ScreenShot
Created | 2021.11.04 15:10 | Machine | s1_win7_x6403 |
Filename | ww_testLL_0211_single.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | |||
md5 | 8ac9ae1dd3a33406003c4456359a9db4 | ||
sha256 | 7890f85114dba72bfafa6dd4cca59d2ac030458e32136c3a5ce992469cc353bc | ||
ssdeep | 3072:DRt67jtKBIKViaBNa1wK9BOomGbV3gWph+l5/yyvcOGkXthDBzBAXL+laxX19551:+kBKia6QBOaV3PgNyyvcOGkXTDBzySlP | ||
imphash | 2c02c1999142edb52caad79376c81ce6 | ||
impfuzzy | 24:TCvNoXcD0aXFJBlgtX1rMYDc+i9rosvDSOovbO9Z2M9z:exXxKtX1rMmc+iZzJ3X |
Network IP location
Signature (32cnts)
Level | Description |
---|---|
danger | Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | Disables Windows Security features |
watch | Communicates with host for which no DNS query was performed |
watch | Installs itself for autorun at Windows startup |
watch | Network activity contains more than one unique useragent |
watch | Uses Sysinternals tools in order to add additional command line functionality |
notice | A process attempted to delay the analysis task. |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An executable file was downloaded by the processes ww_testll_0211_single.exe |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | Expresses interest in specific running processes |
notice | Foreign language identified in PE resource |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Looks up the external IP address |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Repeatedly searches for a not-found process |
notice | Searches running processes potentially to identify processes for sandbox evasion |
notice | Sends data using the HTTP POST Method |
notice | Steals private information from local Internet browsers |
notice | Uses Windows utilities for basic Windows functionality |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Collects information to fingerprint the system (MachineGuid |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
Rules (18cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | Win32_Trojan_Gen_1_0904B0_Zero | Win32 Trojan Emotet | binaries (download) |
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
watch | ASPack_Zero | ASPack packed file | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | Is_DotNET_EXE | (no description) | binaries (download) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | IsPE64 | (no description) | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | Win_Backdoor_AsyncRAT_Zero | Win Backdoor AsyncRAT | binaries (download) |
Network (67cnts) ?
Suricata ids
SURICATA Applayer Mismatch protocol both directions
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
ET POLICY PE EXE or DLL Windows file download HTTP
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET INFO TLS Handshake Failure
ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io)
ET INFO Packed Executable Download
ET POLICY External IP Lookup ip-api.com
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
ET POLICY PE EXE or DLL Windows file download HTTP
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET INFO TLS Handshake Failure
ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io)
ET INFO Packed Executable Download
ET POLICY External IP Lookup ip-api.com
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x423000 ReadFile
0x423004 GetCurrentProcess
0x423008 lstrcatA
0x42300c GetModuleHandleA
0x423010 SetCurrentDirectoryA
0x423014 GetModuleHandleExA
0x423018 CreateFileA
0x42301c lstrcpyA
0x423020 CloseHandle
0x423024 GetFileSize
0x423028 GetLastError
0x42302c GetProcAddress
0x423030 HeapFree
0x423034 WriteFile
0x423038 lstrlenA
0x42303c lstrcpynA
0x423040 WriteConsoleW
0x423044 QueryPerformanceCounter
0x423048 SetLastError
0x42304c InitializeCriticalSectionAndSpinCount
0x423050 TlsAlloc
0x423054 TlsGetValue
0x423058 TlsSetValue
0x42305c TlsFree
0x423060 GetSystemTimeAsFileTime
0x423064 GetModuleHandleW
0x423068 UnhandledExceptionFilter
0x42306c SetUnhandledExceptionFilter
0x423070 TerminateProcess
0x423074 IsProcessorFeaturePresent
0x423078 IsDebuggerPresent
0x42307c GetStartupInfoW
0x423080 GetCurrentProcessId
0x423084 GetCurrentThreadId
0x423088 InitializeSListHead
0x42308c RtlUnwind
0x423090 RaiseException
0x423094 EncodePointer
0x423098 EnterCriticalSection
0x42309c LeaveCriticalSection
0x4230a0 DeleteCriticalSection
0x4230a4 FreeLibrary
0x4230a8 LoadLibraryExW
0x4230ac ExitProcess
0x4230b0 GetModuleHandleExW
0x4230b4 GetModuleFileNameW
0x4230b8 GetStdHandle
0x4230bc SetFilePointerEx
0x4230c0 GetFileType
0x4230c4 HeapAlloc
0x4230c8 LCMapStringW
0x4230cc FindClose
0x4230d0 FindFirstFileExW
0x4230d4 FindNextFileW
0x4230d8 IsValidCodePage
0x4230dc GetACP
0x4230e0 GetOEMCP
0x4230e4 GetCPInfo
0x4230e8 GetCommandLineA
0x4230ec GetCommandLineW
0x4230f0 MultiByteToWideChar
0x4230f4 WideCharToMultiByte
0x4230f8 GetEnvironmentStringsW
0x4230fc FreeEnvironmentStringsW
0x423100 GetProcessHeap
0x423104 SetStdHandle
0x423108 GetStringTypeW
0x42310c GetConsoleMode
0x423110 FlushFileBuffers
0x423114 GetConsoleOutputCP
0x423118 HeapSize
0x42311c HeapReAlloc
0x423120 CreateFileW
0x423124 DecodePointer
EAT(Export Address Table) is none
KERNEL32.dll
0x423000 ReadFile
0x423004 GetCurrentProcess
0x423008 lstrcatA
0x42300c GetModuleHandleA
0x423010 SetCurrentDirectoryA
0x423014 GetModuleHandleExA
0x423018 CreateFileA
0x42301c lstrcpyA
0x423020 CloseHandle
0x423024 GetFileSize
0x423028 GetLastError
0x42302c GetProcAddress
0x423030 HeapFree
0x423034 WriteFile
0x423038 lstrlenA
0x42303c lstrcpynA
0x423040 WriteConsoleW
0x423044 QueryPerformanceCounter
0x423048 SetLastError
0x42304c InitializeCriticalSectionAndSpinCount
0x423050 TlsAlloc
0x423054 TlsGetValue
0x423058 TlsSetValue
0x42305c TlsFree
0x423060 GetSystemTimeAsFileTime
0x423064 GetModuleHandleW
0x423068 UnhandledExceptionFilter
0x42306c SetUnhandledExceptionFilter
0x423070 TerminateProcess
0x423074 IsProcessorFeaturePresent
0x423078 IsDebuggerPresent
0x42307c GetStartupInfoW
0x423080 GetCurrentProcessId
0x423084 GetCurrentThreadId
0x423088 InitializeSListHead
0x42308c RtlUnwind
0x423090 RaiseException
0x423094 EncodePointer
0x423098 EnterCriticalSection
0x42309c LeaveCriticalSection
0x4230a0 DeleteCriticalSection
0x4230a4 FreeLibrary
0x4230a8 LoadLibraryExW
0x4230ac ExitProcess
0x4230b0 GetModuleHandleExW
0x4230b4 GetModuleFileNameW
0x4230b8 GetStdHandle
0x4230bc SetFilePointerEx
0x4230c0 GetFileType
0x4230c4 HeapAlloc
0x4230c8 LCMapStringW
0x4230cc FindClose
0x4230d0 FindFirstFileExW
0x4230d4 FindNextFileW
0x4230d8 IsValidCodePage
0x4230dc GetACP
0x4230e0 GetOEMCP
0x4230e4 GetCPInfo
0x4230e8 GetCommandLineA
0x4230ec GetCommandLineW
0x4230f0 MultiByteToWideChar
0x4230f4 WideCharToMultiByte
0x4230f8 GetEnvironmentStringsW
0x4230fc FreeEnvironmentStringsW
0x423100 GetProcessHeap
0x423104 SetStdHandle
0x423108 GetStringTypeW
0x42310c GetConsoleMode
0x423110 FlushFileBuffers
0x423114 GetConsoleOutputCP
0x423118 HeapSize
0x42311c HeapReAlloc
0x423120 CreateFileW
0x423124 DecodePointer
EAT(Export Address Table) is none