Report - Porcal4.exe

Gen2 Gen1 RAT Generic Malware Antivirus Malicious Library UPX ASPack Malicious Packer PE File OS Processor Check PE32 PNG Format DLL .NET DLL MSOffice File .NET EXE
ScreenShot
Created 2021.10.21 11:07 Machine s1_win7_x6403
Filename Porcal4.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
6.4
ZERO API file : malware
VT API (file) 8 detected (Chapak, Remcos, 7YHCVI, Artemis, PossibleThreat)
md5 27828516c38739491a3d20e733850aa5
sha256 2e8b750d6a8b14cff802d89ba55447014d63ffd4c5c711f36e900d6a9aff66df
ssdeep 196608:QL6ocnTV67JnbhUtuvbPORiE9Z1v8KMf4UUIHSMi:a6JnTE7Jn1UGW7v8HQsi
imphash 0748c08f838865e5d72743f7fd7e551e
impfuzzy 48:JO3cSpvEHEHQPbRxV95EU1rkrJiaZMxWBrYUPyxUZfO:J+cSpvEHEHQPLVnD1rkrExW5YUP3W
  Network IP location

Signature (17cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Deletes a large number of files from the system indicative of ransomware
watch Deletes executed files from disk
watch One or more of the buffers contains an embedded PE file
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice File has been identified by 8 AntiVirus engines on VirusTotal as malicious
notice One or more potentially interesting buffers were extracted
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (24cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch ASPack_Zero ASPack packed file binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info Is_DotNET_DLL (no description) binaries (download)
info Is_DotNET_EXE (no description) binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info PNG_Format_Zero PNG Format binaries (download)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)
info Win_Backdoor_AsyncRAT_Zero Win Backdoor AsyncRAT binaries (download)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
185.7.214.157 Unknown 185.7.214.157 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x585000 CreateFileW
 0x585004 CloseHandle
 0x585008 WriteFile
 0x58500c DeleteFileW
 0x585010 HeapDestroy
 0x585014 HeapSize
 0x585018 HeapReAlloc
 0x58501c HeapFree
 0x585020 HeapAlloc
 0x585024 GetProcessHeap
 0x585028 SizeofResource
 0x58502c LockResource
 0x585030 LoadResource
 0x585034 FindResourceW
 0x585038 FindResourceExW
 0x58503c RemoveDirectoryW
 0x585040 GetTempPathW
 0x585044 GetTempFileNameW
 0x585048 CreateDirectoryW
 0x58504c MoveFileW
 0x585050 GetLastError
 0x585054 EnterCriticalSection
 0x585058 LeaveCriticalSection
 0x58505c GetModuleFileNameW
 0x585060 DeleteCriticalSection
 0x585064 InitializeCriticalSectionAndSpinCount
 0x585068 GetCurrentThreadId
 0x58506c RaiseException
 0x585070 SetLastError
 0x585074 GlobalUnlock
 0x585078 GlobalLock
 0x58507c GlobalAlloc
 0x585080 MulDiv
 0x585084 lstrcmpW
 0x585088 CreateEventW
 0x58508c FindClose
 0x585090 FindFirstFileW
 0x585094 GetFullPathNameW
 0x585098 SetEvent
 0x58509c InitializeCriticalSection
 0x5850a0 lstrcpynW
 0x5850a4 WaitForSingleObject
 0x5850a8 CreateThread
 0x5850ac GetProcAddress
 0x5850b0 LoadLibraryExW
 0x5850b4 DecodePointer
 0x5850b8 Sleep
 0x5850bc GetDiskFreeSpaceExW
 0x5850c0 GetExitCodeThread
 0x5850c4 GetCurrentProcessId
 0x5850c8 FreeLibrary
 0x5850cc GetSystemDirectoryW
 0x5850d0 lstrlenW
 0x5850d4 VerifyVersionInfoW
 0x5850d8 VerSetConditionMask
 0x5850dc lstrcmpiW
 0x5850e0 GetModuleHandleW
 0x5850e4 LoadLibraryW
 0x5850e8 GetDriveTypeW
 0x5850ec CompareStringW
 0x5850f0 FindNextFileW
 0x5850f4 GetLogicalDriveStringsW
 0x5850f8 GetFileSize
 0x5850fc GetFileAttributesW
 0x585100 GetShortPathNameW
 0x585104 SetFileAttributesW
 0x585108 GetFileTime
 0x58510c CopyFileW
 0x585110 ReadFile
 0x585114 SetFilePointer
 0x585118 SystemTimeToFileTime
 0x58511c MultiByteToWideChar
 0x585120 WideCharToMultiByte
 0x585124 GetCurrentProcess
 0x585128 GetSystemInfo
 0x58512c WaitForMultipleObjects
 0x585130 VirtualProtect
 0x585134 VirtualQuery
 0x585138 LoadLibraryExA
 0x58513c GetStringTypeW
 0x585140 SetUnhandledExceptionFilter
 0x585144 FileTimeToSystemTime
 0x585148 GetEnvironmentVariableW
 0x58514c GetEnvironmentStringsW
 0x585150 FormatMessageW
 0x585154 LocalFree
 0x585158 InitializeCriticalSectionEx
 0x58515c LoadLibraryA
 0x585160 GetModuleFileNameA
 0x585164 GetCurrentThread
 0x585168 GetConsoleOutputCP
 0x58516c FlushFileBuffers
 0x585170 SetConsoleTextAttribute
 0x585174 GetStdHandle
 0x585178 GetConsoleScreenBufferInfo
 0x58517c OutputDebugStringW
 0x585180 CreateProcessW
 0x585184 GetExitCodeProcess
 0x585188 GetTickCount
 0x58518c GetCommandLineW
 0x585190 SetCurrentDirectoryW
 0x585194 SetEndOfFile
 0x585198 EnumResourceLanguagesW
 0x58519c GetLocaleInfoW
 0x5851a0 GetSystemDefaultLangID
 0x5851a4 GetUserDefaultLangID
 0x5851a8 GetWindowsDirectoryW
 0x5851ac GetSystemTime
 0x5851b0 GetDateFormatW
 0x5851b4 GetTimeFormatW
 0x5851b8 CreateToolhelp32Snapshot
 0x5851bc Process32FirstW
 0x5851c0 Process32NextW
 0x5851c4 ResetEvent
 0x5851c8 GlobalFree
 0x5851cc GetPrivateProfileStringW
 0x5851d0 GetPrivateProfileSectionNamesW
 0x5851d4 WritePrivateProfileStringW
 0x5851d8 GetLocalTime
 0x5851dc CreateNamedPipeW
 0x5851e0 ConnectNamedPipe
 0x5851e4 Wow64DisableWow64FsRedirection
 0x5851e8 Wow64RevertWow64FsRedirection
 0x5851ec IsWow64Process
 0x5851f0 TerminateThread
 0x5851f4 LocalAlloc
 0x5851f8 CompareFileTime
 0x5851fc CopyFileExW
 0x585200 OpenEventW
 0x585204 PeekNamedPipe
 0x585208 IsDebuggerPresent
 0x58520c EncodePointer
 0x585210 InitializeSListHead
 0x585214 InterlockedPopEntrySList
 0x585218 InterlockedPushEntrySList
 0x58521c FlushInstructionCache
 0x585220 IsProcessorFeaturePresent
 0x585224 VirtualAlloc
 0x585228 VirtualFree
 0x58522c QueryPerformanceCounter
 0x585230 QueryPerformanceFrequency
 0x585234 LCMapStringEx
 0x585238 GetSystemTimeAsFileTime
 0x58523c CompareStringEx
 0x585240 GetCPInfo
 0x585244 WaitForSingleObjectEx
 0x585248 UnhandledExceptionFilter
 0x58524c TerminateProcess
 0x585250 GetStartupInfoW
 0x585254 RtlUnwind
 0x585258 TlsAlloc
 0x58525c TlsGetValue
 0x585260 TlsSetValue
 0x585264 TlsFree
 0x585268 ExitProcess
 0x58526c GetModuleHandleExW
 0x585270 GetFileType
 0x585274 GetTimeZoneInformation
 0x585278 LCMapStringW
 0x58527c IsValidLocale
 0x585280 GetUserDefaultLCID
 0x585284 EnumSystemLocalesW
 0x585288 GetConsoleMode
 0x58528c IsValidCodePage
 0x585290 GetACP
 0x585294 GetOEMCP
 0x585298 GetFileSizeEx
 0x58529c SetFilePointerEx
 0x5852a0 FindFirstFileExW
 0x5852a4 GetCommandLineA
 0x5852a8 FreeEnvironmentStringsW
 0x5852ac SetEnvironmentVariableW
 0x5852b0 SetStdHandle
 0x5852b4 ReadConsoleW
 0x5852b8 WriteConsoleW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure