Report - Talking-Points-with-China-PLAAF.exe

Gen2 Generic Malware PhysicalDrive Malicious Packer ASPack UPX Malicious Library OS Processor Check PE32 PE File
ScreenShot
Created 2023.02.22 09:32 Machine s1_win7_x6403
Filename Talking-Points-with-China-PLAAF.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.0
ZERO API
VT API (file) 22 detected (GenericKD, Remcos, Attribute, HighConfidence, malicious, high confidence, AFAK, Artemis, Sysdupate, Onkods, Q@52urg7, ai score=84, BScope, Unsafe, CLOUD, confidence)
md5 d51e8ebb04a5849f46514dcaef7f4c32
sha256 3a573796b5e6f1cc3a92eef7e268fa4e74aeddf34f5dd62f7b02109fe560ecd2
ssdeep 12288:3iSHMv8y+XQcA6AJPe+kDuOlwflEzQBxfQPoQaM010P4AiwlUpq+C3AXwvYzcOFG:3K+XQcA6Z7vglEE1Qv3qUTQLwurLM
imphash 4dd24c5aa6efe26191b8c320e81469c3
impfuzzy 24:R6zxilDSsb3lEJ3JjqMUyHateS1Ghnc+plm/CGB5vRSOovbObwsR1GjtAjd:RCNsbVEwteS1G5c+pfij3bJ
  Network IP location

Signature (4cnts)

Level Description
warning File has been identified by 22 AntiVirus engines on VirusTotal as malicious
watch Queries information on disks
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system

Rules (10cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
warning PhysicalDrive_20181001 (no description) binaries (upload)
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x412008 DeviceIoControl
 0x41200c VirtualAlloc
 0x412010 GetModuleFileNameW
 0x412014 VirtualAllocExNuma
 0x412018 Thread32Next
 0x41201c CreateFileW
 0x412020 lstrcmpA
 0x412024 GetSystemDirectoryW
 0x412028 OpenProcess
 0x41202c CreateToolhelp32Snapshot
 0x412030 Sleep
 0x412034 OutputDebugStringW
 0x412038 K32GetModuleBaseNameW
 0x41203c lstrcatW
 0x412040 GlobalAlloc
 0x412044 CloseHandle
 0x412048 GetSystemInfo
 0x41204c K32GetModuleInformation
 0x412050 GetCurrentProcess
 0x412054 GetProcAddress
 0x412058 VirtualAllocEx
 0x41205c ExitProcess
 0x412060 VerSetConditionMask
 0x412064 GlobalMemoryStatusEx
 0x412068 GetModuleHandleW
 0x41206c FreeLibrary
 0x412070 CopyFileW
 0x412074 lstrcpyW
 0x412078 VerifyVersionInfoW
 0x41207c K32EnumProcessModules
 0x412080 CreateFileMappingW
 0x412084 MapViewOfFile
 0x412088 OpenThread
 0x41208c WriteConsoleW
 0x412090 SetLastError
 0x412094 LoadLibraryW
 0x412098 VirtualProtect
 0x41209c HeapReAlloc
 0x4120a0 HeapSize
 0x4120a4 SetFilePointerEx
 0x4120a8 GetConsoleMode
 0x4120ac GetConsoleOutputCP
 0x4120b0 FlushFileBuffers
 0x4120b4 GetProcessHeap
 0x4120b8 GetStringTypeW
 0x4120bc SetStdHandle
 0x4120c0 FreeEnvironmentStringsW
 0x4120c4 GetEnvironmentStringsW
 0x4120c8 UnhandledExceptionFilter
 0x4120cc SetUnhandledExceptionFilter
 0x4120d0 TerminateProcess
 0x4120d4 IsProcessorFeaturePresent
 0x4120d8 QueryPerformanceCounter
 0x4120dc GetCurrentProcessId
 0x4120e0 GetCurrentThreadId
 0x4120e4 GetSystemTimeAsFileTime
 0x4120e8 InitializeSListHead
 0x4120ec IsDebuggerPresent
 0x4120f0 GetStartupInfoW
 0x4120f4 RtlUnwind
 0x4120f8 GetLastError
 0x4120fc EnterCriticalSection
 0x412100 LeaveCriticalSection
 0x412104 DeleteCriticalSection
 0x412108 InitializeCriticalSectionAndSpinCount
 0x41210c TlsAlloc
 0x412110 TlsGetValue
 0x412114 TlsSetValue
 0x412118 TlsFree
 0x41211c LoadLibraryExW
 0x412120 EncodePointer
 0x412124 RaiseException
 0x412128 GetStdHandle
 0x41212c WriteFile
 0x412130 GetModuleHandleExW
 0x412134 HeapAlloc
 0x412138 HeapFree
 0x41213c LCMapStringW
 0x412140 GetFileType
 0x412144 FindClose
 0x412148 FindFirstFileExW
 0x41214c FindNextFileW
 0x412150 IsValidCodePage
 0x412154 GetACP
 0x412158 GetOEMCP
 0x41215c GetCPInfo
 0x412160 GetCommandLineA
 0x412164 GetCommandLineW
 0x412168 MultiByteToWideChar
 0x41216c WideCharToMultiByte
 0x412170 DecodePointer
USER32.dll
 0x412178 MessageBoxW
ADVAPI32.dll
 0x412000 OpenSCManagerA
ole32.dll
 0x412198 CoInitialize
WINHTTP.dll
 0x412180 WinHttpConnect
 0x412184 WinHttpSendRequest
 0x412188 WinHttpOpen
 0x41218c WinHttpOpenRequest
 0x412190 WinHttpCloseHandle

EAT(Export Address Table) Library

0x403130 PostBuildPatch
0x403150 dmain


Similarity measure (PE file only) - Checking for service failure