Report - Notafiscal-gtfbp-10144-PLFNV.exe

PWS[m] Gen1 Downloader task schedule UPX Malicious Library Malicious Packer Antivirus Create Service DGA SSL Socket ScreenShot DNS Internet API Code injection Hijack Network Sniff Audio HTTP Steal credential KeyLogger P2P Escalate priviledges persistence
ScreenShot
Created 2022.10.12 08:36 Machine s1_win7_x6402
Filename Notafiscal-gtfbp-10144-PLFNV.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
9.0
ZERO API file : clean
VT API (file) 8 detected (suspected of Trojan.Downloader.gen, TR/Crypt.XPACK.Gen, Trojan.Cometer, Malicious, Malware.SwollenFile!1.DDB4 (CLASSIC), Artemis, Detected, Exploit/Win.Shellcode.C5037904)
md5 8ddd50069956806ee60f17adef6ec21c
sha256 9761cb197cd5c09bea81969a249bf20cd09a6cce2a52b7d86fb4d166a8a7474e
ssdeep 98304:fCLgXiZcEpAzBDdOVqcO+llHUbvTmRgkTWkA+Txa72lCcjjkc:4vA0McO+47ibLxvdjkc
imphash
impfuzzy
  Network IP location

Signature (20cnts)

Level Description
danger Executed a process and injected code into it
watch Checks the version of Bios
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
watch Detects virtualization software with SCSI Disk Identifier trick(s)
watch Drops a binary and executes it
watch Found URLs in memory pointing to an IP address rather than a domain (potentially indicative of Command & Control traffic)
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Potentially malicious URLs were found in the process memory dump
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (52cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch Network_Downloader File Downloader memory
watch schtasks_Zero task schedule memory
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice Code_injection Code injection with CreateRemoteThread in a remote process memory
notice Create_Service Create a windows service memory
notice Escalate_priviledges Escalate priviledges memory
notice Generic_PWS_Memory_Zero PWS Memory memory
notice Hijack_Network Hijack network configuration memory
notice KeyLogger Run a KeyLogger memory
notice local_credential_Steal Steal credential memory
notice Network_DGA Communication using DGA memory
notice Network_DNS Communications use DNS memory
notice Network_FTP Communications over FTP memory
notice Network_HTTP Communications over HTTP memory
notice Network_P2P_Win Communications over P2P network memory
notice Network_SSL Communications over SSL memory
notice Network_TCP_Socket Communications over RAW Socket memory
notice Persistence Install itself for autorun at Windows startup memory
notice ScreenShot Take ScreenShot memory
notice Sniff_Audio Record Audio memory
notice Str_Win32_Http_API Match Windows Http API call memory
notice Str_Win32_Internet_API Match Windows Inet API call memory
info anti_dbg Checks if being debugged memory
info antisb_threatExpert Anti-Sandbox checks for ThreatExpert memory
info Check_Dlls (no description) memory
info Check_Qemu_Description (no description) memory
info Check_VBox_Description (no description) memory
info Check_VBox_VideoDrivers (no description) memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerCheck__RemoteAPI (no description) memory
info DebuggerException__ConsoleCtrl (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info vmdetect Possibly employs anti-virtualization techniques memory
info win_hook Affect hook table memory

Network (15cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://20.70.3.186/migaldiscovery/ybnzkvj.php US MICROSOFT-CORP-MSN-AS-BLOCK 20.70.3.186 clean
ameizingbrazil2022.s3.sa-east-1.amazonaws.com BR AMAZON-02 52.95.164.43 clean
142.250.206.238 US GOOGLE 142.250.206.238 mailcious
142.250.196.110 US GOOGLE 142.250.196.110 mailcious
172.217.31.163 US GOOGLE 172.217.31.163 clean
142.250.207.13 US GOOGLE 142.250.207.13 clean
172.217.161.36 US GOOGLE 172.217.161.36 clean
142.250.206.234 US GOOGLE 142.250.206.234 malware
34.104.35.123 US GOOGLE 34.104.35.123 clean
20.70.3.186 US MICROSOFT-CORP-MSN-AS-BLOCK 20.70.3.186 mailcious
216.58.220.110 US GOOGLE 216.58.220.110 mailcious
142.251.42.131 US GOOGLE 142.251.42.131 clean
142.250.196.106 US GOOGLE 142.250.196.106 mailcious
142.250.207.35 US GOOGLE 142.250.207.35 clean
52.95.163.75 BR AMAZON-02 52.95.163.75 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure