Report - file.exe

Generic Malware Malicious Library Malicious Packer UPX Antivirus PE32 OS Processor Check PE File PowerShell
ScreenShot
Created 2022.12.13 13:27 Machine s1_win7_x6401
Filename file.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
11
Behavior Score
10.0
ZERO API file : malware
VT API (file) 40 detected (AIDetect, malware1, PsDownload, Fragtor, Unsafe, Save, Kryptik, malicious, confidence, Eldorado, Attribute, HighConfidence, high confidence, HROL, score, CrypterX, Shohdi, high, ai score=82, kcloud, Sabsik, Detected, GenericRXUR, BScope, TrojanPSW, Coins, CLASSIC, susgen, ZexaF, qCW@aWkhyeoi)
md5 0db52d1259097e34f3e1d142ad75f9d1
sha256 1689115f18f0a6a898e7ffeb40ebb6235008522e436cb122cf3bb64bc2aed506
ssdeep 6144:0Y67I5LCHeUh8cOwE8LrZDa3Y4RCJOoOkvpb2/i:hqIx68cOwzLrZDa3fRCsoMi
imphash cddebb8fa6c0a087547241e14a7bb869
impfuzzy 24:+BKkhMULu9MBjHglZl9c+5jVeD+t9S18/l39yJEcMSOovbOwZY9Q3whe:+BKkDR4dc+Pt9S18/prH3nQ3Ue
  Network IP location

Signature (23cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious
watch Network communications indicative of a potential document or script payload download was initiated by the process powershell.exe
watch The process powershell.exe wrote an executable file to disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Drops an executable to the user AppData folder
notice Poweshell is sending data to a remote host
notice The binary likely contains encrypted or compressed data indicative of a packer
notice URL downloaded by powershell script
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info Powershell script has download & invoke calls
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info Uses Windows APIs to generate a cryptographic key

Rules (16cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts
info PowershellDI Extract Download/Invoke calls from powershell script scripts

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
e-hemsire.net FR OVH SAS 46.105.79.7 malware
46.105.79.7 FR OVH SAS 46.105.79.7 malware

Suricata ids

PE API

IAT(Import Address Table) Library

WININET.dll
 0x41e154 InternetReadFile
 0x41e158 InternetCloseHandle
 0x41e15c InternetCrackUrlW
 0x41e160 InternetOpenW
 0x41e164 InternetOpenUrlW
 0x41e168 InternetQueryDataAvailable
SHLWAPI.dll
 0x41e13c StrStrW
 0x41e140 wnsprintfW
KERNEL32.dll
 0x41e00c SetFilePointerEx
 0x41e010 GetConsoleMode
 0x41e014 GetConsoleOutputCP
 0x41e018 FlushFileBuffers
 0x41e01c WriteFile
 0x41e020 GetModuleFileNameW
 0x41e024 GetEnvironmentVariableW
 0x41e028 CreateFileW
 0x41e02c GetFileAttributesW
 0x41e030 GetSystemWow64DirectoryW
 0x41e034 GetLastError
 0x41e038 LoadLibraryA
 0x41e03c WriteConsoleW
 0x41e040 CloseHandle
 0x41e044 ExitProcess
 0x41e048 GetModuleHandleW
 0x41e04c lstrcpyW
 0x41e050 GetTempFileNameW
 0x41e054 HeapFree
 0x41e058 HeapReAlloc
 0x41e05c HeapAlloc
 0x41e060 GetProcessHeap
 0x41e064 WideCharToMultiByte
 0x41e068 HeapSize
 0x41e06c GetStringTypeW
 0x41e070 SetStdHandle
 0x41e074 EncodePointer
 0x41e078 lstrcatW
 0x41e07c GetStartupInfoW
 0x41e080 EnterCriticalSection
 0x41e084 LeaveCriticalSection
 0x41e088 DeleteCriticalSection
 0x41e08c SetEvent
 0x41e090 ResetEvent
 0x41e094 WaitForSingleObjectEx
 0x41e098 CreateEventW
 0x41e09c GetProcAddress
 0x41e0a0 UnhandledExceptionFilter
 0x41e0a4 SetUnhandledExceptionFilter
 0x41e0a8 GetCurrentProcess
 0x41e0ac TerminateProcess
 0x41e0b0 IsProcessorFeaturePresent
 0x41e0b4 IsDebuggerPresent
 0x41e0b8 DecodePointer
 0x41e0bc QueryPerformanceCounter
 0x41e0c0 GetCurrentProcessId
 0x41e0c4 GetCurrentThreadId
 0x41e0c8 GetSystemTimeAsFileTime
 0x41e0cc InitializeSListHead
 0x41e0d0 RaiseException
 0x41e0d4 InitializeCriticalSectionAndSpinCount
 0x41e0d8 TlsAlloc
 0x41e0dc TlsGetValue
 0x41e0e0 TlsSetValue
 0x41e0e4 TlsFree
 0x41e0e8 FreeLibrary
 0x41e0ec LoadLibraryExW
 0x41e0f0 SetLastError
 0x41e0f4 RtlUnwind
 0x41e0f8 GetModuleHandleExW
 0x41e0fc GetStdHandle
 0x41e100 FindClose
 0x41e104 FindFirstFileExW
 0x41e108 FindNextFileW
 0x41e10c IsValidCodePage
 0x41e110 GetACP
 0x41e114 GetOEMCP
 0x41e118 GetCPInfo
 0x41e11c GetCommandLineA
 0x41e120 GetCommandLineW
 0x41e124 MultiByteToWideChar
 0x41e128 GetEnvironmentStringsW
 0x41e12c FreeEnvironmentStringsW
 0x41e130 LCMapStringW
 0x41e134 GetFileType
USER32.dll
 0x41e148 wsprintfW
 0x41e14c MessageBoxA
ADVAPI32.dll
 0x41e000 GetSidSubAuthority
 0x41e004 GetSidSubAuthorityCount

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure