Report - aloy64.exe

UPX OS Processor Check PE File PE64
ScreenShot
Created 2022.12.09 10:26 Machine s1_win7_x6402
Filename aloy64.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
8
Behavior Score
3.0
ZERO API file : clean
VT API (file) 20 detected (CobaltStrike, malicious, high confidence, Artemis, confidence, 100%, Attribute, HighConfidence, Cobalt, high, score, kcloud, Sabsik, CLOUD, TrojanX)
md5 1cb5a9c2bc4adfe101f6069d525ba9b2
sha256 40ab463703114d972269c34abeecf0f796c88c20cceaaf0e582ed0a132e556fa
ssdeep 6144:fduncjk3xxCY3Z57rsM/f+xpnW3IpULzArfC43Qp951nHhZW4oI29NyA6xUjqQ43:f1jkRLsGGxpnWjL8G4qot9NGxUjqQ4L
imphash a35f121ed76d9b1e75ce64250798b7ea
impfuzzy 12:8JZI+3Mmfh+i7hxvGuQZGB80qXJXPXJwdzrJEnDx9A41mLRBRZqRq0sfbZHur:iqSMmVrvJwK80qteJEnDx95uc/ObZHur
  Network IP location

Signature (8cnts)

Level Description
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (8cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://apps.identrust.com/roots/dstrootcax3.p7c US CCCH-3 23.43.165.66 clean
https://aloyadakmashin.com/wp-content/chunky/rDB1NLsu9aUkPE5NGS_57H2NjPwKcJkELAYMrCPRP8APG07YdNMRwmlP4jgrz9k4UzXihBNpdYbMabkKcr08KoABeTtw4TVhXlqVZfsvQh0_7Muf59hT_2girKV1lW50cnbaXgwqawnYLybzElJH587MaijvV3y3BeA0oOYWAzfx5clB/soup.gif US CLOUDFLARENET 104.21.4.44 clean
https://aloyadakmashin.com/wp-content/chunky/Scx5kV7S-QDBwELo_NP1SZhxgFnvjJWhyfoACcYtM2Xq50J9kS8dZ4yz7p3OM9WdtsnuIfaVeSMplbWvl0Ewj2X9dZ6VHTnEu6aZwB7TTrjaEMc6AiRfWo3eoACQaWLRl4rW--nWZ6w90ypW965LQiswZo0Kq3AS4Bw4BQPqD5IUGcXk/soup.gif US CLOUDFLARENET 104.21.4.44 clean
https://aloyadakmashin.com/wp-content/chunky/8uODOeX9A6h677hAR_wP4SNeevFUo28JctX6oX0Cyc1RyLjVKgDnzzecFDV1HC81DeYUiU26g4uSuk8HLG7KJ97SjzYuMsNsAIljaKX8tBBhPz2SuQul8jbxWqgrRph5LKUsU1L5nQSG_ND-TIGx6pAfnCWxhIq6WzPCrbjF9TqvNj9M/soup.gif US CLOUDFLARENET 104.21.4.44 clean
apps.identrust.com US CCCH-3 23.43.165.66 clean
aloyadakmashin.com US CLOUDFLARENET 172.67.131.166 clean
104.21.4.44 US CLOUDFLARENET 104.21.4.44 clean
23.44.173.97 US Akamai International B.V. 23.44.173.97 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140019000 CreateFileA
 0x140019008 CloseHandle
 0x140019010 GetLastError
 0x140019018 CreateActCtxA
 0x140019020 ActivateActCtx
 0x140019028 DeactivateActCtx
 0x140019030 CreateThread
 0x140019038 ResumeThread
 0x140019040 FindFirstFileA
 0x140019048 FindNextFileA
 0x140019050 GetStdHandle
 0x140019058 ReadFile
 0x140019060 GetFileSize
 0x140019068 SetFileAttributesA
 0x140019070 ReleaseActCtx
 0x140019078 CreateFileMappingA
 0x140019080 CreateNamedPipeA
 0x140019088 PeekNamedPipe
 0x140019090 ExitProcess
 0x140019098 VirtualAlloc
 0x1400190a0 RaiseException
 0x1400190a8 RtlCaptureContext
 0x1400190b0 RtlLookupFunctionEntry
 0x1400190b8 RtlVirtualUnwind
 0x1400190c0 IsDebuggerPresent
 0x1400190c8 UnhandledExceptionFilter
 0x1400190d0 SetUnhandledExceptionFilter
 0x1400190d8 GetCurrentProcess
 0x1400190e0 TerminateProcess
 0x1400190e8 IsProcessorFeaturePresent
 0x1400190f0 SetLastError
 0x1400190f8 HeapAlloc
 0x140019100 HeapFree
 0x140019108 GetModuleHandleW
 0x140019110 GetProcAddress
 0x140019118 TlsGetValue
 0x140019120 TlsSetValue
 0x140019128 FreeLibrary
 0x140019130 LoadLibraryExW
 0x140019138 CompareStringW
 0x140019140 LCMapStringW
 0x140019148 EnterCriticalSection
 0x140019150 LeaveCriticalSection
 0x140019158 IsValidCodePage
 0x140019160 GetACP
 0x140019168 GetOEMCP
 0x140019170 GetCPInfo
 0x140019178 GetModuleHandleExW
 0x140019180 GetStringTypeW
 0x140019188 MultiByteToWideChar
 0x140019190 WideCharToMultiByte
 0x140019198 HeapSize
 0x1400191a0 HeapReAlloc
 0x1400191a8 RtlUnwindEx
 0x1400191b0 GetEnvironmentStringsW
 0x1400191b8 FreeEnvironmentStringsW
 0x1400191c0 SetEnvironmentVariableA

EAT(Export Address Table) Library



Similarity measure (PE file only) - Checking for service failure