Report - nik0300.exe

Gen2 UPX Malicious Library Malicious Packer OS Processor Check PE32 PE File DLL
ScreenShot
Created 2023.03.06 09:46 Machine s1_win7_x6403
Filename nik0300.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
6.0
ZERO API file : malware
VT API (file) 53 detected (MarsvapRosJ, Mufila, GenericKD, Vvd1, malicious, ABRisk, UMFG, Attribute, HighConfidence, high confidence, VMProtect, score, SpywareX, FalseSign, Jajl, VMProtBad, R011C0RBS23, Artemis, high, zrgkz, Malware@#18ikzniv0m78a, Casdet, Detected, ai score=89, Private, RisePro, gnJOwaQzABC, +Ql8xVVUN5I, susgen, PossibleThreat, ZexaF, @F1@aWRH1jfi, Chgt, confidence, 100%)
md5 646f9a44ad9c8719b45951a29f8d3c6d
sha256 5e02b528b2cb0f1884c45c6dc3b095a8a6a8a9ae775aafa265d28a46af969c28
ssdeep 196608:58t40NmBV779xciWmIiIrHRmgi4EPP1EZ2RRT7/8:+y8SVDBOrHRmgTE37RT70
imphash 3ce373431b23a98306ac88d16ec3e778
impfuzzy 96:105yK6cGtp2tDE+1PssfPrXni5t3M8F+SVUdN1AXB+Zcp+qjOGXtpl9cbXpcu/:16yGGWtDBsF+XmR+oEZcg
  Network IP location

Signature (14cnts)

Level Description
danger File has been identified by 53 AntiVirus engines on VirusTotal as malicious
watch Attempts to create or modify system certificates
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Looks up the external IP address
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (13cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (8cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://api.db-ip.com/v2/p31e4d59ee6ad1a0b5cc80695a873e43a8fbca06/self US CLOUDFLARENET 172.67.75.166
https://db-ip.com/ US CLOUDFLARENET 104.26.4.15
ipinfo.io US GOOGLE 34.117.59.81
db-ip.com US CLOUDFLARENET 104.26.4.15
api.db-ip.com US CLOUDFLARENET 104.26.5.15
172.67.75.166 US CLOUDFLARENET 172.67.75.166
104.26.4.15 US CLOUDFLARENET 104.26.4.15
34.117.59.81 US GOOGLE 34.117.59.81

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0xebd000 FreeResource
 0xebd004 CreateToolhelp32Snapshot
 0xebd008 MultiByteToWideChar
 0xebd00c Sleep
 0xebd010 GetTempPathA
 0xebd014 GetModuleHandleExA
 0xebd018 GetTimeZoneInformation
 0xebd01c CopyFileA
 0xebd020 GetLastError
 0xebd024 GetFileAttributesA
 0xebd028 TzSpecificLocalTimeToSystemTime
 0xebd02c CreateFileA
 0xebd030 LoadLibraryA
 0xebd034 GetVersionExA
 0xebd038 LockResource
 0xebd03c DeleteFileA
 0xebd040 Process32Next
 0xebd044 CloseHandle
 0xebd048 GetSystemInfo
 0xebd04c CreateThread
 0xebd050 GetWindowsDirectoryA
 0xebd054 LoadResource
 0xebd058 SetFileAttributesA
 0xebd05c GetLocalTime
 0xebd060 GetProcAddress
 0xebd064 LocalFree
 0xebd068 RemoveDirectoryA
 0xebd06c GetCurrentProcessId
 0xebd070 GlobalMemoryStatusEx
 0xebd074 FreeLibrary
 0xebd078 WideCharToMultiByte
 0xebd07c CreateDirectoryA
 0xebd080 GetSystemTime
 0xebd084 GetPrivateProfileStringA
 0xebd088 IsWow64Process
 0xebd08c GetComputerNameA
 0xebd090 lstrcatA
 0xebd094 lstrcpyA
 0xebd098 HeapFree
 0xebd09c HeapAlloc
 0xebd0a0 lstrcpynA
 0xebd0a4 GetProcessHeap
 0xebd0a8 ReadFile
 0xebd0ac SetFilePointer
 0xebd0b0 CreateFileW
 0xebd0b4 GetLocaleInfoA
 0xebd0b8 TryEnterCriticalSection
 0xebd0bc FindClose
 0xebd0c0 EnterCriticalSection
 0xebd0c4 GetFullPathNameW
 0xebd0c8 GetDiskFreeSpaceW
 0xebd0cc OutputDebugStringA
 0xebd0d0 LockFile
 0xebd0d4 LeaveCriticalSection
 0xebd0d8 InitializeCriticalSection
 0xebd0dc GetFullPathNameA
 0xebd0e0 SetEndOfFile
 0xebd0e4 UnlockFileEx
 0xebd0e8 GetTempPathW
 0xebd0ec CreateMutexW
 0xebd0f0 GetFileAttributesW
 0xebd0f4 UnmapViewOfFile
 0xebd0f8 HeapValidate
 0xebd0fc HeapSize
 0xebd100 FormatMessageW
 0xebd104 GetDiskFreeSpaceA
 0xebd108 GetFileAttributesExW
 0xebd10c OutputDebugStringW
 0xebd110 FlushViewOfFile
 0xebd114 WaitForSingleObjectEx
 0xebd118 DeleteFileW
 0xebd11c HeapReAlloc
 0xebd120 LoadLibraryW
 0xebd124 HeapCompact
 0xebd128 HeapDestroy
 0xebd12c UnlockFile
 0xebd130 LockFileEx
 0xebd134 GetFileSize
 0xebd138 DeleteCriticalSection
 0xebd13c SystemTimeToFileTime
 0xebd140 GetSystemTimeAsFileTime
 0xebd144 FormatMessageA
 0xebd148 CreateFileMappingW
 0xebd14c MapViewOfFile
 0xebd150 QueryPerformanceCounter
 0xebd154 GetTickCount
 0xebd158 FlushFileBuffers
 0xebd15c WriteConsoleW
 0xebd160 SetEnvironmentVariableW
 0xebd164 FreeEnvironmentStringsW
 0xebd168 GetEnvironmentStringsW
 0xebd16c GetCommandLineW
 0xebd170 GetCommandLineA
 0xebd174 GetOEMCP
 0xebd178 GetACP
 0xebd17c IsValidCodePage
 0xebd180 GetModuleFileNameA
 0xebd184 SetStdHandle
 0xebd188 GetModuleHandleA
 0xebd18c GetCurrentThreadId
 0xebd190 LocalAlloc
 0xebd194 WaitForSingleObject
 0xebd198 AreFileApisANSI
 0xebd19c GetVolumeInformationA
 0xebd1a0 lstrlenA
 0xebd1a4 FindResourceA
 0xebd1a8 FindNextFileA
 0xebd1ac GetUserDefaultLocaleName
 0xebd1b0 TerminateProcess
 0xebd1b4 WriteFile
 0xebd1b8 GetCurrentProcess
 0xebd1bc FindFirstFileA
 0xebd1c0 Process32First
 0xebd1c4 EnumSystemLocalesW
 0xebd1c8 GetUserDefaultLCID
 0xebd1cc IsValidLocale
 0xebd1d0 GetPrivateProfileSectionNamesA
 0xebd1d4 SizeofResource
 0xebd1d8 HeapCreate
 0xebd1dc GetLocaleInfoW
 0xebd1e0 LCMapStringW
 0xebd1e4 CompareStringW
 0xebd1e8 GetFileSizeEx
 0xebd1ec GetConsoleOutputCP
 0xebd1f0 ReadConsoleW
 0xebd1f4 GetConsoleMode
 0xebd1f8 GetStdHandle
 0xebd1fc GetModuleFileNameW
 0xebd200 FreeLibraryAndExitThread
 0xebd204 ExitThread
 0xebd208 GetModuleHandleExW
 0xebd20c FindFirstFileExW
 0xebd210 FindNextFileW
 0xebd214 GetFinalPathNameByHandleW
 0xebd218 SetFilePointerEx
 0xebd21c GetFileInformationByHandleEx
 0xebd220 LCMapStringEx
 0xebd224 InitializeCriticalSectionEx
 0xebd228 EncodePointer
 0xebd22c DecodePointer
 0xebd230 CompareStringEx
 0xebd234 GetCPInfo
 0xebd238 GetStringTypeW
 0xebd23c InitializeCriticalSectionAndSpinCount
 0xebd240 SetEvent
 0xebd244 ResetEvent
 0xebd248 CreateEventW
 0xebd24c GetModuleHandleW
 0xebd250 IsProcessorFeaturePresent
 0xebd254 IsDebuggerPresent
 0xebd258 UnhandledExceptionFilter
 0xebd25c SetUnhandledExceptionFilter
 0xebd260 GetStartupInfoW
 0xebd264 InitializeSListHead
 0xebd268 RtlUnwind
 0xebd26c RaiseException
 0xebd270 SetLastError
 0xebd274 TlsAlloc
 0xebd278 TlsGetValue
 0xebd27c TlsSetValue
 0xebd280 TlsFree
 0xebd284 LoadLibraryExW
 0xebd288 GetFileType
 0xebd28c ExitProcess
USER32.dll
 0xebd294 GetDesktopWindow
 0xebd298 wsprintfA
 0xebd29c GetSystemMetrics
 0xebd2a0 GetDC
 0xebd2a4 GetWindowRect
 0xebd2a8 EnumDisplayDevicesA
 0xebd2ac CharNextA
 0xebd2b0 ReleaseDC
 0xebd2b4 GetKeyboardLayoutList
GDI32.dll
 0xebd2bc CreateCompatibleBitmap
 0xebd2c0 SelectObject
 0xebd2c4 CreateCompatibleDC
 0xebd2c8 DeleteObject
 0xebd2cc BitBlt
ADVAPI32.dll
 0xebd2d4 SystemFunction036
 0xebd2d8 RegOpenKeyExA
 0xebd2dc GetUserNameA
 0xebd2e0 CredFree
 0xebd2e4 RegCloseKey
 0xebd2e8 GetCurrentHwProfileA
 0xebd2ec RegQueryValueExA
 0xebd2f0 CredEnumerateA
 0xebd2f4 RegEnumKeyExA
SHELL32.dll
 0xebd2fc SHGetFolderPathA
 0xebd300 ShellExecuteA
CRYPT32.dll
 0xebd308 CryptUnprotectData
 0xebd30c CryptStringToBinaryA
gdiplus.dll
 0xebd314 GdipGetImageEncodersSize
 0xebd318 GdipFree
 0xebd31c GdipDisposeImage
 0xebd320 GdipCreateBitmapFromHBITMAP
 0xebd324 GdipAlloc
 0xebd328 GdipCloneImage
 0xebd32c GdipGetImageEncoders
 0xebd330 GdiplusShutdown
 0xebd334 GdiplusStartup
 0xebd338 GdipSaveImageToFile
SETUPAPI.dll
 0xebd340 SetupDiGetDeviceInterfaceDetailA
 0xebd344 SetupDiGetClassDevsA
 0xebd348 SetupDiEnumDeviceInterfaces
 0xebd34c SetupDiEnumDeviceInfo
WTSAPI32.dll
 0xebd354 WTSSendMessageW
KERNEL32.dll
 0xebd35c VirtualQuery
 0xebd360 GetSystemTimeAsFileTime
 0xebd364 GetModuleHandleA
 0xebd368 CreateEventA
 0xebd36c GetModuleFileNameW
 0xebd370 LoadLibraryA
 0xebd374 TerminateProcess
 0xebd378 GetCurrentProcess
 0xebd37c CreateToolhelp32Snapshot
 0xebd380 Thread32First
 0xebd384 GetCurrentProcessId
 0xebd388 GetCurrentThreadId
 0xebd38c OpenThread
 0xebd390 Thread32Next
 0xebd394 CloseHandle
 0xebd398 SuspendThread
 0xebd39c ResumeThread
 0xebd3a0 WriteProcessMemory
 0xebd3a4 GetSystemInfo
 0xebd3a8 VirtualAlloc
 0xebd3ac VirtualProtect
 0xebd3b0 VirtualFree
 0xebd3b4 GetProcessAffinityMask
 0xebd3b8 SetProcessAffinityMask
 0xebd3bc GetCurrentThread
 0xebd3c0 SetThreadAffinityMask
 0xebd3c4 Sleep
 0xebd3c8 FreeLibrary
 0xebd3cc GetTickCount
 0xebd3d0 SystemTimeToFileTime
 0xebd3d4 FileTimeToSystemTime
 0xebd3d8 GlobalFree
 0xebd3dc LocalAlloc
 0xebd3e0 LocalFree
 0xebd3e4 GetProcAddress
 0xebd3e8 ExitProcess
 0xebd3ec EnterCriticalSection
 0xebd3f0 LeaveCriticalSection
 0xebd3f4 InitializeCriticalSection
 0xebd3f8 DeleteCriticalSection
 0xebd3fc GetModuleHandleW
 0xebd400 LoadResource
 0xebd404 MultiByteToWideChar
 0xebd408 FindResourceExW
 0xebd40c FindResourceExA
 0xebd410 WideCharToMultiByte
 0xebd414 GetThreadLocale
 0xebd418 GetUserDefaultLCID
 0xebd41c GetSystemDefaultLCID
 0xebd420 EnumResourceNamesA
 0xebd424 EnumResourceNamesW
 0xebd428 EnumResourceLanguagesA
 0xebd42c EnumResourceLanguagesW
 0xebd430 EnumResourceTypesA
 0xebd434 EnumResourceTypesW
 0xebd438 CreateFileW
 0xebd43c LoadLibraryW
 0xebd440 GetLastError
 0xebd444 FlushFileBuffers
 0xebd448 CreateFileA
 0xebd44c WriteConsoleW
 0xebd450 GetConsoleOutputCP
 0xebd454 WriteConsoleA
 0xebd458 GetCommandLineA
 0xebd45c RaiseException
 0xebd460 RtlUnwind
 0xebd464 HeapFree
 0xebd468 GetCPInfo
 0xebd46c InterlockedIncrement
 0xebd470 InterlockedDecrement
 0xebd474 GetACP
 0xebd478 GetOEMCP
 0xebd47c IsValidCodePage
 0xebd480 TlsGetValue
 0xebd484 TlsAlloc
 0xebd488 TlsSetValue
 0xebd48c TlsFree
 0xebd490 SetLastError
 0xebd494 UnhandledExceptionFilter
 0xebd498 SetUnhandledExceptionFilter
 0xebd49c IsDebuggerPresent
 0xebd4a0 HeapAlloc
 0xebd4a4 LCMapStringA
 0xebd4a8 LCMapStringW
 0xebd4ac SetHandleCount
 0xebd4b0 GetStdHandle
 0xebd4b4 GetFileType
 0xebd4b8 GetStartupInfoA
 0xebd4bc GetModuleFileNameA
 0xebd4c0 FreeEnvironmentStringsA
 0xebd4c4 GetEnvironmentStrings
 0xebd4c8 FreeEnvironmentStringsW
 0xebd4cc GetEnvironmentStringsW
 0xebd4d0 HeapCreate
 0xebd4d4 HeapDestroy
 0xebd4d8 QueryPerformanceCounter
 0xebd4dc HeapReAlloc
 0xebd4e0 GetStringTypeA
 0xebd4e4 GetStringTypeW
 0xebd4e8 GetLocaleInfoA
 0xebd4ec HeapSize
 0xebd4f0 WriteFile
 0xebd4f4 SetFilePointer
 0xebd4f8 GetConsoleCP
 0xebd4fc GetConsoleMode
 0xebd500 InitializeCriticalSectionAndSpinCount
 0xebd504 SetStdHandle
USER32.dll
 0xebd50c GetProcessWindowStation
 0xebd510 GetUserObjectInformationW
 0xebd514 CharUpperBuffW
 0xebd518 MessageBoxW
KERNEL32.dll
 0xebd520 LocalAlloc
 0xebd524 LocalFree
 0xebd528 GetModuleFileNameW
 0xebd52c GetProcessAffinityMask
 0xebd530 SetProcessAffinityMask
 0xebd534 SetThreadAffinityMask
 0xebd538 Sleep
 0xebd53c ExitProcess
 0xebd540 FreeLibrary
 0xebd544 LoadLibraryA
 0xebd548 GetModuleHandleA
 0xebd54c GetProcAddress
USER32.dll
 0xebd554 GetProcessWindowStation
 0xebd558 GetUserObjectInformationW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure