Report - 1202120788.exe

Malicious Packer PE File PE32 JPEG Format
ScreenShot
Created 2021.10.26 09:25 Machine s1_win7_x6403
Filename 1202120788.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
7.0
ZERO API file : clean
VT API (file) 25 detected (malicious, high confidence, Unsafe, Save, confidence, ZexaF, yuW@aOfGKFci, Attribute, HighConfidence, GenKryptik, FMOK, ccmw, FileRepMetagen, Generic@ML, RDML, qqNYuXiQ1ilL0QgB4fSmQw, R + Mal, EncPk, Score, Sabsik, se28925, Static AI, Malicious PE)
md5 f6be182d94ecfa6172e27d254444e88f
sha256 72691413d7d918f8064667bd71ac58a8e53244a137670353f66a727b5cc456d5
ssdeep 6144:hMh/XLfepxkjkB/UUwoNQYzkQ2nGz7dwLcfeoZ3i222BKEKnkRv:uXLmpxkjkB/rN1zkQ2nGz7dWW0k
imphash f8446044d3827db30ca59c0186698c18
impfuzzy 6:dBJAEtwyRlb7GDMyFAiLiRgTA/En10J8SLby6ML:VAPqqDMyjLiOAM2J8SC/
  Network IP location

Signature (16cnts)

Level Description
warning File has been identified by 25 AntiVirus engines on VirusTotal as malicious
watch Attempts to identify installed AV products by installation directory
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice Uses Windows utilities for basic Windows functionality
info Command line console output was observed
info Queries for the computername

Rules (7cnts)

Level Name Description Collection
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info JPEG_Format_Zero JPEG Format binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.215.113.45/g4MbvE/index.php?scr=1 Unknown 185.215.113.45 clean
http://185.215.113.45/g4MbvE/index.php Unknown 185.215.113.45 clean
185.215.113.45 Unknown 185.215.113.45 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x457008 LoadLibraryA
 0x45700c VirtualAlloc
 0x457010 VirtualProtect
 0x457014 GetProcAddress
 0x457018 lstrlenA
 0x45701c lstrcatA
version.dll
 0x45703c VerInstallFileW
user32.dll
 0x457034 LoadKeyboardLayoutW
ole32.dll
 0x457024 HICON_UserUnmarshal
shell32.dll
 0x45702c StrRStrIW
GdiPlus.dll
 0x4660c6 GdipAddPathClosedCurve2

EAT(Export Address Table) Library

0x421e04 DllCanUnloadNow


Similarity measure (PE file only) - Checking for service failure