Report - beerpeer.exe

Generic Malware Malicious Library UPX Antivirus PE64 PE File OS Processor Check GIF Format
ScreenShot
Created 2022.01.19 17:29 Machine s1_win7_x6401
Filename beerpeer.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
1
Behavior Score
7.0
ZERO API file : clean
VT API (file) 9 detected (Unsafe, Malicious, score, Artemis, Sabsik, InvalidSig)
md5 e7de72de8a439bab253a17638878f7d7
sha256 8358b461769de91ad1414c00f051b9a8e05e4b8d2cf8e7dce082ce83210954e6
ssdeep 12288:lJETeg97VTD2RRaH+SYBXOukiOZODBxgTiXh29RWDO0iBkfeeoUP5HgNc:DETeg97VTyR20XrkiO8NK9ilRFrP5ANc
imphash b9a369a0a99cf23534a5c6de0d57184d
impfuzzy 48:etlOIy4BQ7OKZ0mTWJcgPL+ZrLt04Bht+x94FNkLK4:etlOPFjRWJcgPL+xLt04B72RLL
  Network IP location

Signature (18cnts)

Level Description
watch A process attempted to delay the analysis task.
watch Communicates with host for which no DNS query was performed
watch Executes one or more WMI queries
watch Installs itself for autorun at Windows startup
watch The process powershell.exe wrote an executable file to disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice File has been identified by 9 AntiVirus engines on VirusTotal as malicious
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Uses Windows APIs to generate a cryptographic key

Rules (8cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info Lnk_Format_Zero LNK Format binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
142.132.176.78 CA UNIVERSITYOFWINNIPEG-ASN 142.132.176.78 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x1400da010 HeapSize
 0x1400da018 MultiByteToWideChar
 0x1400da020 Sleep
 0x1400da028 GetTempPathA
 0x1400da030 GetLastError
 0x1400da038 CreateFileA
 0x1400da040 LoadLibraryA
 0x1400da048 HeapReAlloc
 0x1400da050 CloseHandle
 0x1400da058 RaiseException
 0x1400da060 HeapAlloc
 0x1400da068 DecodePointer
 0x1400da070 GetProcAddress
 0x1400da078 GetModuleHandleA
 0x1400da080 GetCurrentProcessId
 0x1400da088 GetProcessHeap
 0x1400da090 FreeLibrary
 0x1400da098 WideCharToMultiByte
 0x1400da0a0 CreateProcessA
 0x1400da0a8 Process32First
 0x1400da0b0 CreateToolhelp32Snapshot
 0x1400da0b8 Process32Next
 0x1400da0c0 VirtualQuery
 0x1400da0c8 SetEndOfFile
 0x1400da0d0 CreateFileW
 0x1400da0d8 SetStdHandle
 0x1400da0e0 SetEnvironmentVariableW
 0x1400da0e8 FreeEnvironmentStringsW
 0x1400da0f0 CreateMutexA
 0x1400da0f8 InitializeCriticalSectionEx
 0x1400da100 PeekNamedPipe
 0x1400da108 CreatePipe
 0x1400da110 GetCurrentProcess
 0x1400da118 SetLastError
 0x1400da120 HeapFree
 0x1400da128 DeleteCriticalSection
 0x1400da130 ReadFile
 0x1400da138 GetEnvironmentStringsW
 0x1400da140 GetCommandLineW
 0x1400da148 GetCommandLineA
 0x1400da150 GetOEMCP
 0x1400da158 GetACP
 0x1400da160 IsValidCodePage
 0x1400da168 FindNextFileW
 0x1400da170 FindFirstFileExW
 0x1400da178 FindClose
 0x1400da180 GetTimeZoneInformation
 0x1400da188 HeapQueryInformation
 0x1400da190 GetFileAttributesExW
 0x1400da198 CreateProcessW
 0x1400da1a0 GetExitCodeProcess
 0x1400da1a8 WaitForSingleObject
 0x1400da1b0 DeleteFileW
 0x1400da1b8 EnumSystemLocalesW
 0x1400da1c0 GetUserDefaultLCID
 0x1400da1c8 IsValidLocale
 0x1400da1d0 GetLocaleInfoW
 0x1400da1d8 LCMapStringW
 0x1400da1e0 CompareStringW
 0x1400da1e8 GetTimeFormatW
 0x1400da1f0 GetDateFormatW
 0x1400da1f8 GetConsoleOutputCP
 0x1400da200 FlushFileBuffers
 0x1400da208 GetFileSizeEx
 0x1400da210 ReadConsoleW
 0x1400da218 GetConsoleMode
 0x1400da220 SetFilePointerEx
 0x1400da228 WriteConsoleW
 0x1400da230 GetStringTypeW
 0x1400da238 InitializeSRWLock
 0x1400da240 ReleaseSRWLockExclusive
 0x1400da248 AcquireSRWLockExclusive
 0x1400da250 EnterCriticalSection
 0x1400da258 LeaveCriticalSection
 0x1400da260 TryEnterCriticalSection
 0x1400da268 GetCurrentThreadId
 0x1400da270 EncodePointer
 0x1400da278 LocalFree
 0x1400da280 QueryPerformanceCounter
 0x1400da288 GetSystemTimeAsFileTime
 0x1400da290 GetModuleHandleW
 0x1400da298 LCMapStringEx
 0x1400da2a0 GetLocaleInfoEx
 0x1400da2a8 CompareStringEx
 0x1400da2b0 GetCPInfo
 0x1400da2b8 RtlCaptureContext
 0x1400da2c0 RtlLookupFunctionEntry
 0x1400da2c8 RtlVirtualUnwind
 0x1400da2d0 UnhandledExceptionFilter
 0x1400da2d8 SetUnhandledExceptionFilter
 0x1400da2e0 TerminateProcess
 0x1400da2e8 IsProcessorFeaturePresent
 0x1400da2f0 InitializeCriticalSectionAndSpinCount
 0x1400da2f8 CreateEventW
 0x1400da300 IsDebuggerPresent
 0x1400da308 GetStartupInfoW
 0x1400da310 InitializeSListHead
 0x1400da318 OutputDebugStringW
 0x1400da320 RtlUnwindEx
 0x1400da328 RtlPcToFileHeader
 0x1400da330 TlsAlloc
 0x1400da338 TlsGetValue
 0x1400da340 TlsSetValue
 0x1400da348 TlsFree
 0x1400da350 LoadLibraryExW
 0x1400da358 GetModuleFileNameW
 0x1400da360 GetModuleHandleExW
 0x1400da368 CreateThread
 0x1400da370 ExitThread
 0x1400da378 FreeLibraryAndExitThread
 0x1400da380 HeapValidate
 0x1400da388 GetSystemInfo
 0x1400da390 ExitProcess
 0x1400da398 GetStdHandle
 0x1400da3a0 WriteFile
 0x1400da3a8 GetFileType
 0x1400da3b0 RtlUnwind
USER32.dll
 0x1400da3f0 GetDC
 0x1400da3f8 GetSystemMetrics
 0x1400da400 ReleaseDC
ADVAPI32.dll
 0x1400da000 GetCurrentHwProfileA
ole32.dll
 0x1400da4b8 CoInitializeEx
 0x1400da4c0 CoInitializeSecurity
 0x1400da4c8 CoCreateInstance
OLEAUT32.dll
 0x1400da3c0 SysAllocStringByteLen
 0x1400da3c8 SysFreeString
 0x1400da3d0 VariantClear
 0x1400da3d8 SysAllocString
 0x1400da3e0 SysStringLen
gdiplus.dll
 0x1400da460 GdipGetImageEncodersSize
 0x1400da468 GdiplusStartup
 0x1400da470 GdiplusShutdown
 0x1400da478 GdipGetImageEncoders
 0x1400da480 GdipCloneImage
 0x1400da488 GdipFree
 0x1400da490 GdipDisposeImage
 0x1400da498 GdipCreateBitmapFromHBITMAP
 0x1400da4a0 GdipAlloc
 0x1400da4a8 GdipSaveImageToFile
WS2_32.dll
 0x1400da410 gethostname
 0x1400da418 connect
 0x1400da420 socket
 0x1400da428 send
 0x1400da430 htons
 0x1400da438 recv
 0x1400da440 inet_addr
 0x1400da448 WSAStartup
 0x1400da450 closesocket

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure