Report - 7390_1642600879_2389.exe

UPX PE File PE32 .NET EXE
ScreenShot
Created 2022.01.20 11:24 Machine s1_win7_x6401
Filename 7390_1642600879_2389.exe
Type MS-DOS executable
AI Score
10
Behavior Score
11.8
ZERO API file : malware
VT API (file) 29 detected (AIDetect, malware1, malicious, high confidence, Unsafe, Save, confidence, 100%, None, CPMB, Attribute, HighConfidence, AdwareFileTour, KVMH008, kcloud, score, BScope, ET#94%, RDMK, cmRtazodymXtQ, UHkNtE2LyZfjZO, Static AI, Malicious PE, PossibleThreat, PALLAS, ZexaF, KqZ@amBWVUoi, FileRepMalware, susgen)
md5 965e83dcd89fe1e42fa4b620691a354e
sha256 5a89c6bb26a9d65d713138be27feeb19b7db3c5846dc387cafcbd22028498d2f
ssdeep 12288:5Ne02Hef3IHzTyNVRL0SJmeZ8wpJUzHbh:neiAf0VRHJH+wpSzF
imphash ba9a5cfa3a7f3e5fa7ce2c7843d8b18d
impfuzzy 3:sUx2AEJt/M1KgK+BoM9C1EeA6TYX1GtLRatdJrdXAuLdAIEliWbW2JLAzVYf:nEJt/MNloz1V5scidBdQMA1b1LAzOf
  Network IP location

Signature (26cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
watch Checks for the presence of known devices from debuggers and forensic tools
watch Checks for the presence of known windows from debuggers and forensic tools
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Detects VirtualBox through the presence of a device
watch Executes one or more WMI queries
watch Harvests credentials from local FTP client softwares
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Executes one or more WMI queries which can be used to identify virtual machines
notice Expresses interest in specific running processes
notice One or more potentially interesting buffers were extracted
notice Queries for potentially installed applications
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (4cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info Is_DotNET_EXE (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
37.9.13.169 RU OOO Network of data-centers Selectel 37.9.13.169 mailcious
51.255.48.204 FR OVH SAS 51.255.48.204 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x43f08c GetModuleHandleA
user32.dll
 0x43f09c DefWindowProcA
advapi32.dll
 0x43f0ac RegQueryValueW
comctl32.dll
 0x43f0bc InitCommonControlsEx
mscoree.dll
 0x43f0cc _CorExeMain
shell32.dll
 0x43f0dc SHGetDiskFreeSpaceExW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure