Report - %e9%87%8d%e8%a6%81%e9%80%9a%e7%9f%a5%e9%99%84%e4%bb%b6-%e6%96%87%e4%bb%b6%e9%98%b2%e6%b3%84%e5%af%86%e8%87%aa%e6%9f%a5%e6%89%8b%e5%86%8c.doc.exe

Gen2 Gen1 Generic Malware Malicious Library UPX PE64 PE File DLL OS Processor Check .NET DLL
ScreenShot
Created 2021.11.12 08:08 Machine s1_win7_x6403
Filename %e9%87%8d%e8%a6%81%e9%80%9a%e7%9f%a5%e9%99%84%e4%bb%b6-%e6%96%87%e4%bb%b6%e9%98%b2%e6%b3%84%e5%af%86%e8%87%aa%e6%9f%a5%e6%89%8b%e5%86%8c.doc.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
5
Behavior Score
4.2
ZERO API file : clean
VT API (file) 5 detected (Artemis, Malicious, cobra, TrojanVeil, Abnores, R194594)
md5 c1e722db229bd6dd596663f6f08aa654
sha256 6b88286b240db5630c98d895fd188d079b4a88790dee601645afab7ae28cc578
ssdeep 98304:Laj1Fpo79rrN12R6qyBQPnRNJe1B+XK6bFfVJ9FevDYMeBFh5iFIRv2Vb81+KpI:Gpo7Rv2R67GRNJpHnedeR5U81+5
imphash a2c1f4d5eeaf95bdec6a6d4cd9f09091
impfuzzy 24:Ifr/2O9YOD1Eu97hDqncLLP8a0pu9denjcH95XGPxsZunE5d5oHqNKnZEw+:IfrZ93D1wcnLewJGpuunE5d5yqDH
  Network IP location

Signature (8cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice File has been identified by 5 AntiVirus engines on VirusTotal as malicious
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info One or more processes crashed

Rules (13cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
info Is_DotNET_DLL (no description) binaries (download)
info IsDLL (no description) binaries (download)
info IsPE64 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
101.35.100.211 Unknown 101.35.100.211 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x421404 CreateProcessW
 0x42140c DeleteCriticalSection
 0x421414 EnterCriticalSection
 0x42141c ExpandEnvironmentStringsW
 0x421424 FormatMessageA
 0x42142c GetCommandLineW
 0x421434 GetCurrentProcess
 0x42143c GetCurrentProcessId
 0x421444 GetCurrentThreadId
 0x42144c GetEnvironmentVariableW
 0x421454 GetExitCodeProcess
 0x42145c GetLastError
 0x421464 GetModuleFileNameW
 0x42146c GetModuleHandleA
 0x421474 GetProcAddress
 0x42147c GetShortPathNameW
 0x421484 GetStartupInfoW
 0x42148c GetSystemTimeAsFileTime
 0x421494 GetTempPathW
 0x42149c GetTickCount
 0x4214a4 InitializeCriticalSection
 0x4214ac LeaveCriticalSection
 0x4214b4 LoadLibraryA
 0x4214bc LoadLibraryExW
 0x4214c4 MultiByteToWideChar
 0x4214cc QueryPerformanceCounter
 0x4214d4 RtlAddFunctionTable
 0x4214dc RtlCaptureContext
 0x4214e4 RtlLookupFunctionEntry
 0x4214ec RtlVirtualUnwind
 0x4214f4 SetDllDirectoryW
 0x4214fc SetEnvironmentVariableW
 0x421504 SetUnhandledExceptionFilter
 0x42150c Sleep
 0x421514 TerminateProcess
 0x42151c TlsGetValue
 0x421524 UnhandledExceptionFilter
 0x42152c VirtualProtect
 0x421534 VirtualQuery
 0x42153c WaitForSingleObject
 0x421544 WideCharToMultiByte
 0x42154c __C_specific_handler
msvcrt.dll
 0x42155c __argc
 0x421564 __dllonexit
 0x42156c __iob_func
 0x421574 __lconv_init
 0x42157c __set_app_type
 0x421584 __setusermatherr
 0x42158c __wargv
 0x421594 __wgetmainargs
 0x42159c __winitenv
 0x4215a4 _amsg_exit
 0x4215ac _cexit
 0x4215b4 _fileno
 0x4215bc _findclose
 0x4215c4 _findfirst64
 0x4215cc _findnext64
 0x4215d4 _fmode
 0x4215dc _fullpath
 0x4215e4 _get_osfhandle
 0x4215ec _getpid
 0x4215f4 _initterm
 0x4215fc _lock
 0x421604 _mkdir
 0x42160c _onexit
 0x421614 _rmdir
 0x42161c _setmode
 0x421624 _stat64
 0x42162c _strdup
 0x421634 _tempnam
 0x42163c _unlock
 0x421644 _vsnprintf
 0x42164c _wcmdln
 0x421654 _wfopen
 0x42165c abort
 0x421664 calloc
 0x42166c clearerr
 0x421674 exit
 0x42167c fclose
 0x421684 feof
 0x42168c ferror
 0x421694 fflush
 0x42169c fprintf
 0x4216a4 fread
 0x4216ac free
 0x4216b4 fseek
 0x4216bc ftell
 0x4216c4 fwrite
 0x4216cc getenv
 0x4216d4 malloc
 0x4216dc mbstowcs
 0x4216e4 memcpy
 0x4216ec memset
 0x4216f4 remove
 0x4216fc setbuf
 0x421704 setlocale
 0x42170c signal
 0x421714 sprintf
 0x42171c strcat
 0x421724 strchr
 0x42172c strcmp
 0x421734 strcpy
 0x42173c strlen
 0x421744 strncat
 0x42174c strncmp
 0x421754 strncpy
 0x42175c strrchr
 0x421764 strtok
 0x42176c vfprintf
 0x421774 wcslen
USER32.dll
 0x421784 MessageBoxA
WS2_32.dll
 0x421794 ntohl

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure