Report - 23ce6573d0b61d1c6b7a3a8c1cdf07b2.exe

Malicious Library UPX PE File OS Processor Check PE32
ScreenShot
Created 2021.11.05 09:08 Machine s1_win7_x6401
Filename 23ce6573d0b61d1c6b7a3a8c1cdf07b2.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
6
Behavior Score
2.0
ZERO API file : clean
VT API (file) 39 detected (Mokes, Siggen15, FPEC, Attribute, HighConfidence, R06BC0PK321, miqkw, kcloud, Phonzy, Malicious, score, Wacatac, Unsafe, PossibleThreat, GdSda)
md5 ad0b9bd8cdaba862d346e9cd551f381f
sha256 e852926791745a6ded438269c590cf206746c924f38a1689af277a81a6412f96
ssdeep 768:x+AugrSlcnSGbUR2aBUb4yOKMnGeEDETh6i8Xwkvqh/m8HszbSaOgNB3tXDjU:x+zO5ni2aB3yOK4MM6NgkU/m8HkRtXHU
imphash 0ecf48e8c76f506e2b4eaafb33f4f2b8
impfuzzy 24:s1DS2qyOovnGMZtfjFQHRyvDh/J3aRT4Rf4pB3T3wxGcEKEQ+8X:HdlpMZtfbDjWcRfAmMfPq
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 39 AntiVirus engines on VirusTotal as malicious
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Performs some HTTP requests
info Checks amount of memory in system

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://apps.identrust.com/roots/dstrootcax3.p7c US CCCH-3 23.216.159.81 clean
apps.identrust.com US CCCH-3 23.216.159.81 clean
t.gogamec.com US CLOUDFLARENET 172.67.204.112 clean
96.16.99.43 US Akamai International B.V. 96.16.99.43 clean
172.67.204.112 US CLOUDFLARENET 172.67.204.112 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40d000 InterlockedDecrement
 0x40d004 GetModuleHandleW
 0x40d008 WriteFile
 0x40d00c Sleep
 0x40d010 GetProcAddress
 0x40d014 GetStringTypeW
 0x40d018 GetStringTypeA
 0x40d01c LCMapStringW
 0x40d020 LCMapStringA
 0x40d024 GetLocaleInfoA
 0x40d028 GetOEMCP
 0x40d02c GetLastError
 0x40d030 MultiByteToWideChar
 0x40d034 lstrlenA
 0x40d038 WideCharToMultiByte
 0x40d03c LocalFree
 0x40d040 GetCommandLineA
 0x40d044 HeapFree
 0x40d048 GetVersionExA
 0x40d04c HeapAlloc
 0x40d050 GetProcessHeap
 0x40d054 RtlUnwind
 0x40d058 RaiseException
 0x40d05c TerminateProcess
 0x40d060 GetCurrentProcess
 0x40d064 UnhandledExceptionFilter
 0x40d068 SetUnhandledExceptionFilter
 0x40d06c IsDebuggerPresent
 0x40d070 GetModuleHandleA
 0x40d074 ExitProcess
 0x40d078 GetStdHandle
 0x40d07c GetModuleFileNameA
 0x40d080 FreeEnvironmentStringsA
 0x40d084 GetEnvironmentStrings
 0x40d088 FreeEnvironmentStringsW
 0x40d08c GetEnvironmentStringsW
 0x40d090 SetHandleCount
 0x40d094 GetFileType
 0x40d098 GetStartupInfoA
 0x40d09c DeleteCriticalSection
 0x40d0a0 TlsGetValue
 0x40d0a4 TlsAlloc
 0x40d0a8 TlsSetValue
 0x40d0ac TlsFree
 0x40d0b0 InterlockedIncrement
 0x40d0b4 SetLastError
 0x40d0b8 GetCurrentThreadId
 0x40d0bc HeapDestroy
 0x40d0c0 HeapCreate
 0x40d0c4 VirtualFree
 0x40d0c8 QueryPerformanceCounter
 0x40d0cc GetTickCount
 0x40d0d0 GetCurrentProcessId
 0x40d0d4 GetSystemTimeAsFileTime
 0x40d0d8 LeaveCriticalSection
 0x40d0dc EnterCriticalSection
 0x40d0e0 VirtualAlloc
 0x40d0e4 HeapReAlloc
 0x40d0e8 HeapSize
 0x40d0ec LoadLibraryA
 0x40d0f0 InitializeCriticalSection
 0x40d0f4 GetCPInfo
 0x40d0f8 GetACP
ole32.dll
 0x40d134 CoInitializeSecurity
 0x40d138 CoSetProxyBlanket
 0x40d13c CoCreateInstance
OLEAUT32.dll
 0x40d100 SafeArrayGetUBound
 0x40d104 SysFreeString
 0x40d108 SysStringByteLen
 0x40d10c SafeArrayUnaccessData
 0x40d110 SafeArrayGetDim
 0x40d114 VariantInit
 0x40d118 SysAllocStringByteLen
 0x40d11c SafeArrayAccessData
 0x40d120 VariantClear
 0x40d124 SafeArrayGetLBound
 0x40d128 SysAllocString
 0x40d12c GetErrorInfo

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure