Report - 14b4e4efa6b587ddde956d90e1b9791f.exe

Emotet UPX Malicious Packer Malicious Library PE32 OS Processor Check PE File
ScreenShot
Created 2022.05.19 11:17 Machine s1_win7_x6403
Filename 14b4e4efa6b587ddde956d90e1b9791f.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
2.2
ZERO API file : clean
VT API (file) 25 detected (Zusy, GenericRXAA, Unsafe, Save, ZexaF, tq0@aiw8v6kj, Kryptik, Eldorado, Attribute, HighConfidence, malicious, high confidence, DropperX, Artemis, Generic PUA MK, kcloud, Manuscrypt, YzY0OtPnbwfcD2VG, ai score=84, confidence)
md5 49a3826a6ddfce6b29f76a6c58feb336
sha256 f6993cab6d1588b847b68cd42b47ad0ac215b10a7d4051abe4a91fa0bc09d6fe
ssdeep 6144:rJ3Pyn8z6ptn5Hq+Kupf8ZPFyNMVlX93fEPf:l3P8Hq+KupfKwoXVEPf
imphash 60e96e281950875c6520bf758d9fd938
impfuzzy 192:HB7rTMDUKCsgsvJj9Ko3BmcncBcE2sPfNOAxP:HhTsCS3caqjfNOAxP
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 25 AntiVirus engines on VirusTotal as malicious
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Foreign language identified in PE resource
notice Performs some HTTP requests
info Checks amount of memory in system

Rules (7cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_1_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://apps.identrust.com/roots/dstrootcax3.p7c KR Korea Telecom 119.207.65.81 clean
apps.identrust.com KR Korea Telecom 119.207.65.74 clean
v.xyzgamev.com US CLOUDFLARENET 172.67.188.70 mailcious
172.67.188.70 US CLOUDFLARENET 172.67.188.70 clean
121.254.136.27 KR LG DACOM Corporation 121.254.136.27 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x4330b4 GetFileAttributesA
 0x4330b8 GetFileTime
 0x4330bc ExitProcess
 0x4330c0 HeapFree
 0x4330c4 HeapAlloc
 0x4330c8 VirtualProtect
 0x4330cc VirtualAlloc
 0x4330d0 GetSystemInfo
 0x4330d4 VirtualQuery
 0x4330d8 HeapReAlloc
 0x4330dc GetCommandLineA
 0x4330e0 GetProcessHeap
 0x4330e4 GetStartupInfoA
 0x4330e8 RtlUnwind
 0x4330ec RaiseException
 0x4330f0 HeapSize
 0x4330f4 TerminateProcess
 0x4330f8 UnhandledExceptionFilter
 0x4330fc SetUnhandledExceptionFilter
 0x433100 IsDebuggerPresent
 0x433104 GetStdHandle
 0x433108 HeapDestroy
 0x43310c HeapCreate
 0x433110 VirtualFree
 0x433114 FreeEnvironmentStringsA
 0x433118 GetEnvironmentStrings
 0x43311c FreeEnvironmentStringsW
 0x433120 GetEnvironmentStringsW
 0x433124 SetHandleCount
 0x433128 GetFileType
 0x43312c QueryPerformanceCounter
 0x433130 GetSystemTimeAsFileTime
 0x433134 GetACP
 0x433138 GetStringTypeA
 0x43313c GetStringTypeW
 0x433140 GetTimeZoneInformation
 0x433144 GetConsoleCP
 0x433148 GetConsoleMode
 0x43314c LCMapStringA
 0x433150 LCMapStringW
 0x433154 SetStdHandle
 0x433158 WriteConsoleA
 0x43315c GetConsoleOutputCP
 0x433160 WriteConsoleW
 0x433164 SetEnvironmentVariableA
 0x433168 FileTimeToLocalFileTime
 0x43316c GetTickCount
 0x433170 SetErrorMode
 0x433174 FileTimeToSystemTime
 0x433178 GetOEMCP
 0x43317c GetCPInfo
 0x433180 CreateFileA
 0x433184 GetFullPathNameA
 0x433188 GetVolumeInformationA
 0x43318c FindFirstFileA
 0x433190 FindClose
 0x433194 GetCurrentProcess
 0x433198 DuplicateHandle
 0x43319c GetFileSize
 0x4331a0 SetEndOfFile
 0x4331a4 UnlockFile
 0x4331a8 LockFile
 0x4331ac FlushFileBuffers
 0x4331b0 SetFilePointer
 0x4331b4 WriteFile
 0x4331b8 ReadFile
 0x4331bc GetThreadLocale
 0x4331c0 GlobalFlags
 0x4331c4 TlsFree
 0x4331c8 DeleteCriticalSection
 0x4331cc LocalReAlloc
 0x4331d0 TlsSetValue
 0x4331d4 TlsAlloc
 0x4331d8 InitializeCriticalSection
 0x4331dc GlobalHandle
 0x4331e0 GlobalReAlloc
 0x4331e4 EnterCriticalSection
 0x4331e8 TlsGetValue
 0x4331ec LeaveCriticalSection
 0x4331f0 LocalAlloc
 0x4331f4 InterlockedIncrement
 0x4331f8 GlobalGetAtomNameA
 0x4331fc GlobalFindAtomA
 0x433200 lstrcmpW
 0x433204 GetVersionExA
 0x433208 InterlockedDecrement
 0x43320c GetModuleFileNameW
 0x433210 GetCurrentProcessId
 0x433214 GlobalAddAtomA
 0x433218 CloseHandle
 0x43321c WritePrivateProfileStringA
 0x433220 FreeResource
 0x433224 GetCurrentThread
 0x433228 GetCurrentThreadId
 0x43322c ConvertDefaultLocale
 0x433230 GetModuleFileNameA
 0x433234 EnumResourceLanguagesA
 0x433238 GetLocaleInfoA
 0x43323c LoadLibraryA
 0x433240 lstrcmpA
 0x433244 FreeLibrary
 0x433248 GlobalDeleteAtom
 0x43324c GetModuleHandleA
 0x433250 SetLastError
 0x433254 GlobalFree
 0x433258 GlobalAlloc
 0x43325c GlobalLock
 0x433260 GlobalUnlock
 0x433264 FormatMessageA
 0x433268 LocalFree
 0x43326c FindResourceA
 0x433270 LoadResource
 0x433274 LockResource
 0x433278 SizeofResource
 0x43327c MulDiv
 0x433280 GetVersion
 0x433284 CompareStringA
 0x433288 GetLastError
 0x43328c InterlockedExchange
 0x433290 CompareStringW
 0x433294 WideCharToMultiByte
 0x433298 lstrlenA
 0x43329c MultiByteToWideChar
 0x4332a0 GetModuleHandleW
 0x4332a4 Sleep
 0x4332a8 GetProcAddress
USER32.dll
 0x433318 RegisterClipboardFormatA
 0x43331c PostThreadMessageA
 0x433320 InvalidateRect
 0x433324 SetRect
 0x433328 IsRectEmpty
 0x43332c CopyAcceleratorTableA
 0x433330 CharNextA
 0x433334 ReleaseCapture
 0x433338 SetCapture
 0x43333c LoadCursorA
 0x433340 GetSysColorBrush
 0x433344 ShowWindow
 0x433348 MoveWindow
 0x43334c SetWindowTextA
 0x433350 IsDialogMessageA
 0x433354 RegisterWindowMessageA
 0x433358 SendDlgItemMessageA
 0x43335c WinHelpA
 0x433360 IsChild
 0x433364 GetCapture
 0x433368 GetClassLongA
 0x43336c GetClassNameA
 0x433370 SetPropA
 0x433374 GetPropA
 0x433378 RemovePropA
 0x43337c SetFocus
 0x433380 GetWindowTextA
 0x433384 GetForegroundWindow
 0x433388 GetTopWindow
 0x43338c GetMessageTime
 0x433390 GetMessagePos
 0x433394 MapWindowPoints
 0x433398 SetForegroundWindow
 0x43339c UpdateWindow
 0x4333a0 GetMenu
 0x4333a4 CreateWindowExA
 0x4333a8 GetClassInfoExA
 0x4333ac GetClassInfoA
 0x4333b0 RegisterClassA
 0x4333b4 AdjustWindowRectEx
 0x4333b8 EqualRect
 0x4333bc CopyRect
 0x4333c0 PtInRect
 0x4333c4 GetDlgCtrlID
 0x4333c8 DefWindowProcA
 0x4333cc CallWindowProcA
 0x4333d0 SetWindowLongA
 0x4333d4 OffsetRect
 0x4333d8 IntersectRect
 0x4333dc SystemParametersInfoA
 0x4333e0 GetWindowPlacement
 0x4333e4 GetWindowRect
 0x4333e8 GetSysColor
 0x4333ec EndPaint
 0x4333f0 BeginPaint
 0x4333f4 GetWindowDC
 0x4333f8 ReleaseDC
 0x4333fc GetDC
 0x433400 ClientToScreen
 0x433404 GrayStringA
 0x433408 DrawTextExA
 0x43340c DrawTextA
 0x433410 TabbedTextOutA
 0x433414 UnhookWindowsHookEx
 0x433418 GetWindowThreadProcessId
 0x43341c GetLastActivePopup
 0x433420 wsprintfW
 0x433424 LoadIconA
 0x433428 IsIconic
 0x43342c SendMessageA
 0x433430 GetSystemMetrics
 0x433434 GetClientRect
 0x433438 MessageBoxA
 0x43343c SetCursor
 0x433440 SetWindowsHookExA
 0x433444 CallNextHookEx
 0x433448 GetMessageA
 0x43344c TranslateMessage
 0x433450 DispatchMessageA
 0x433454 IsWindowVisible
 0x433458 GetKeyState
 0x43345c PeekMessageA
 0x433460 GetCursorPos
 0x433464 ValidateRect
 0x433468 DestroyMenu
 0x43346c UnregisterClassA
 0x433470 SetMenuItemBitmaps
 0x433474 GetMenuCheckMarkDimensions
 0x433478 MessageBeep
 0x43347c GetNextDlgGroupItem
 0x433480 InvalidateRgn
 0x433484 DrawIcon
 0x433488 EnableWindow
 0x43348c CharUpperA
 0x433490 GetSubMenu
 0x433494 GetMenuItemCount
 0x433498 GetMenuItemID
 0x43349c GetMenuState
 0x4334a0 PostMessageA
 0x4334a4 PostQuitMessage
 0x4334a8 SetWindowPos
 0x4334ac MapDialogRect
 0x4334b0 GetParent
 0x4334b4 SetWindowContextHelpId
 0x4334b8 GetWindow
 0x4334bc EndDialog
 0x4334c0 GetNextDlgTabItem
 0x4334c4 IsWindowEnabled
 0x4334c8 GetDlgItem
 0x4334cc GetWindowLongA
 0x4334d0 IsWindow
 0x4334d4 DestroyWindow
 0x4334d8 CreateDialogIndirectParamA
 0x4334dc SetActiveWindow
 0x4334e0 GetActiveWindow
 0x4334e4 GetDesktopWindow
 0x4334e8 CheckMenuItem
 0x4334ec EnableMenuItem
 0x4334f0 ModifyMenuA
 0x4334f4 GetFocus
 0x4334f8 LoadBitmapA
GDI32.dll
 0x433030 DeleteDC
 0x433034 GetStockObject
 0x433038 ExtSelectClipRgn
 0x43303c GetTextColor
 0x433040 CreateRectRgnIndirect
 0x433044 GetRgnBox
 0x433048 GetMapMode
 0x43304c ScaleWindowExtEx
 0x433050 SetWindowExtEx
 0x433054 ScaleViewportExtEx
 0x433058 SetViewportExtEx
 0x43305c OffsetViewportOrgEx
 0x433060 SetViewportOrgEx
 0x433064 GetBkColor
 0x433068 GetDeviceCaps
 0x43306c Escape
 0x433070 ExtTextOutA
 0x433074 TextOutA
 0x433078 RectVisible
 0x43307c PtVisible
 0x433080 GetWindowExtEx
 0x433084 GetViewportExtEx
 0x433088 GetObjectA
 0x43308c DeleteObject
 0x433090 GetClipBox
 0x433094 SetMapMode
 0x433098 SetTextColor
 0x43309c SetBkColor
 0x4330a0 RestoreDC
 0x4330a4 SaveDC
 0x4330a8 CreateBitmap
 0x4330ac SelectObject
comdlg32.dll
 0x433510 GetFileTitleA
WINSPOOL.DRV
 0x433500 DocumentPropertiesA
 0x433504 OpenPrinterA
 0x433508 ClosePrinter
ADVAPI32.dll
 0x433000 RegSetValueExA
 0x433004 RegQueryValueA
 0x433008 RegEnumKeyA
 0x43300c RegDeleteKeyA
 0x433010 RegCloseKey
 0x433014 RegCreateKeyExA
 0x433018 RegOpenKeyExA
 0x43301c RegQueryValueExA
 0x433020 RegOpenKeyA
COMCTL32.dll
 0x433028 InitCommonControlsEx
SHLWAPI.dll
 0x433304 PathFindFileNameA
 0x433308 PathStripToRootA
 0x43330c PathFindExtensionA
 0x433310 PathIsUNCA
oledlg.dll
 0x43355c None
ole32.dll
 0x433518 OleInitialize
 0x43351c CoFreeUnusedLibraries
 0x433520 OleUninitialize
 0x433524 CreateILockBytesOnHGlobal
 0x433528 StgCreateDocfileOnILockBytes
 0x43352c StgOpenStorageOnILockBytes
 0x433530 CoGetClassObject
 0x433534 CLSIDFromString
 0x433538 CoRevokeClassObject
 0x43353c CoTaskMemAlloc
 0x433540 CoTaskMemFree
 0x433544 CoInitializeSecurity
 0x433548 OleIsCurrentClipboard
 0x43354c OleFlushClipboard
 0x433550 CoRegisterMessageFilter
 0x433554 CLSIDFromProgID
OLEAUT32.dll
 0x4332b0 SysAllocStringByteLen
 0x4332b4 SysStringByteLen
 0x4332b8 SysFreeString
 0x4332bc VariantInit
 0x4332c0 VariantCopy
 0x4332c4 VariantClear
 0x4332c8 SysAllocStringLen
 0x4332cc SafeArrayGetDim
 0x4332d0 SafeArrayGetLBound
 0x4332d4 SafeArrayGetUBound
 0x4332d8 SafeArrayAccessData
 0x4332dc SafeArrayUnaccessData
 0x4332e0 VariantChangeType
 0x4332e4 SysStringLen
 0x4332e8 OleCreateFontIndirect
 0x4332ec VariantTimeToSystemTime
 0x4332f0 SystemTimeToVariantTime
 0x4332f4 SafeArrayDestroy
 0x4332f8 GetErrorInfo
 0x4332fc SysAllocString

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure