Report - babay.exe

UPX Malicious Library PE File PE32 OS Processor Check
ScreenShot
Created 2021.10.15 18:04 Machine s1_win7_x6402
Filename babay.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
5.8
ZERO API file : malware
VT API (file) 55 detected (AIDetect, malware2, malicious, high confidence, WebPick, Zusy, Dodiw, FCXS, Unsafe, Save, confidence, ZexaF, TuW@aifT5qbi, Eldorado, Fsysna, cewh, duviir, Cradle, RATX, Gencirc, BrowseFox, BAGZ, bhnec, BabylonRAT, uqiib, ASMalwS, score, R197218, ai score=85, PasswordStealer, CLASSIC, GenAsa, qQ7637zty1s, Static AI, Malicious PE, 100%, Genetic, susgen)
md5 1f67cc3aee307cde9e5102d372f9b87e
sha256 8618bf549fe77b12325caeac35e24857145cba568d740c191a5850e2cc2c3960
ssdeep 12288:8qzcpVgUXzL0TTUKZHTNloEkOpnKgofuIwV6eAj0wZxxXMcEe/3paPcgrX:8qzcpKIL0TvZzNlNky0wVW0wZxxVgrX
imphash 2cbe6db2ec1d8a931b50336af1a7dc15
impfuzzy 96:9VftCPsajgFBCuQC/KK3xc8fZhVLarbmiMXHg5h1kKn0mQyKgbR:9dkPsajgLf13t8EHg5hFnlQ49
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
warning Generates some ICMP traffic
watch Communicates with host for which no DNS query was performed
watch Creates a windows hook that monitors keyboard input (keylogger)
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Checks whether any human activity is being performed by constantly checking whether the foreground window changed

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
deli.mywire.org TR Vodafone Net Iletisim Hizmetleri Anonim Sirketi 176.216.222.110 mailcious
176.216.222.110 TR Vodafone Net Iletisim Hizmetleri Anonim Sirketi 176.216.222.110 mailcious
125.253.92.50 AU FireNet Pty Ltd 125.253.92.50 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x48307c IsWow64Process
 0x483080 GetLocaleInfoW
 0x483084 CreateProcessW
 0x483088 GetFileSize
 0x48308c WriteFile
 0x483090 ReadFile
 0x483094 GetSystemDirectoryA
 0x483098 CreateFileA
 0x48309c SetFileAttributesA
 0x4830a0 lstrcmpW
 0x4830a4 lstrlenW
 0x4830a8 GetModuleFileNameW
 0x4830ac GetTempFileNameW
 0x4830b0 RemoveDirectoryW
 0x4830b4 SetFileAttributesW
 0x4830b8 GetFileAttributesW
 0x4830bc DeleteFileW
 0x4830c0 CopyFileW
 0x4830c4 MoveFileW
 0x4830c8 MoveFileExW
 0x4830cc GetCurrentProcessId
 0x4830d0 GetVersionExW
 0x4830d4 GetExitCodeProcess
 0x4830d8 CreatePipe
 0x4830dc PeekNamedPipe
 0x4830e0 GetStartupInfoW
 0x4830e4 DeleteFileA
 0x4830e8 AreFileApisANSI
 0x4830ec GetSystemTime
 0x4830f0 LocalFree
 0x4830f4 GetTempPathA
 0x4830f8 GetVersionExA
 0x4830fc OutputDebugStringA
 0x483100 GetFileAttributesExW
 0x483104 GetDiskFreeSpaceA
 0x483108 CreateFileMappingW
 0x48310c CreateFileMappingA
 0x483110 GetDiskFreeSpaceW
 0x483114 LockFileEx
 0x483118 HeapSize
 0x48311c GetLastError
 0x483120 FlushFileBuffers
 0x483124 CreateFileW
 0x483128 HeapValidate
 0x48312c HeapCreate
 0x483130 HeapDestroy
 0x483134 FormatMessageW
 0x483138 FormatMessageA
 0x48313c GetSystemTimeAsFileTime
 0x483140 GetProcessHeap
 0x483144 UnlockFileEx
 0x483148 GetTickCount
 0x48314c OutputDebugStringW
 0x483150 WaitForSingleObjectEx
 0x483154 LockFile
 0x483158 FlushViewOfFile
 0x48315c UnlockFile
 0x483160 InterlockedCompareExchange
 0x483164 WaitForSingleObject
 0x483168 HeapFree
 0x48316c QueryPerformanceCounter
 0x483170 SystemTimeToFileTime
 0x483174 HeapAlloc
 0x483178 FreeLibrary
 0x48317c SetEndOfFile
 0x483180 UnmapViewOfFile
 0x483184 MapViewOfFile
 0x483188 ResetEvent
 0x48318c HeapCompact
 0x483190 GetTempPathW
 0x483194 HeapReAlloc
 0x483198 GetFullPathNameA
 0x48319c GetFullPathNameW
 0x4831a0 GetCurrentThreadId
 0x4831a4 TryEnterCriticalSection
 0x4831a8 GetCurrentProcess
 0x4831ac SetErrorMode
 0x4831b0 GetCommandLineW
 0x4831b4 GetCurrentDirectoryW
 0x4831b8 SetSystemPowerState
 0x4831bc OpenMutexW
 0x4831c0 GlobalAlloc
 0x4831c4 GlobalFree
 0x4831c8 InterlockedDecrement
 0x4831cc lstrcpyW
 0x4831d0 GetComputerNameW
 0x4831d4 GetLogicalDrives
 0x4831d8 GetFileSizeEx
 0x4831dc FindClose
 0x4831e0 SystemTimeToTzSpecificLocalTime
 0x4831e4 FileTimeToSystemTime
 0x4831e8 GetDriveTypeW
 0x4831ec GetDiskFreeSpaceExW
 0x4831f0 FindFirstFileW
 0x4831f4 FindNextFileW
 0x4831f8 SetEvent
 0x4831fc DeleteCriticalSection
 0x483200 LeaveCriticalSection
 0x483204 WriteConsoleW
 0x483208 SetStdHandle
 0x48320c FreeEnvironmentStringsW
 0x483210 GetEnvironmentStringsW
 0x483214 GetModuleFileNameA
 0x483218 GetTimeZoneInformation
 0x48321c GetConsoleCP
 0x483220 GetFileType
 0x483224 SetFilePointerEx
 0x483228 ReadConsoleW
 0x48322c GetConsoleMode
 0x483230 SetEnvironmentVariableW
 0x483234 SetEnvironmentVariableA
 0x483238 GetStdHandle
 0x48323c GetOEMCP
 0x483240 GetACP
 0x483244 IsValidCodePage
 0x483248 GetModuleHandleExW
 0x48324c ExitProcess
 0x483250 EnumSystemLocalesW
 0x483254 GetUserDefaultLCID
 0x483258 IsValidLocale
 0x48325c LCMapStringW
 0x483260 CompareStringW
 0x483264 GetTimeFormatW
 0x483268 GetDateFormatW
 0x48326c TlsFree
 0x483270 EnterCriticalSection
 0x483274 TlsSetValue
 0x483278 TlsGetValue
 0x48327c TlsAlloc
 0x483280 InitializeCriticalSectionAndSpinCount
 0x483284 SetLastError
 0x483288 SetUnhandledExceptionFilter
 0x48328c UnhandledExceptionFilter
 0x483290 GetCPInfo
 0x483294 LoadLibraryW
 0x483298 GetNativeSystemInfo
 0x48329c GetSystemInfo
 0x4832a0 GlobalMemoryStatusEx
 0x4832a4 Process32NextW
 0x4832a8 Process32FirstW
 0x4832ac CreateDirectoryW
 0x4832b0 GetLocalTime
 0x4832b4 GlobalUnlock
 0x4832b8 GlobalLock
 0x4832bc CreateEventW
 0x4832c0 CreateMutexW
 0x4832c4 Sleep
 0x4832c8 InitializeCriticalSection
 0x4832cc GetModuleHandleW
 0x4832d0 ResumeThread
 0x4832d4 TerminateThread
 0x4832d8 CreateThread
 0x4832dc Process32Next
 0x4832e0 Process32First
 0x4832e4 CreateToolhelp32Snapshot
 0x4832e8 WideCharToMultiByte
 0x4832ec MultiByteToWideChar
 0x4832f0 GetPrivateProfileSectionNamesA
 0x4832f4 GetPrivateProfileStringA
 0x4832f8 LoadLibraryA
 0x4832fc CloseHandle
 0x483300 TerminateProcess
 0x483304 OpenProcess
 0x483308 GetProcAddress
 0x48330c GetFileAttributesA
 0x483310 lstrlenA
 0x483314 lstrcatA
 0x483318 SetFilePointer
 0x48331c GetCommandLineA
 0x483320 LoadLibraryExW
 0x483324 ExitThread
 0x483328 IsProcessorFeaturePresent
 0x48332c IsDebuggerPresent
 0x483330 RtlUnwind
 0x483334 RaiseException
 0x483338 GetStringTypeW
 0x48333c DecodePointer
 0x483340 EncodePointer
USER32.dll
 0x4833a8 LoadIconW
 0x4833ac wsprintfW
 0x4833b0 OpenClipboard
 0x4833b4 CloseClipboard
 0x4833b8 GetClipboardData
 0x4833bc GetForegroundWindow
 0x4833c0 GetWindowThreadProcessId
 0x4833c4 ToUnicodeEx
 0x4833c8 GetKeyboardLayout
 0x4833cc GetKeyboardState
 0x4833d0 CharUpperW
 0x4833d4 GetKeyState
 0x4833d8 LoadCursorW
 0x4833dc UnhookWindowsHookEx
 0x4833e0 CallNextHookEx
 0x4833e4 ExitWindowsEx
 0x4833e8 GetLastInputInfo
 0x4833ec GetWindowRect
 0x4833f0 SendInput
 0x4833f4 GetSystemMetrics
 0x4833f8 GetDC
 0x4833fc ReleaseDC
 0x483400 GetClientRect
 0x483404 SetCursorPos
 0x483408 GetWindowTextLengthW
 0x48340c GetWindowTextW
 0x483410 SetWindowTextW
 0x483414 UpdateWindow
 0x483418 FlashWindowEx
 0x48341c ShowWindow
 0x483420 CreateWindowExW
 0x483424 EnumDisplaySettingsW
 0x483428 EnumDisplayDevicesW
 0x48342c GetDesktopWindow
 0x483430 RegisterClassExW
 0x483434 PostQuitMessage
 0x483438 DefWindowProcW
 0x48343c SendMessageW
 0x483440 DispatchMessageW
 0x483444 TranslateMessage
 0x483448 GetMessageW
 0x48344c SetWindowsHookExW
GDI32.dll
 0x483048 SetStretchBltMode
 0x48304c StretchBlt
 0x483050 SelectObject
 0x483054 GetDIBits
 0x483058 DeleteObject
 0x48305c CreateCompatibleDC
 0x483060 CreateCompatibleBitmap
 0x483064 SetTextColor
 0x483068 SetBkColor
 0x48306c GetStockObject
 0x483070 CreateFontW
 0x483074 GetObjectW
ADVAPI32.dll
 0x483000 LookupPrivilegeValueW
 0x483004 AdjustTokenPrivileges
 0x483008 OpenProcessToken
 0x48300c RegSetValueExW
 0x483010 RegDeleteValueW
 0x483014 RegCreateKeyW
 0x483018 RegQueryValueExW
 0x48301c RegOpenKeyExW
 0x483020 GetUserNameW
 0x483024 RegOpenKeyExA
 0x483028 RegQueryValueExA
 0x48302c RegCloseKey
SHELL32.dll
 0x48337c SHGetFileInfoW
 0x483380 SHGetFolderPathW
 0x483384 ShellExecuteW
 0x483388 SHGetKnownFolderPath
 0x48338c SHFileOperationW
 0x483390 CommandLineToArgvW
 0x483394 SHGetFolderPathA
ole32.dll
 0x4834d4 CoInitializeSecurity
 0x4834d8 CoSetProxyBlanket
 0x4834dc CoInitializeEx
 0x4834e0 CoTaskMemFree
 0x4834e4 CoCreateInstance
 0x4834e8 CoInitialize
 0x4834ec CoUninitialize
OLEAUT32.dll
 0x483354 SysAllocString
 0x483358 SysFreeString
 0x48335c VariantClear
 0x483360 VariantInit
SHLWAPI.dll
 0x48339c None
 0x4833a0 SHGetValueA
CRYPT32.dll
 0x48303c CryptStringToBinaryA
 0x483040 CryptUnprotectData
NETAPI32.dll
 0x483348 NetApiBufferFree
 0x48334c NetUserEnum
urlmon.dll
 0x4834f4 URLDownloadToFileW
gdiplus.dll
 0x483490 GdipFree
 0x483494 GdiplusShutdown
 0x483498 GdipCloneImage
 0x48349c GdipCreateBitmapFromGdiDib
 0x4834a0 GdipSaveImageToStream
 0x4834a4 GdipDisposeImage
 0x4834a8 GdiplusStartup
 0x4834ac GdipGetImageEncoders
 0x4834b0 GdipGetImageEncodersSize
 0x4834b4 GdipBitmapUnlockBits
 0x4834b8 GdipBitmapLockBits
 0x4834bc GdipCreateBitmapFromStream
 0x4834c0 GdipGetImagePixelFormat
 0x4834c4 GdipGetImageHeight
 0x4834c8 GdipGetImageWidth
 0x4834cc GdipAlloc
WS2_32.dll
 0x483454 WSAStartup
 0x483458 connect
 0x48345c ioctlsocket
 0x483460 inet_ntop
 0x483464 inet_pton
 0x483468 FreeAddrInfoW
 0x48346c GetAddrInfoW
 0x483470 WSACleanup
 0x483474 closesocket
 0x483478 htons
 0x48347c sendto
 0x483480 socket
 0x483484 send
 0x483488 recv
PSAPI.DLL
 0x483370 GetModuleFileNameExW
 0x483374 GetModuleBaseNameW
POWRPROF.dll
 0x483368 SetSuspendState
COMCTL32.dll
 0x483034 InitCommonControlsEx

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure