Report - win.exe

Emotet Gen2 Generic Malware UPX ASPack Malicious Packer Malicious Library Anti_VM PE32 PE File OS Processor Check
ScreenShot
Created 2022.06.07 14:02 Machine s1_win7_x6403
Filename win.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
AI Score
10
Behavior Score
7.8
ZERO API file : malware
VT API (file) 58 detected (FamVT, DumpModuleInfectiousNME, DownLoader18, VJadtre, GenericRI, S17164152, Kudj, FakeMS, ASPACK V2, malicious, FileInfector, PatchLoad, moderate confidence, Wapomi, Nimnul, Banload, cstqaj, Ramnit, Roue, CLASSIC, A + W32, MUPX, Gen@24tbus, Otwycal, Virut, high, score, Static AI, Malicious PE, Jadtre, ai score=89, Mikcer, Unsafe, Pcarrier, Probably Heur, ExeHeaderL, Loader, GenAsa, H41PVEbKGsY, CoinMiner, Nitol, confidence, 100%)
md5 b238708a6c194f7cb92c8c50400a3a98
sha256 78bd304c8dfe9bf2bdb139d0672d4aed6adde6686fbb6ed5e5420f955dc4de11
ssdeep 768:C7I0+FNSW3YO5z+b+hCFfH/YZIvb5c4QGPL4vzZq2o9W7GsxBbPr:C7I0ekW3Ft+eeYZK5cTGCq2iW7z
imphash a3efcc970852f76f399fd867a4d6b207
impfuzzy 6:dBJAEHGDzyRlbRmVOZ/EwcWZfxTQAGbK146Bj:VA/DzqYOZ9FpRm7c
  Network IP location

Signature (15cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 58 AntiVirus engines on VirusTotal as malicious
watch Deletes executed files from disk
watch Installs itself for autorun at Windows startup
notice A process created a hidden window
notice Creates a service
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
info Command line console output was observed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed

Rules (15cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_2_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch ASPack_Zero ASPack packed file binaries (download)
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)

Network (10cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://ddos.dnsnb8.net:799/cj//k1.rar US VOXEL-DOT-NET 63.251.106.25 mailcious
http://ddos.dnsnb8.net:799/cj//k2.rar US VOXEL-DOT-NET 63.251.106.25 mailcious
http://ddos.dnsnb8.net:799/cj//k3.rar US VOXEL-DOT-NET 63.251.106.25 mailcious
http://ddos.dnsnb8.net:799/cj//k4.rar US VOXEL-DOT-NET 63.251.106.25 mailcious
http://ddos.dnsnb8.net:799/cj//k5.rar US VOXEL-DOT-NET 63.251.106.25 mailcious
2969761768.vip Unknown 193.221.95.83 clean
ddos.dnsnb8.net US VOXEL-DOT-NET 63.251.106.25 mailcious
v8.ter.tf Unknown mailcious
63.251.106.25 US VOXEL-DOT-NET 63.251.106.25 mailcious
20.27.51.23 US MICROSOFT-CORP-MSN-AS-BLOCK 20.27.51.23 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x411920 LoadLibraryA
 0x411924 GetProcAddress
 0x411928 VirtualProtect
 0x41192c VirtualAlloc
 0x411930 VirtualFree
 0x411934 ExitProcess
ADVAPI32.dll
 0x41193c RegOpenKeyA
iphlpapi.dll
 0x411944 GetIfTable
MSVCRT.dll
 0x41194c time
USER32.dll
 0x411954 wsprintfA
WININET.dll
 0x41195c InternetOpenA
WS2_32.dll
 0x411964 inet_addr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure