Report - LIMSt.exe

Malicious Library Malicious Packer UPX OS Processor Check PE File PE64
ScreenShot
Created 2022.12.13 09:52 Machine s1_win7_x6403
Filename LIMSt.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
5
Behavior Score
7.8
ZERO API file : malware
VT API (file) 49 detected (Coins, malicious, high confidence, GenericKDZ, Unsafe, Vetn, TrojanPSW, ABRisk, UPPS, Attribute, HighConfidence, a variant of WinGo, jtpdda, score, QQPass, QQRob, Bnhl, tovmp, Genkd, PSWTroj, kcloud, Sabsik, Vigorf, Detected, Artemis, ai score=84, Chgt, R002H0CKU22, CLOUD, TurtleLoader, susgen, PossibleThreat)
md5 b26439eb7f5e2a7f1e2dabcfa8e3a7b1
sha256 47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e
ssdeep 49152:EW32/5cuXfOG+CwXxDebqytiJCaLsL6M8Aoek1d:anXWRxDQqCLd8AK
imphash 9cbefe68f395e67356e2a5d8d1b285c0
impfuzzy 24:UbVjhNwO+VuT2oLtXOr6kwmDruMztxdEr6tP:KwO+VAXOmGx0oP
  Network IP location

Signature (18cnts)

Level Description
danger File has been identified by 49 AntiVirus engines on VirusTotal as malicious
watch Appends a known multi-family ransomware file extension to files that have been encrypted
watch Attempts to identify installed AV products by installation directory
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
watch Harvests credentials from local email clients
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice One or more potentially interesting buffers were extracted
notice Steals private information from local Internet browsers
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
185.239.239.194 DE active 1 GmbH 185.239.239.194 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x6b0220 WriteFile
 0x6b0228 WriteConsoleW
 0x6b0230 WaitForMultipleObjects
 0x6b0238 WaitForSingleObject
 0x6b0240 VirtualQuery
 0x6b0248 VirtualFree
 0x6b0250 VirtualAlloc
 0x6b0258 SwitchToThread
 0x6b0260 SuspendThread
 0x6b0268 SetWaitableTimer
 0x6b0270 SetUnhandledExceptionFilter
 0x6b0278 SetProcessPriorityBoost
 0x6b0280 SetEvent
 0x6b0288 SetErrorMode
 0x6b0290 SetConsoleCtrlHandler
 0x6b0298 ResumeThread
 0x6b02a0 PostQueuedCompletionStatus
 0x6b02a8 LoadLibraryA
 0x6b02b0 LoadLibraryW
 0x6b02b8 SetThreadContext
 0x6b02c0 GetThreadContext
 0x6b02c8 GetSystemInfo
 0x6b02d0 GetSystemDirectoryA
 0x6b02d8 GetStdHandle
 0x6b02e0 GetQueuedCompletionStatusEx
 0x6b02e8 GetProcessAffinityMask
 0x6b02f0 GetProcAddress
 0x6b02f8 GetEnvironmentStringsW
 0x6b0300 GetConsoleMode
 0x6b0308 FreeEnvironmentStringsW
 0x6b0310 ExitProcess
 0x6b0318 DuplicateHandle
 0x6b0320 CreateWaitableTimerExW
 0x6b0328 CreateThread
 0x6b0330 CreateIoCompletionPort
 0x6b0338 CreateFileA
 0x6b0340 CreateEventA
 0x6b0348 CloseHandle
 0x6b0350 AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure