Report - Svchost.exe

PE File PE32
ScreenShot
Created 2021.11.11 12:48 Machine s1_win7_x6401
Filename Svchost.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
7
Behavior Score
2.4
ZERO API file : clean
VT API (file) 32 detected (AIDetect, malware2, malicious, high confidence, Fragtor, MachineLearning, Anomalous, 100%, ZexaF, nL0@aGDW4mki, Eldorado, Attribute, HighConfidence, Kryptik, HNCG, PWSX, MultiPlug, Static AI, Malicious PE, Krypt, score, R447594, Unsafe, ai score=82)
md5 954cb27a8b7a8022163bf0855e9dc1da
sha256 cdb4e3529f2cc4a1c9be0fc3da007e011f2cdd275aca1c8639cd682c9116f8c3
ssdeep 24576:tOSb5hndv5nLTaxQzYO/McICSlKp3uJhcH1S60D2DU:hrdhf8KMc3McQW0TT
imphash ca2428f95da32f90e7651228c28ff6a1
impfuzzy 24:+azz2kfCejrOov1lDIcLVbjIX53Qr9WzOqdQGMZO:FHfCCaVc54XlhzOqdQGJ
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Resolves a suspicious Top Level Domain (TLD)
notice The binary likely contains encrypted or compressed data indicative of a packer
info Collects information to fingerprint the system (MachineGuid

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
t.me GB Telegram Messenger Inc 149.154.167.99 clean
telegin.top Unknown clean
telegka.top Unknown clean
149.154.167.99 GB Telegram Messenger Inc 149.154.167.99 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.DLL
 0x674180 AdjustTokenPrivileges
 0x674184 GetUserNameW
 0x674188 LookupPrivilegeValueW
 0x67418c OpenProcessToken
GDI32.dll
 0x674194 CreateFontIndirectW
 0x674198 SetBkMode
 0x67419c SetTextColor
KERNEL32.dll
 0x6741a4 CreateThread
 0x6741a8 DeleteCriticalSection
 0x6741ac EnterCriticalSection
 0x6741b0 ExitProcess
 0x6741b4 FindClose
 0x6741b8 FindFirstFileA
 0x6741bc FindNextFileA
 0x6741c0 FreeLibrary
 0x6741c4 GetCommandLineA
 0x6741c8 GetLastError
 0x6741cc GetModuleHandleA
 0x6741d0 GetProcAddress
 0x6741d4 InitializeCriticalSection
 0x6741d8 LeaveCriticalSection
 0x6741dc LoadLibraryA
 0x6741e0 SetUnhandledExceptionFilter
 0x6741e4 TlsGetValue
 0x6741e8 VirtualProtect
 0x6741ec VirtualQuery
 0x6741f0 WaitForSingleObject
 0x6741f4 lstrlenA
msvcrt.dll
 0x6741fc _strdup
 0x674200 _stricoll
msvcrt.dll
 0x674208 __getmainargs
 0x67420c __mb_cur_max
 0x674210 __p__environ
 0x674214 __p__fmode
 0x674218 __set_app_type
 0x67421c _cexit
 0x674220 _errno
 0x674224 _fpreset
 0x674228 _fullpath
 0x67422c _iob
 0x674230 _isctype
 0x674234 _onexit
 0x674238 _pctype
 0x67423c _setmode
 0x674240 _strdup
 0x674244 abort
 0x674248 atexit
 0x67424c calloc
 0x674250 free
 0x674254 fwrite
 0x674258 malloc
 0x67425c mbstowcs
 0x674260 memcpy
 0x674264 realloc
 0x674268 setlocale
 0x67426c signal
 0x674270 strcoll
 0x674274 strlen
 0x674278 tolower
 0x67427c vfprintf
 0x674280 wcstombs

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure