Report - avicapn32.exe

Malicious Library Malicious Packer UPX PE32 PE File
ScreenShot
Created 2022.12.10 15:05 Machine s1_win7_x6401
Filename avicapn32.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
4.6
ZERO API file : malware
VT API (file) 35 detected (malicious, high confidence, GenericKD, Unsafe, Clipbanker, Vs3f, ZexaF, @V1@aCYhf5hi, Attribute, HighConfidence, a variant of WinGo, TrojanX, FalseSign, Gdhl, Artemis, moderate, score, Cometer, CYW14J, Detected, kcloud, Sabsik, ai score=80, R002H0DL822, ZMUnES72JpS, PossibleThreat)
md5 0f6ef96c5e687631ef27f1dcd1afe7b4
sha256 38381a42975028b181430a80d6009988d0d0cfa42493d3efbbfb72d3abe97648
ssdeep 196608:dwT9pIuAU3qr4DZDZWHvmwIHEQWiXkOSsCYSwD8Qtwi85lW:wv6YDWHvm3HznXk+C12t45lW
imphash f20145218f8ed6aecc62233c748b3dfb
impfuzzy 3:ssD7SbolWxzxWAA8VybAJUgEJJ67UgDkSxqrJ1MO/OywWBJAEPwSx2AEZsS9KTX6:pajXA8VyH/JLGMZ/OiBJAEnERGDW
  Network IP location

Signature (10cnts)

Level Description
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://45.159.188.118/bot/online?guid=test22-PC\test22&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 NL HOSTING-SOLUTIONS 45.159.188.118 24799 mailcious
http://45.159.188.118/bot/regex?key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34 NL HOSTING-SOLUTIONS 45.159.188.118 24798 mailcious
45.159.188.118 NL HOSTING-SOLUTIONS 45.159.188.118 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0xcd8000 WriteFile
kernel32.dll
 0xcd8008 GetSystemTimeAsFileTime
USER32.dll
 0xcd8010 CharUpperBuffW
kernel32.dll
 0xcd8018 LocalAlloc
 0xcd801c LocalFree
 0xcd8020 GetModuleFileNameW
 0xcd8024 ExitProcess
 0xcd8028 LoadLibraryA
 0xcd802c GetModuleHandleA
 0xcd8030 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure