Report - majMSPharm.exe

Malicious Library PE32 PE File DLL
ScreenShot
Created 2022.05.24 18:36 Machine s1_win7_x6403
Filename majMSPharm.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.8
ZERO API file : malware
VT API (file) 25 detected (GenericKD, Artemis, Unsafe, AutoIt, Eldorado, malicious, moderate confidence, Sabsik, Wacapew, ai score=82, susgen, PossibleThreat)
md5 6c53f542fb4bf76bba5492fdcd68241b
sha256 352e50419b860d9f9066d2a1dc16b925c101027a1915be02f0a1fba09c5c22f5
ssdeep 49152:UO7+4VcSl7495jJVoHHXZiRm0IMeMlKxvLHkknZO/ygI2DRJRYRQDjcjOrnZioFK:UoplyMHHelWvPZOagRZzRRJeR
imphash e41c25ab7824b3df73334188c40518ae
impfuzzy 24:mcOovaVH9+Fo0DpYPYz6A4ES5GbnQnAxt/12JEUh5KlhkijSLCKQw350Q+WbvyzC:ar59M5eA4ES5QnBX/1olh5KlCySeKQuX
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 25 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Drops an executable to the user AppData folder
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
info Checks if process is being debugged by a debugger

Rules (7cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
185.157.162.137 SE Obenetwork AB 185.157.162.137 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40404c lstrcpyA
 0x404050 GetCommandLineA
 0x404054 SetErrorMode
 0x404058 lstrlenA
 0x40405c MulDiv
 0x404060 GetTempFileNameA
 0x404064 GetWindowsDirectoryA
 0x404068 GetModuleFileNameA
 0x40406c GetModuleHandleA
 0x404070 FormatMessageA
 0x404074 lstrcatA
 0x404078 GetLastError
 0x40407c _lwrite
 0x404080 _llseek
 0x404084 GlobalUnlock
 0x404088 _lopen
 0x40408c GlobalAlloc
 0x404090 GlobalFree
 0x404094 _lclose
 0x404098 _lcreat
 0x40409c LoadLibraryA
 0x4040a0 GetProcAddress
 0x4040a4 FreeLibrary
 0x4040a8 OpenFile
 0x4040ac GetVersionExA
 0x4040b0 GetCurrentProcess
 0x4040b4 WinExec
 0x4040b8 ExitProcess
 0x4040bc _lread
 0x4040c0 LocalFree
 0x4040c4 GetTempPathA
 0x4040c8 GlobalLock
USER32.dll
 0x4040d0 GetDC
 0x4040d4 BeginPaint
 0x4040d8 EndPaint
 0x4040dc InvalidateRect
 0x4040e0 PostQuitMessage
 0x4040e4 SendMessageA
 0x4040e8 DefWindowProcA
 0x4040ec GetClientRect
 0x4040f0 CreateWindowExA
 0x4040f4 DrawTextA
 0x4040f8 ReleaseDC
 0x4040fc ShowWindow
 0x404100 SetWindowPos
 0x404104 UpdateWindow
 0x404108 SetTimer
 0x40410c LoadIconA
 0x404110 wsprintfA
 0x404114 MessageBoxA
 0x404118 ExitWindowsEx
 0x40411c RegisterClassA
 0x404120 LoadCursorA
GDI32.dll
 0x404010 DeleteObject
 0x404014 GetStockObject
 0x404018 GetDeviceCaps
 0x40401c PatBlt
 0x404020 CreateSolidBrush
 0x404024 TextOutA
 0x404028 SetTextColor
 0x40402c SetBkMode
 0x404030 SelectObject
 0x404034 StretchDIBits
 0x404038 CreateFontA
 0x40403c RealizePalette
 0x404040 SelectPalette
 0x404044 CreatePalette
ADVAPI32.dll
 0x404000 OpenProcessToken
 0x404004 AdjustTokenPrivileges
 0x404008 LookupPrivilegeValueA

EAT(Export Address Table) Library

0x402a80 _MainWndProc@16
0x403082 _StubFileWrite@12


Similarity measure (PE file only) - Checking for service failure