Report - ColorMC.exe

UPX Malicious Library OS Processor Check PE32 PE File
ScreenShot
Created 2023.03.05 14:27 Machine s1_win7_x6401
Filename ColorMC.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score Not founds Behavior Score
1.0
ZERO API file : malware
VT API (file) 14 detected (GenericKD, Artemis, xyands, Agow, ai score=82, R002H07BS23)
md5 3ace227a334fa18636c42ab18638abf2
sha256 fd107620a9bab6f816dfd4583119ae4f88253a901a46c1ed37e97ba7de7fb613
ssdeep 393216:h9DNFabhV8d9LNJ+y3k2woJuQFkyRmazVNEJVZOUcryo8mRHVG5xR:rDNFwVeey3kZoFVR8qyo8mByR
imphash c6e51dda1622035b42b177c9afe67c30
impfuzzy 48:9ZfCS93aScXpXr2n7QnJlD1/Gbq+pUGYlT/43F8tLECjIfunBXoylKGE:3fCSsScX5rw72l+q+pUFC
  Network IP location

Signature (3cnts)

Level Description
watch File has been identified by 14 AntiVirus engines on VirusTotal as malicious
info Checks amount of memory in system
info One or more processes crashed

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

advapi32.dll
 0x414268 RegCloseKey
 0x41426c RegEnumKeyExA
 0x414270 RegOpenKeyExA
 0x414274 RegQueryValueExA
kernel32.dll
 0x41427c CloseHandle
 0x414280 CreateMutexA
 0x414284 CreateProcessA
 0x414288 DeleteCriticalSection
 0x41428c EnterCriticalSection
 0x414290 ExitProcess
 0x414294 FindResourceExA
 0x414298 FormatMessageA
 0x41429c GetCommandLineA
 0x4142a0 GetCurrentDirectoryA
 0x4142a4 GetCurrentProcess
 0x4142a8 GetEnvironmentVariableA
 0x4142ac GetExitCodeProcess
 0x4142b0 GetLastError
 0x4142b4 GetModuleFileNameA
 0x4142b8 GetModuleHandleA
 0x4142bc GetProcAddress
 0x4142c0 GetStartupInfoA
 0x4142c4 GlobalMemoryStatusEx
 0x4142c8 InitializeCriticalSection
 0x4142cc LeaveCriticalSection
 0x4142d0 LoadResource
 0x4142d4 LocalFree
 0x4142d8 LockResource
 0x4142dc SetEnvironmentVariableA
 0x4142e0 SetLastError
 0x4142e4 SetUnhandledExceptionFilter
 0x4142e8 TlsGetValue
 0x4142ec VirtualProtect
 0x4142f0 VirtualQuery
 0x4142f4 WaitForSingleObject
msvcrt.dll
 0x4142fc _strdup
 0x414300 _stricoll
msvcrt.dll
 0x414308 __getmainargs
 0x41430c __p__environ
 0x414310 __p__fmode
 0x414314 __set_app_type
 0x414318 _cexit
 0x41431c _chdir
 0x414320 _close
 0x414324 _errno
 0x414328 _findclose
 0x41432c _findfirst
 0x414330 _findnext
 0x414334 _fullpath
 0x414338 _iob
 0x41433c _itoa
 0x414340 _onexit
 0x414344 _open
 0x414348 _read
 0x41434c _setmode
 0x414350 _stat64
 0x414354 _stricmp
 0x414358 abort
 0x41435c atexit
 0x414360 atoi
 0x414364 calloc
 0x414368 fclose
 0x41436c fopen
 0x414370 fprintf
 0x414374 fputs
 0x414378 free
 0x41437c fwrite
 0x414380 isspace
 0x414384 malloc
 0x414388 mbstowcs
 0x41438c memcpy
 0x414390 printf
 0x414394 puts
 0x414398 realloc
 0x41439c setlocale
 0x4143a0 signal
 0x4143a4 strcat
 0x4143a8 strchr
 0x4143ac strcmp
 0x4143b0 strcoll
 0x4143b4 strcpy
 0x4143b8 strlen
 0x4143bc strncat
 0x4143c0 strncpy
 0x4143c4 strpbrk
 0x4143c8 strrchr
 0x4143cc strstr
 0x4143d0 strtok
 0x4143d4 tolower
 0x4143d8 vfprintf
 0x4143dc wcstombs
shell32.dll
 0x4143e4 ShellExecuteA
user32.dll
 0x4143ec CreateWindowExA
 0x4143f0 DispatchMessageA
 0x4143f4 EnumWindows
 0x4143f8 FindWindowExA
 0x4143fc GetMessageA
 0x414400 GetSystemMetrics
 0x414404 GetWindowLongA
 0x414408 GetWindowRect
 0x41440c GetWindowTextA
 0x414410 GetWindowThreadProcessId
 0x414414 KillTimer
 0x414418 LoadImageA
 0x41441c MessageBoxA
 0x414420 PostQuitMessage
 0x414424 SendMessageA
 0x414428 SetForegroundWindow
 0x41442c SetTimer
 0x414430 SetWindowPos
 0x414434 ShowWindow
 0x414438 TranslateMessage
 0x41443c UpdateWindow

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure