Report - 502.exe

Malicious Library UPX PE32 OS Processor Check PE File
ScreenShot
Created 2022.12.09 15:12 Machine s1_win7_x6401
Filename 502.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
2.8
ZERO API file : malware
VT API (file) 55 detected (Mint, Ransomware, GenericRI, S16459571, Unsafe, Filecoder, Save, malicious, Eldorado, Cryptolocker, high confidence, score, DeathRansom, hngtyg, Gencirc, AGEN, CRYPTOLOCK, NetLoader, FileCrypter, ai score=88, Wacatac, Synder0s18, Detected, R343432, GenericRXLK, BitRansomware, BScope, FileCryptor, vS4hrXmF9DB, K3ePO8ZFcEM, susgen, ZexaF, gqW@aSLGXEk, GdSda)
md5 842d42bb052a77759c8f55d46021b2e0
sha256 89844786bb2290797309c881c49a38f8502c39342bf2d9fecdc4ac5b4735f1d4
ssdeep 3072:zSXsRZb0m4BbJpVIYbQf91G3im/2Ef07JysgIXHjg+grwBR1imy3Lh+puYRJy1Cf:GHpVCzGFmRuYRKj7b8
imphash 0ca311d567c0202f7a711f8080ed1bbf
impfuzzy 48:pjFMY/7G7DBeDs3p+yX1dtwX7np9Z03bKQfxQNQ:liYTG7DAs3p+yX1dtwX7np9ZVCyNQ
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
watch Creates known Hupigon files
watch Writes a potential ransom message to disk
notice Creates executable files on the filesystem

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

SHLWAPI.dll
 0x4131bc wnsprintfW
 0x4131c0 StrStrIW
MPR.dll
 0x413184 WNetCloseEnum
 0x413188 WNetAddConnection2W
 0x41318c WNetOpenEnumW
 0x413190 WNetGetConnectionW
 0x413194 WNetEnumResourceW
RstrtMgr.DLL
 0x4131a8 RmStartSession
 0x4131ac RmEndSession
 0x4131b0 RmRegisterResources
 0x4131b4 RmGetList
KERNEL32.dll
 0x413010 LCMapStringW
 0x413014 GetStringTypeW
 0x413018 GetFileType
 0x41301c ReadFile
 0x413020 WriteFile
 0x413024 TerminateProcess
 0x413028 WaitForSingleObject
 0x41302c CreateFileW
 0x413030 OpenProcess
 0x413034 SetFileAttributesW
 0x413038 CloseHandle
 0x41303c SetFilePointerEx
 0x413040 GetFileSize
 0x413044 GetCurrentProcessId
 0x413048 GetLogicalDrives
 0x41304c FindFirstFileW
 0x413050 FindFirstVolumeW
 0x413054 HeapFree
 0x413058 FindNextFileW
 0x41305c GetCurrentProcess
 0x413060 lstrlenW
 0x413064 WaitForMultipleObjects
 0x413068 lstrlenA
 0x41306c FindClose
 0x413070 GetModuleHandleA
 0x413074 Sleep
 0x413078 lstrcatW
 0x41307c CreateThread
 0x413080 HeapAlloc
 0x413084 SetVolumeMountPointW
 0x413088 GetProcAddress
 0x41308c FindVolumeClose
 0x413090 GetProcessHeap
 0x413094 GetVolumePathNamesForVolumeNameW
 0x413098 lstrcpyW
 0x41309c FindNextVolumeW
 0x4130a0 lstrcmpiW
 0x4130a4 GetTickCount
 0x4130a8 lstrcmpW
 0x4130ac MoveFileW
 0x4130b0 GetDriveTypeW
 0x4130b4 EnterCriticalSection
 0x4130b8 ReleaseSemaphore
 0x4130bc LeaveCriticalSection
 0x4130c0 InitializeCriticalSection
 0x4130c4 DeleteCriticalSection
 0x4130c8 CreateSemaphoreW
 0x4130cc SetStdHandle
 0x4130d0 GetConsoleMode
 0x4130d4 WriteConsoleW
 0x4130d8 DecodePointer
 0x4130dc HeapSize
 0x4130e0 SetThreadPriority
 0x4130e4 GetConsoleCP
 0x4130e8 FlushFileBuffers
 0x4130ec FreeEnvironmentStringsW
 0x4130f0 GetEnvironmentStringsW
 0x4130f4 WideCharToMultiByte
 0x4130f8 UnhandledExceptionFilter
 0x4130fc SetUnhandledExceptionFilter
 0x413100 IsProcessorFeaturePresent
 0x413104 QueryPerformanceCounter
 0x413108 GetCurrentThreadId
 0x41310c GetSystemTimeAsFileTime
 0x413110 InitializeSListHead
 0x413114 IsDebuggerPresent
 0x413118 GetStartupInfoW
 0x41311c GetModuleHandleW
 0x413120 RtlUnwind
 0x413124 GetLastError
 0x413128 SetLastError
 0x41312c InitializeCriticalSectionAndSpinCount
 0x413130 TlsAlloc
 0x413134 TlsGetValue
 0x413138 TlsSetValue
 0x41313c TlsFree
 0x413140 FreeLibrary
 0x413144 LoadLibraryExW
 0x413148 RaiseException
 0x41314c GetStdHandle
 0x413150 GetModuleFileNameW
 0x413154 ExitProcess
 0x413158 GetModuleHandleExW
 0x41315c FindFirstFileExW
 0x413160 IsValidCodePage
 0x413164 GetACP
 0x413168 GetOEMCP
 0x41316c GetCPInfo
 0x413170 GetCommandLineA
 0x413174 GetCommandLineW
 0x413178 MultiByteToWideChar
 0x41317c HeapReAlloc
USER32.dll
 0x4131c8 wsprintfA
 0x4131cc wsprintfW
ADVAPI32.dll
 0x413000 CryptAcquireContextA
 0x413004 CryptReleaseContext
 0x413008 CryptGenRandom
ole32.dll
 0x4131d4 CoCreateInstance
 0x4131d8 CoSetProxyBlanket
OLEAUT32.dll
 0x41319c VariantInit
 0x4131a0 VariantClear

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure