Report - k.exe

Malicious Library UPX DNS AntiDebug AntiVM PE32 OS Processor Check .NET EXE PE File
ScreenShot
Created 2022.12.09 09:52 Machine s1_win7_x6401
Filename k.exe
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
AI Score
8
Behavior Score
8.0
ZERO API file : malware
VT API (file) 30 detected (AIDetectNet, malicious, high confidence, score, Unsafe, Save, Attribute, HighConfidence, CryptInject, CLOUD, high, Kryptik, 2KWNMG, kcloud, Artemis, MachineLearning, Anomalous, 100%, Static AI, Suspicious PE, susgen, PossibleThreat, ZemsilF, ny0@a0Ph@EnO, CrypterX)
md5 04eda26f8ffd07ed4a77cb13bb413154
sha256 149a95862f10a14418b51f595cb28c9f80facdb4c21081661bfd490d3b46e857
ssdeep 3072:4in7bOa6XQhUQrO7Ab3/ZblF+EQeAhz/uxjluRLy:4i7bt6XQeluBh2Duxe+
imphash 218d0fc4cb99087b61778979ff7fe694
impfuzzy 48:kpKaTxVF6h1P58dahV8IlKCzESio+HSYUH+hvPOxQqYcoTpPbNag4pm2:kFD6HhMahV8hO+POxQqYcoTpPbNag4p9
  Network IP location

Signature (18cnts)

Level Description
danger Executed a process and injected code into it
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Executes one or more WMI queries
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (15cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice Network_DNS Communications use DNS memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Is_DotNET_EXE (no description) binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

MSVCR90.dll
 0x4030cc scanf
 0x4030d0 fread
 0x4030d4 _invalid_parameter_noinfo
 0x4030d8 ??2@YAPAXI@Z
 0x4030dc __p__commode
 0x4030e0 __p__fmode
 0x4030e4 _adjust_fdiv
 0x4030e8 _encode_pointer
 0x4030ec _configthreadlocale
 0x4030f0 _initterm_e
 0x4030f4 _initterm
 0x4030f8 _wcmdln
 0x4030fc exit
 0x403100 _XcptFilter
 0x403104 _exit
 0x403108 _cexit
 0x40310c __wgetmainargs
 0x403110 _amsg_exit
 0x403114 __set_app_type
 0x403118 ?terminate@@YAXXZ
 0x40311c _unlock
 0x403120 __dllonexit
 0x403124 _lock
 0x403128 ??3@YAXPAX@Z
 0x40312c _encoded_null
 0x403130 __FrameUnwindFilter
 0x403134 _onexit
 0x403138 _decode_pointer
 0x40313c _except_handler4_common
 0x403140 _invoke_watson
 0x403144 _controlfp_s
 0x403148 __setusermatherr
 0x40314c _crt_debugger_hook
 0x403150 printf
KERNEL32.dll
 0x403038 GetFileType
 0x40303c GetModuleHandleA
 0x403040 GetProcessId
 0x403044 GlobalAlloc
 0x403048 GetLastError
 0x40304c GetProcAddress
 0x403050 GetSystemRegistryQuota
 0x403054 GetSystemTimes
 0x403058 LocalFileTimeToFileTime
 0x40305c CompareFileTime
 0x403060 GetNativeSystemInfo
 0x403064 IsProcessorFeaturePresent
 0x403068 LoadLibraryW
 0x40306c LoadLibraryA
 0x403070 IsDebuggerPresent
 0x403074 UnhandledExceptionFilter
 0x403078 InterlockedExchange
 0x40307c Sleep
 0x403080 InterlockedCompareExchange
 0x403084 GetStartupInfoW
 0x403088 SetUnhandledExceptionFilter
 0x40308c QueryPerformanceCounter
 0x403090 GetTickCount
 0x403094 GetCurrentThreadId
 0x403098 GetCurrentProcessId
 0x40309c GetSystemTimeAsFileTime
 0x4030a0 TerminateProcess
 0x4030a4 GetCurrentProcess
USER32.dll
 0x403168 CreateWindowExA
 0x40316c ShowWindow
 0x403170 UpdateWindow
 0x403174 SetCursor
 0x403178 GetWindowTextLengthA
 0x40317c AdjustWindowRect
 0x403180 GetClientRect
 0x403184 AnimateWindow
 0x403188 LoadIconW
 0x40318c CreateCaret
GDI32.dll
 0x403010 SetPolyFillMode
 0x403014 BitBlt
 0x403018 CreateDiscardableBitmap
 0x40301c EndPath
 0x403020 StretchBlt
 0x403024 GetPolyFillMode
 0x403028 CreateEllipticRgn
 0x40302c CreateDIBitmap
 0x403030 SetWinMetaFileBits
ADVAPI32.dll
 0x403000 ReportEventA
SHELL32.dll
 0x403158 DragQueryPoint
 0x40315c DragAcceptFiles
 0x403160 ShellExecuteW
MSIMG32.dll
 0x4030ac TransparentBlt
 0x4030b0 GradientFill
COMCTL32.dll
 0x403008 None
WINHTTP.dll
 0x403194 WinHttpConnect
 0x403198 WinHttpOpenRequest
MSVCP90.dll
 0x4030b8 ??_D?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
 0x4030bc ??_F?$basic_stringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
 0x4030c0 ??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@PBDHH@Z
 0x4030c4 ??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
msvcm90.dll
 0x4031a8 ?ThrowNestedModuleLoadException@@@YAXP$AAVException@System@@0@Z
 0x4031ac ?DoDllLanguageSupportValidation@@@YAXXZ
 0x4031b0 ?ThrowModuleLoadException@@@YAXP$AAVString@System@@P$AAVException@3@@Z
 0x4031b4 ?DoCallBackInDefaultDomain@@@YAXP6GJPAX@Z0@Z
 0x4031b8 ?RegisterModuleUninitializer@@@YAXP$AAVEventHandler@System@@@Z
 0x4031bc ?ThrowModuleLoadException@@@YAXP$AAVString@System@@@Z
mscoree.dll
 0x4031a0 _CorExeMain

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure