Report - CLEP.exe

NPKI Malicious Library Malicious Packer UPX PE32 PE File
ScreenShot
Created 2022.12.13 10:06 Machine s1_win7_x6403
Filename CLEP.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
3
Behavior Score
6.4
ZERO API file : malware
VT API (file) 57 detected (AIDetect, malware2, ClipBanker, tscz, malicious, moderate confidence, Tasker, Unsafe, Vv2b, Genus, Eldorado, Attribute, HighConfidence, a variant of WinGo, score, axla, jtndev, Ssmw, XPACK, ClipSpy, R002C0PKS22, 1XHSUKC, InversedShelma, Cycbot, kcloud, Trickbot, Detected, R535472, FTRG, ai score=85, LClipper, LaplasClipper, CLASSIC, Cometer, susgen, Chgt)
md5 2b3bff5880cb5d9ab44c302bd1047313
sha256 e65f40ce3d58d2634807945b468acf0fbc3f6b06631d499dcd99536ed4fae4bc
ssdeep 49152:l7LFs2B0KVUUzpyZ9vAaE5FKY/t76oUz7UQqAOiyjrbsnHzvSP9rsvl/m9NjJTnP:RpsC/VyZpoUzJqTknTRQdXOY
imphash 9cbefe68f395e67356e2a5d8d1b285c0
impfuzzy 24:UbVjhNwO+VuT2oLtXOr6kwmDruMztxdEr6tP:KwO+VAXOmGx0oP
  Network IP location

Signature (12cnts)

Level Description
danger File has been identified by 57 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Detects the presence of Wine emulator
watch Installs itself for autorun at Windows startup
watch Uses Sysinternals tools in order to add additional command line functionality
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (11cnts)

Level Name Description Collection
danger NPKI_Zero File included NPKI binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://clipper.guru/bot/online?guid=test22-PC\test22&key=5ef1aac7b3430729f6cbc95fb4d2d2a62582e7382955ffc87026077cb28ab31e NL HOSTING-SOLUTIONS 45.159.189.115 23131 mailcious
http://clipper.guru/bot/regex?key=5ef1aac7b3430729f6cbc95fb4d2d2a62582e7382955ffc87026077cb28ab31e NL HOSTING-SOLUTIONS 45.159.189.115 23132 mailcious
clipper.guru NL HOSTING-SOLUTIONS 45.159.189.115 mailcious
45.159.189.115 NL HOSTING-SOLUTIONS 45.159.189.115 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x84c100 WriteFile
 0x84c104 WriteConsoleW
 0x84c108 WaitForMultipleObjects
 0x84c10c WaitForSingleObject
 0x84c110 VirtualQuery
 0x84c114 VirtualFree
 0x84c118 VirtualAlloc
 0x84c11c SwitchToThread
 0x84c120 SuspendThread
 0x84c124 SetWaitableTimer
 0x84c128 SetUnhandledExceptionFilter
 0x84c12c SetProcessPriorityBoost
 0x84c130 SetEvent
 0x84c134 SetErrorMode
 0x84c138 SetConsoleCtrlHandler
 0x84c13c ResumeThread
 0x84c140 PostQueuedCompletionStatus
 0x84c144 LoadLibraryA
 0x84c148 LoadLibraryW
 0x84c14c SetThreadContext
 0x84c150 GetThreadContext
 0x84c154 GetSystemInfo
 0x84c158 GetSystemDirectoryA
 0x84c15c GetStdHandle
 0x84c160 GetQueuedCompletionStatusEx
 0x84c164 GetProcessAffinityMask
 0x84c168 GetProcAddress
 0x84c16c GetEnvironmentStringsW
 0x84c170 GetConsoleMode
 0x84c174 FreeEnvironmentStringsW
 0x84c178 ExitProcess
 0x84c17c DuplicateHandle
 0x84c180 CreateWaitableTimerExW
 0x84c184 CreateThread
 0x84c188 CreateIoCompletionPort
 0x84c18c CreateFileA
 0x84c190 CreateEventA
 0x84c194 CloseHandle
 0x84c198 AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure