Report - Service.bmp

Malicious Library UPX PE File OS Processor Check PE32
ScreenShot
Created 2022.01.18 10:19 Machine s1_win7_x6401
Filename Service.bmp
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
4.6
ZERO API file : malware
VT API (file) 47 detected (AIDetect, malware2, malicious, high confidence, Zusy, GenericRI, S25215857, GenericRXMT, Unsafe, Sabsik, TrojanPSW, Disbuk, confidence, 100%, ZexaF, yuW@aWwunpji, Attribute, HighConfidence, Xpiro, DropperX, Wuhe, R002C0PAH22, AGEN, ai score=83, PSWTroj, kcloud, score, BScope, FileCryptor, CLOUD, Static AI, Malicious PE, GdSda, susgen)
md5 dabae535097a94f593d5afad04acd5ea
sha256 e0a33241f5c4ac8f304af0387ddc54da264c0a5101c822d0fc71b10af947b391
ssdeep 12288:Zzj8qPa/HOT28EnUB10QkrtMZm0IHuPK27wb8/BE:ZXzPa9JnU4750h7wbKi
imphash 9734ba8626408cec04bb8fa7d8bb6e83
impfuzzy 24:WL8FXADzAOefTtO6trS1CM3JeDc+pl39ro4vcGM1SOovbO0ZuBmzEpQz19wuDce9:rTO25trS1CM2c+ppZhm31C6O4fI
  Network IP location

Signature (8cnts)

Level Description
danger File has been identified by 47 AntiVirus engines on VirusTotal as malicious
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Resolves a suspicious Top Level Domain (TLD)
info Checks amount of memory in system

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (10cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://212.193.30.45/proxies.txt RU Anton Mamaev 212.193.30.45 8524 mailcious
https://yandex.ru/ RU YANDEX LLC 5.255.255.5 clean
yandex.ru RU YANDEX LLC 77.88.55.77 clean
twitter.com US TWITTER 104.244.42.129 clean
telegram.org GB Telegram Messenger Inc 149.154.167.99 clean
149.154.167.99 GB Telegram Messenger Inc 149.154.167.99 clean
5.255.255.5 RU YANDEX LLC 5.255.255.5 clean
212.193.30.45 RU Anton Mamaev 212.193.30.45 mailcious
2.56.59.42 US GBTCLOUD 2.56.59.42 mailcious
104.244.42.193 US TWITTER 104.244.42.193 suspicious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x453038 CreateDirectoryA
 0x45303c IsWow64Process
 0x453040 lstrcatA
 0x453044 GetModuleHandleA
 0x453048 lstrcpyA
 0x45304c WinExec
 0x453050 lstrlenA
 0x453054 HeapAlloc
 0x453058 GetProcAddress
 0x45305c lstrcpynA
 0x453060 GetProcessHeap
 0x453064 WriteConsoleW
 0x453068 LocalFree
 0x45306c GetWindowsDirectoryA
 0x453070 CloseHandle
 0x453074 DeleteFileA
 0x453078 LoadLibraryA
 0x45307c GetFileAttributesA
 0x453080 GetLastError
 0x453084 CopyFileA
 0x453088 Sleep
 0x45308c LocalAlloc
 0x453090 GetVolumeInformationA
 0x453094 GetCurrentProcess
 0x453098 HeapFree
 0x45309c GetModuleFileNameA
 0x4530a0 SetEndOfFile
 0x4530a4 HeapReAlloc
 0x4530a8 HeapSize
 0x4530ac ReadConsoleW
 0x4530b0 ReadFile
 0x4530b4 FlushFileBuffers
 0x4530b8 CreateFileW
 0x4530bc GetStringTypeW
 0x4530c0 SetStdHandle
 0x4530c4 UnhandledExceptionFilter
 0x4530c8 SetUnhandledExceptionFilter
 0x4530cc TerminateProcess
 0x4530d0 IsProcessorFeaturePresent
 0x4530d4 IsDebuggerPresent
 0x4530d8 GetStartupInfoW
 0x4530dc GetModuleHandleW
 0x4530e0 QueryPerformanceCounter
 0x4530e4 GetCurrentProcessId
 0x4530e8 GetCurrentThreadId
 0x4530ec GetSystemTimeAsFileTime
 0x4530f0 InitializeSListHead
 0x4530f4 RtlUnwind
 0x4530f8 RaiseException
 0x4530fc SetLastError
 0x453100 EncodePointer
 0x453104 EnterCriticalSection
 0x453108 LeaveCriticalSection
 0x45310c DeleteCriticalSection
 0x453110 InitializeCriticalSectionAndSpinCount
 0x453114 TlsAlloc
 0x453118 TlsGetValue
 0x45311c TlsSetValue
 0x453120 TlsFree
 0x453124 FreeLibrary
 0x453128 LoadLibraryExW
 0x45312c ExitProcess
 0x453130 GetModuleHandleExW
 0x453134 GetModuleFileNameW
 0x453138 GetStdHandle
 0x45313c WriteFile
 0x453140 MultiByteToWideChar
 0x453144 LCMapStringW
 0x453148 MoveFileExW
 0x45314c GetFileType
 0x453150 GetConsoleOutputCP
 0x453154 GetConsoleMode
 0x453158 GetFileSizeEx
 0x45315c SetFilePointerEx
 0x453160 FindClose
 0x453164 FindFirstFileExW
 0x453168 FindNextFileW
 0x45316c IsValidCodePage
 0x453170 GetACP
 0x453174 GetOEMCP
 0x453178 GetCPInfo
 0x45317c GetCommandLineA
 0x453180 GetCommandLineW
 0x453184 WideCharToMultiByte
 0x453188 GetEnvironmentStringsW
 0x45318c FreeEnvironmentStringsW
 0x453190 DecodePointer
ADVAPI32.dll
 0x453000 CreateServiceA
 0x453004 RegCloseKey
 0x453008 StartServiceCtrlDispatcherA
 0x45300c GetCurrentHwProfileA
 0x453010 CloseServiceHandle
 0x453014 RegQueryValueExA
 0x453018 SetServiceStatus
 0x45301c RegisterServiceCtrlHandlerA
 0x453020 OpenSCManagerA
 0x453024 GetUserNameA
 0x453028 StartServiceA
 0x45302c RegOpenKeyExA
 0x453030 OpenServiceA
SHELL32.dll
 0x4531ac SHGetSpecialFolderPathA
 0x4531b0 SHGetFolderPathA
 0x4531b4 ShellExecuteA
SETUPAPI.dll
 0x453198 SetupDiGetClassDevsA
 0x45319c SetupDiEnumDeviceInterfaces
 0x4531a0 SetupDiGetDeviceInterfaceDetailA
 0x4531a4 SetupDiEnumDeviceInfo

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure