Report - customer50.exe

ASPack Malicious Library UPX PE64 PE File OS Processor Check
ScreenShot
Created 2021.10.18 09:36 Machine s1_win7_x6401
Filename customer50.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
4
Behavior Score
4.2
ZERO API file : clean
VT API (file) 39 detected (malicious, high confidence, Cerbu, Fabookie, Artemis, Unsafe, Spyagent, Tazd, noname@0, wqvta, ai score=100, kcloud, score, R445766, R002C0DJG21, FBAdsCard, CLASSIC)
md5 5fc5f085acfa0071db7d7ecaca696650
sha256 9d35a2153846ecea71060d69014279cb526f8b432913d02759c5023a81c62d59
ssdeep 24576:nkg6rJg7+sAKWHUUuxRfAmBJOQEhP4v4qLq/nbFtU+a1Svk7t:nulgSsAtHUdTzOQoP0Lq/xh9vkZ
imphash a760781485268ad462242975d68411d5
impfuzzy 96:PQJd+pvvu7n6BF1UFpXlmWtQWcg0v+05K3MoCjc:2uu7YFaF+5mzzCjc
  Network IP location

Signature (11cnts)

Level Description
danger File has been identified by 39 AntiVirus engines on VirusTotal as malicious
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Looks up the external IP address
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (7cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://staticimg.youtuuee.com/api/fbtime LV ENZUINC 45.136.151.102 6464 mailcious
http://staticimg.youtuuee.com/api/?sid=669873&key=a53835fb03e9db9fd734c3e314bbcc07 LV ENZUINC 45.136.151.102 5258 mailcious
http://ip-api.com/json/ US TUT-AS 208.95.112.1 clean
ip-api.com US TUT-AS 208.95.112.1 clean
staticimg.youtuuee.com LV ENZUINC 45.136.151.102 mailcious
45.136.151.102 LV ENZUINC 45.136.151.102 mailcious
208.95.112.1 US TUT-AS 208.95.112.1 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140106038 AreFileApisANSI
 0x140106040 ReadFile
 0x140106048 TryEnterCriticalSection
 0x140106050 HeapCreate
 0x140106058 HeapFree
 0x140106060 EnterCriticalSection
 0x140106068 GetFullPathNameW
 0x140106070 WriteFile
 0x140106078 GetDiskFreeSpaceW
 0x140106080 LockFile
 0x140106088 LeaveCriticalSection
 0x140106090 InitializeCriticalSection
 0x140106098 SetFilePointer
 0x1401060a0 GetFullPathNameA
 0x1401060a8 SetEndOfFile
 0x1401060b0 UnlockFileEx
 0x1401060b8 GetTempPathW
 0x1401060c0 CreateMutexW
 0x1401060c8 WaitForSingleObject
 0x1401060d0 CreateFileW
 0x1401060d8 GetFileAttributesW
 0x1401060e0 GetCurrentThreadId
 0x1401060e8 UnmapViewOfFile
 0x1401060f0 HeapValidate
 0x1401060f8 HeapSize
 0x140106100 MultiByteToWideChar
 0x140106108 GetTempPathA
 0x140106110 GetDiskFreeSpaceA
 0x140106118 GetFileAttributesA
 0x140106120 GetFileAttributesExW
 0x140106128 OutputDebugStringW
 0x140106130 CreateFileA
 0x140106138 LoadLibraryA
 0x140106140 WaitForSingleObjectEx
 0x140106148 DeleteFileA
 0x140106150 DeleteFileW
 0x140106158 HeapReAlloc
 0x140106160 CloseHandle
 0x140106168 GetSystemInfo
 0x140106170 LoadLibraryW
 0x140106178 HeapAlloc
 0x140106180 HeapCompact
 0x140106188 HeapDestroy
 0x140106190 UnlockFile
 0x140106198 GetProcAddress
 0x1401061a0 LocalFree
 0x1401061a8 LockFileEx
 0x1401061b0 GetFileSize
 0x1401061b8 DeleteCriticalSection
 0x1401061c0 GetCurrentProcessId
 0x1401061c8 GetProcessHeap
 0x1401061d0 SystemTimeToFileTime
 0x1401061d8 FreeLibrary
 0x1401061e0 WideCharToMultiByte
 0x1401061e8 GetSystemTimeAsFileTime
 0x1401061f0 GetSystemTime
 0x1401061f8 FormatMessageA
 0x140106200 CreateFileMappingW
 0x140106208 MapViewOfFile
 0x140106210 QueryPerformanceCounter
 0x140106218 GetTickCount
 0x140106220 FlushFileBuffers
 0x140106228 lstrlenW
 0x140106230 FindResourceW
 0x140106238 LoadResource
 0x140106240 LockResource
 0x140106248 GetLastError
 0x140106250 Sleep
 0x140106258 CreateFileMappingA
 0x140106260 FormatMessageW
 0x140106268 GetStringTypeW
 0x140106270 CompareStringEx
 0x140106278 InitializeCriticalSectionEx
 0x140106280 EncodePointer
 0x140106288 DecodePointer
 0x140106290 LCMapStringEx
 0x140106298 GetCPInfo
 0x1401062a0 InitializeCriticalSectionAndSpinCount
 0x1401062a8 SetEvent
 0x1401062b0 ResetEvent
 0x1401062b8 CreateEventW
 0x1401062c0 GetModuleHandleW
 0x1401062c8 InitializeSListHead
 0x1401062d0 RtlCaptureContext
 0x1401062d8 RtlLookupFunctionEntry
 0x1401062e0 RtlVirtualUnwind
 0x1401062e8 IsDebuggerPresent
 0x1401062f0 UnhandledExceptionFilter
 0x1401062f8 SetUnhandledExceptionFilter
 0x140106300 GetStartupInfoW
 0x140106308 IsProcessorFeaturePresent
 0x140106310 GetCurrentProcess
 0x140106318 TerminateProcess
 0x140106320 SetLastError
 0x140106328 QueryPerformanceFrequency
 0x140106330 RtlUnwindEx
 0x140106338 InterlockedPushEntrySList
 0x140106340 RtlPcToFileHeader
 0x140106348 RaiseException
 0x140106350 TlsAlloc
 0x140106358 TlsGetValue
 0x140106360 TlsSetValue
 0x140106368 TlsFree
 0x140106370 LoadLibraryExW
 0x140106378 CreateThread
 0x140106380 ExitThread
 0x140106388 FreeLibraryAndExitThread
 0x140106390 GetModuleHandleExW
 0x140106398 ExitProcess
 0x1401063a0 GetModuleFileNameW
 0x1401063a8 GetStdHandle
 0x1401063b0 CompareStringW
 0x1401063b8 LCMapStringW
 0x1401063c0 GetLocaleInfoW
 0x1401063c8 IsValidLocale
 0x1401063d0 GetUserDefaultLCID
 0x1401063d8 EnumSystemLocalesW
 0x1401063e0 GetFileType
 0x1401063e8 GetTimeZoneInformation
 0x1401063f0 GetConsoleOutputCP
 0x1401063f8 GetConsoleMode
 0x140106400 GetFileSizeEx
 0x140106408 SetFilePointerEx
 0x140106410 ReadConsoleW
 0x140106418 FindClose
 0x140106420 FindFirstFileExW
 0x140106428 FindNextFileW
 0x140106430 IsValidCodePage
 0x140106438 GetACP
 0x140106440 GetOEMCP
 0x140106448 GetCommandLineA
 0x140106450 GetCommandLineW
 0x140106458 GetEnvironmentStringsW
 0x140106460 FreeEnvironmentStringsW
 0x140106468 SetEnvironmentVariableW
 0x140106470 SetStdHandle
 0x140106478 WriteConsoleW
 0x140106480 OutputDebugStringA
 0x140106488 SizeofResource
 0x140106490 RtlUnwind
ADVAPI32.dll
 0x140106000 RegCloseKey
 0x140106008 RegSetValueExW
 0x140106010 RegOpenKeyExW
 0x140106018 RegCreateKeyW
SHELL32.dll
 0x1401064a0 SHGetFolderPathW
WINHTTP.dll
 0x1401064b0 WinHttpQueryDataAvailable
 0x1401064b8 WinHttpConnect
 0x1401064c0 WinHttpReceiveResponse
 0x1401064c8 WinHttpOpen
 0x1401064d0 WinHttpAddRequestHeaders
 0x1401064d8 WinHttpQueryHeaders
 0x1401064e0 WinHttpReadData
 0x1401064e8 WinHttpOpenRequest
 0x1401064f0 WinHttpSetOption
 0x1401064f8 WinHttpCloseHandle
 0x140106500 WinHttpGetIEProxyConfigForCurrentUser
 0x140106508 WinHttpQueryAuthSchemes
 0x140106510 WinHttpGetProxyForUrl
 0x140106518 WinHttpSendRequest
 0x140106520 WinHttpSetCredentials
CRYPT32.dll
 0x140106028 CryptUnprotectData

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure