource
0x4280e4 SetCurrentDirectoryW
0x4280e8 GetExitCodeProcess
0x4280ec WaitForSingleObject
0x4280f0 GetLocalTime
0x4280f4 GetTickCount
0x4280f8 MapViewOfFile
0x4280fc UnmapViewOfFile
0x428100 CreateFileMappingW
0x428104 OpenFileMappingW
0x428108 GetCommandLineW
0x42810c SetEnvironmentVariableW
0x428110 ExpandEnvironmentStringsW
0x428114 GetTempPathW
0x428118 MoveFileExW
0x42811c GetLocaleInfoW
0x428120 GetTimeFormatW
0x428124 GetDateFormatW
0x428128 GetNumberFormatW
0x42812c SetFilePointerEx
0x428130 GetConsoleMode
0x428134 GetConsoleCP
0x428138 HeapSize
0x42813c SetStdHandle
0x428140 GetProcessHeap
0x428144 RaiseException
0x428148 GetSystemInfo
0x42814c VirtualProtect
0x428150 VirtualQuery
0x428154 LoadLibraryExA
0x428158 IsProcessorFeaturePresent
0x42815c IsDebuggerPresent
0x428160 UnhandledExceptionFilter
0x428164 SetUnhandledExceptionFilter
0x428168 GetStartupInfoW
0x42816c QueryPerformanceCounter
0x428170 GetCurrentThreadId
0x428174 GetSystemTimeAsFileTime
0x428178 InitializeSListHead
0x42817c GetCurrentProcess
0x428180 TerminateProcess
0x428184 RtlUnwind
0x428188 EncodePointer
0x42818c EnterCriticalSection
0x428190 LeaveCriticalSection
0x428194 DeleteCriticalSection
0x428198 InitializeCriticalSectionAndSpinCount
0x42819c TlsAlloc
0x4281a0 TlsGetValue
0x4281a4 TlsSetValue
0x4281a8 TlsFree
0x4281ac LoadLibraryExW
0x4281b0 QueryPerformanceFrequency
0x4281b4 GetModuleHandleExW
0x4281b8 GetModuleFileNameA
0x4281bc GetACP
0x4281c0 HeapFree
0x4281c4 HeapAlloc
0x4281c8 HeapReAlloc
0x4281cc GetStringTypeW
0x4281d0 LCMapStringW
0x4281d4 FindFirstFileExA
0x4281d8 FindNextFileA
0x4281dc IsValidCodePage
0x4281e0 GetOEMCP
0x4281e4 GetCommandLineA
0x4281e8 GetEnvironmentStringsW
0x4281ec FreeEnvironmentStringsW
0x4281f0 DecodePointer
gdiplus.dll
0x4281f8 GdiplusShutdown
0x4281fc GdiplusStartup
0x428200 GdipCreateHBITMAPFromBitmap
0x428204 GdipCreateBitmapFromStreamICM
0x428208 GdipCreateBitmapFromStream
0x42820c GdipDisposeImage
0x428210 GdipCloneImage
0x428214 GdipFree
0x428218 GdipAlloc
EAT(Export Address Table) Library