Report - RemoteCMD - 3.0.exe

Gen2 Generic Malware ASPack Antivirus Malicious Library UPX PE File PE32
ScreenShot
Created 2021.10.19 16:34 Machine s1_win7_x6402
Filename RemoteCMD - 3.0.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
3
Behavior Score
1.4
ZERO API file : clean
VT API (file) 10 detected (Unsafe, Malicious, Startpage, Static AI, Malicious PE, susgen, Qhost, Generic@ML, RDML, fH0Z+nop2, TfTUzyz6Lqzw, GenAsa, hKRyaSzRsss)
md5 70ca048c47aa97e95e1ea36ce2514ac3
sha256 db68cb9d5b34c56286f68eb5e15966b5007d31de8f35b707e1ecfcee2bad4ca5
ssdeep 6144:cQB8OWua/aK/sFf9aTlSNbaBm/skZfNr4vbQ5:TB854K/XlS9aY/smfNr4TQ5
imphash 13e953e43b1ead41787b74c3178fc208
impfuzzy 48:tWIjNQZdhkOqXvprzDvh6U04u0Lkyl5pRvVSv//25Q30LzZLd:tWIpw/kfXd4n0LzZLd
  Network IP location

Signature (4cnts)

Level Description
watch File has been identified by 10 AntiVirus engines on VirusTotal as malicious
notice Creates executable files on the filesystem
info Command line console output was observed
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (12cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

SHLWAPI.dll
 0x41114c StrStrA
 0x411150 StrStrIA
 0x411154 StrChrA
KERNEL32.dll
 0x411018 lstrcmpA
 0x41101c AllocConsole
 0x411020 GetStdHandle
 0x411024 WriteFile
 0x411028 WriteConsoleA
 0x41102c ReadFile
 0x411030 ReadConsoleA
 0x411034 MultiByteToWideChar
 0x411038 HeapFree
 0x41103c lstrcmpiA
 0x411040 WideCharToMultiByte
 0x411044 HeapAlloc
 0x411048 SetConsoleMode
 0x41104c GetConsoleMode
 0x411050 GetLastError
 0x411054 GetModuleFileNameA
 0x411058 ExitProcess
 0x41105c Sleep
 0x411060 CreateThread
 0x411064 GetTimeFormatA
 0x411068 CloseHandle
 0x41106c CreateFileA
 0x411070 SizeofResource
 0x411074 LockResource
 0x411078 LoadResource
 0x41107c FindResourceA
 0x411080 lstrlenA
 0x411084 GetFileAttributesA
 0x411088 GetSystemDefaultLCID
 0x41108c GetModuleHandleA
 0x411090 ReadConsoleInputA
 0x411094 lstrcatA
 0x411098 WaitForSingleObject
 0x41109c SetConsoleCursorPosition
 0x4110a0 FillConsoleOutputCharacterA
 0x4110a4 GetConsoleScreenBufferInfo
 0x4110a8 PeekNamedPipe
 0x4110ac lstrlenW
 0x4110b0 CreateProcessA
 0x4110b4 DuplicateHandle
 0x4110b8 GetCurrentProcess
 0x4110bc CreatePipe
 0x4110c0 GetVersion
 0x4110c4 GetExitCodeProcess
 0x4110c8 TerminateProcess
 0x4110cc GetTickCount
 0x4110d0 SetCurrentDirectoryA
 0x4110d4 DeleteFileA
 0x4110d8 ExpandEnvironmentStringsA
 0x4110dc GetCurrentDirectoryA
 0x4110e0 lstrcpyA
 0x4110e4 lstrcmpW
 0x4110e8 GetCommandLineA
 0x4110ec GetProcessHeap
 0x4110f0 RemoveDirectoryA
 0x4110f4 lstrcatW
 0x4110f8 CreateDirectoryA
 0x4110fc GetTempPathA
USER32.dll
 0x41115c GetDesktopWindow
 0x411160 CharLowerA
 0x411164 IsCharAlphaNumericA
 0x411168 GetParent
 0x41116c DialogBoxParamA
 0x411170 CharToOemA
 0x411174 MessageBoxA
 0x411178 GetForegroundWindow
 0x41117c GetWindowRect
 0x411180 CopyRect
 0x411184 OffsetRect
 0x411188 SetWindowPos
 0x41118c LoadStringA
 0x411190 SetDlgItemTextA
 0x411194 GetDlgItem
 0x411198 SetFocus
 0x41119c GetDlgItemTextA
 0x4111a0 EndDialog
 0x4111a4 wsprintfA
ADVAPI32.dll
 0x411000 RegQueryValueExA
 0x411004 RegCloseKey
 0x411008 RegEnumKeyExA
 0x41100c RegOpenKeyExA
 0x411010 RegQueryValueExW
ole32.dll
 0x4111ac CoUninitialize
 0x4111b0 CoGetObject
 0x4111b4 CLSIDFromProgID
 0x4111b8 CoCreateInstance
 0x4111bc CoInitialize
OLEAUT32.dll
 0x411104 VariantTimeToSystemTime
 0x411108 VarBstrFromCy
 0x41110c VarBstrFromR4
 0x411110 VarBstrFromR8
 0x411114 VarBstrFromDec
 0x411118 SafeArrayUnaccessData
 0x41111c LoadTypeLib
 0x411120 SysFreeString
 0x411124 VariantInit
 0x411128 SysAllocString
 0x41112c DispInvoke
 0x411130 DispGetIDsOfNames
 0x411134 SafeArrayGetUBound
 0x411138 SafeArrayGetLBound
 0x41113c SafeArrayGetDim
 0x411140 SysStringLen
 0x411144 SafeArrayAccessData

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure