ScreenShot
Created | 2022.12.21 09:48 | Machine | s1_win7_x6403 |
Filename | mine.exe | ||
Type | PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 18 detected (malicious, high confidence, Unsafe, confidence, 100%, Attribute, HighConfidence, Rozena, score, Static AI, Suspicious PE, Sabsik, dGZlOgWA6HZ4B1eZ7Q, ZexaF, zKW@aqRThDb) | ||
md5 | 1b1bae0b503d1aa9d659db31ed2cd208 | ||
sha256 | 8beea44520f307488f94d04241245ac943e2013f165308bac4277efae326c060 | ||
ssdeep | 6144:YKdKe+GXmr07DPIE5e20BnJSpY2vGo/WEVSMofYZzPtWMIvA1h7OHpjo9KK:YOkFr07d5e5gVLVPtW/Y1h7mp | ||
imphash | d864a0f85533793e0e80b085aa445269 | ||
impfuzzy | 12:4gfdMOMRJRJbJ2cDY5ARKLqRLAYPXJHqVzZ4GQGX5XGXKYIk6lTpJqJiZn:vfefJFlDrFLVKhTX5XGKkoDqoZn |
Network IP location
Signature (25cnts)
Level | Description |
---|---|
danger | Executed a process and injected code into it |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | File has been identified by 18 AntiVirus engines on VirusTotal as malicious |
watch | Installs itself for autorun at Windows startup |
watch | Manipulates memory of a non-child process indicative of process injection |
watch | One or more of the buffers contains an embedded PE file |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Creates a shortcut to an executable file |
notice | Creates a suspicious process |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
info | Uses Windows APIs to generate a cryptographic key |
Rules (19cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
watch | Antivirus | Contains references to security software | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
watch | Win32_Trojan_PWS_Net_1_Zero | Win32 Trojan PWS .NET Azorult | binaries (download) |
info | anti_dbg | Checks if being debugged | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | Is_DotNET_EXE | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
info | Win_Backdoor_AsyncRAT_Zero | Win Backdoor AsyncRAT | binaries (download) |
Network (8cnts) ?
Suricata ids
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x4670f4 AddAtomW
0x4670f8 AssignProcessToJobObject
0x4670fc DeleteCriticalSection
0x467100 EnterCriticalSection
0x467104 FreeConsole
0x467108 FreeLibrary
0x46710c GetLastError
0x467110 GetModuleHandleA
0x467114 GetProcAddress
0x467118 GetProcessHeap
0x46711c GetStartupInfoA
0x467120 InitializeCriticalSection
0x467124 IsProcessorFeaturePresent
0x467128 LeaveCriticalSection
0x46712c LoadLibraryA
0x467130 SetUnhandledExceptionFilter
0x467134 Sleep
0x467138 TlsGetValue
0x46713c VirtualProtect
0x467140 VirtualQuery
msvcrt.dll
0x467148 __getmainargs
0x46714c __initenv
0x467150 __p__acmdln
0x467154 __p__commode
0x467158 __p__fmode
0x46715c __set_app_type
0x467160 __setusermatherr
0x467164 _amsg_exit
0x467168 _cexit
0x46716c _initterm
0x467170 _iob
0x467174 _onexit
0x467178 abort
0x46717c calloc
0x467180 exit
0x467184 fprintf
0x467188 free
0x46718c fwrite
0x467190 malloc
0x467194 memcpy
0x467198 signal
0x46719c strlen
0x4671a0 strncmp
0x4671a4 vfprintf
EAT(Export Address Table) is none
KERNEL32.dll
0x4670f4 AddAtomW
0x4670f8 AssignProcessToJobObject
0x4670fc DeleteCriticalSection
0x467100 EnterCriticalSection
0x467104 FreeConsole
0x467108 FreeLibrary
0x46710c GetLastError
0x467110 GetModuleHandleA
0x467114 GetProcAddress
0x467118 GetProcessHeap
0x46711c GetStartupInfoA
0x467120 InitializeCriticalSection
0x467124 IsProcessorFeaturePresent
0x467128 LeaveCriticalSection
0x46712c LoadLibraryA
0x467130 SetUnhandledExceptionFilter
0x467134 Sleep
0x467138 TlsGetValue
0x46713c VirtualProtect
0x467140 VirtualQuery
msvcrt.dll
0x467148 __getmainargs
0x46714c __initenv
0x467150 __p__acmdln
0x467154 __p__commode
0x467158 __p__fmode
0x46715c __set_app_type
0x467160 __setusermatherr
0x467164 _amsg_exit
0x467168 _cexit
0x46716c _initterm
0x467170 _iob
0x467174 _onexit
0x467178 abort
0x46717c calloc
0x467180 exit
0x467184 fprintf
0x467188 free
0x46718c fwrite
0x467190 malloc
0x467194 memcpy
0x467198 signal
0x46719c strlen
0x4671a0 strncmp
0x4671a4 vfprintf
EAT(Export Address Table) is none