Report - spacemen.exe

Malicious Library UPX PE32 OS Processor Check PE File
ScreenShot
Created 2022.12.05 09:51 Machine s1_win7_x6401
Filename spacemen.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
3.0
ZERO API file : malware
VT API (file) 16 detected (AIDetect, malware2, Artemis, MachineLearning, Anomalous, malicious, high confidence, score, Generic@AI, RDML, Untt50UqvF7oJgSiHEV1IQ, BScope, Zlob, susgen, ZexaF, CvX@amLRCsOi)
md5 d1e2721997a49175744d36d9eaa2a946
sha256 d31658e0fec53c1d98100d576418bbd1c1d3da46ce4aeadc181827a63ccd973a
ssdeep 24576:GRcq0pCim0ecOnj10vcmwvMP+JQt8mLkhAjl+ANnvddoeVdbx:G/i9inj1a9HRttLCAj1nFS+5x
imphash 784f331f65fd93c249119b3a8e6ca469
impfuzzy 24:R2WIyVeOQkJM6M7Erag9GDwoXD2omvelEu1XZatNVcLLAwkgiz04M:HQQra+Gk+Qeeu1kt7cfA/g004M
  Network IP location

Signature (8cnts)

Level Description
watch File has been identified by 16 AntiVirus engines on VirusTotal as malicious
watch One or more of the buffers contains an embedded PE file
notice Allocates read-write-execute memory (usually to unpack itself)
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info Queries for the computername
info This executable has a PDB path

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
gem9twla6xbkkmlk0pnbh5yosth2xrxe.8mzefdh7t Unknown clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x537008 TlsGetValue
 0x53700c GetSystemDefaultUILanguage
 0x537010 HeapAlloc
 0x537014 ClearCommError
 0x537018 InterlockedIncrement
 0x53701c OutputDebugStringW
 0x537020 GetTickCount
 0x537024 GetProcessHeap
 0x537028 GetConsoleCP
 0x53702c LoadLibraryW
 0x537030 Sleep
 0x537034 HeapCreate
 0x537038 GetFileAttributesW
 0x53703c GetCommandLineW
 0x537040 GetCurrentDirectoryW
 0x537044 SetLastError
 0x537048 GetLongPathNameA
 0x53704c GetProcessHeaps
 0x537050 IsValidCodePage
 0x537054 FoldStringW
 0x537058 CloseHandle
 0x53705c WriteConsoleW
 0x537060 SetFilePointerEx
 0x537064 SetStdHandle
 0x537068 GetConsoleMode
 0x53706c FlushFileBuffers
 0x537070 GetStringTypeW
 0x537074 GetLastError
 0x537078 GetSystemDefaultLangID
 0x53707c LCMapStringEx
 0x537080 EncodePointer
 0x537084 DecodePointer
 0x537088 RaiseException
 0x53708c RtlUnwind
 0x537090 IsDebuggerPresent
 0x537094 IsProcessorFeaturePresent
 0x537098 InterlockedDecrement
 0x53709c ExitProcess
 0x5370a0 GetModuleHandleExW
 0x5370a4 GetProcAddress
 0x5370a8 MultiByteToWideChar
 0x5370ac HeapSize
 0x5370b0 GetStdHandle
 0x5370b4 WriteFile
 0x5370b8 GetModuleFileNameW
 0x5370bc HeapFree
 0x5370c0 GetACP
 0x5370c4 GetOEMCP
 0x5370c8 GetCPInfo
 0x5370cc GetCurrentThreadId
 0x5370d0 GetFileType
 0x5370d4 InitializeCriticalSectionAndSpinCount
 0x5370d8 DeleteCriticalSection
 0x5370dc InitOnceExecuteOnce
 0x5370e0 GetStartupInfoW
 0x5370e4 QueryPerformanceCounter
 0x5370e8 GetSystemTimeAsFileTime
 0x5370ec GetTickCount64
 0x5370f0 GetEnvironmentStringsW
 0x5370f4 FreeEnvironmentStringsW
 0x5370f8 UnhandledExceptionFilter
 0x5370fc SetUnhandledExceptionFilter
 0x537100 FlsAlloc
 0x537104 FlsGetValue
 0x537108 FlsSetValue
 0x53710c FlsFree
 0x537110 GetCurrentProcess
 0x537114 TerminateProcess
 0x537118 GetModuleHandleW
 0x53711c EnterCriticalSection
 0x537120 LeaveCriticalSection
 0x537124 LoadLibraryExW
 0x537128 HeapReAlloc
 0x53712c WideCharToMultiByte
 0x537130 CreateFileW
USER32.dll
 0x537138 MessageBoxW
 0x53713c GetForegroundWindow
 0x537140 EnumDisplayDevicesW
 0x537144 GetDC
 0x537148 LoadAcceleratorsW
GDI32.dll
 0x537000 GetGraphicsMode
ole32.dll
 0x537150 CoInitialize
 0x537154 CoUninitialize

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure