Report - 1.exe

UPX OS Processor Check PE64 PE File
ScreenShot
Created 2023.03.13 09:51 Machine s1_win7_x6403
Filename 1.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
7
Behavior Score
3.2
ZERO API file : malware
VT API (file) 24 detected (malicious, high confidence, GenericKD, Vhcy, confidence, Attribute, HighConfidence, a variant of Generik, ECRJPKD, score, DropperX, Undefined, CLOUD, ClipSpy, NetLoader, ai score=82, Wacatac, Artemis, unsafe, PossibleThreat)
md5 ef57f8d8a632b8cf2b89021e2a7be68e
sha256 504eeed5061605b464f6dd44aa72d78efaed7d8ec0704d6db6595c977b7dd68a
ssdeep 3072:Lm1ReRExqa3HodDUMTW3FCh3tnigcQnbMbAvmppijpV:kReREl34DhqoJigcpbUpV
imphash f37a61d96b690f7b944e7449374d4371
impfuzzy 96:op+tybYLFBPVjqLLfE9WKhqpD3n6XCDbZymonWXjoQgLQkLFYe4Ihok+qJ1Fx:4bGBmmhqpD3n6yDAm0Q4QverhoklJ1
  Network IP location

Signature (8cnts)

Level Description
warning File has been identified by 24 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername

Rules (4cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
103.114.163.134 SG DEDIPATH-LLC 103.114.163.134 clean
101.43.108.14 Unknown 101.43.108.14 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140024128 WaitForMultipleObjects
 0x140024130 LeaveCriticalSection
 0x140024138 InitializeCriticalSection
 0x140024140 DeleteCriticalSection
 0x140024148 LoadLibraryW
 0x140024150 GetProcAddress
 0x140024158 InitializeCriticalSectionAndSpinCount
 0x140024160 CreateProcessW
 0x140024168 FindFirstFileW
 0x140024170 FindNextFileW
 0x140024178 FindClose
 0x140024180 GetDiskFreeSpaceExW
 0x140024188 GetDriveTypeW
 0x140024190 GetModuleHandleA
 0x140024198 SetFileAttributesW
 0x1400241a0 GetCurrentProcessId
 0x1400241a8 SetFilePointer
 0x1400241b0 LocalAlloc
 0x1400241b8 GlobalSize
 0x1400241c0 GetLocalTime
 0x1400241c8 GlobalLock
 0x1400241d0 ExitProcess
 0x1400241d8 LocalReAlloc
 0x1400241e0 GlobalUnlock
 0x1400241e8 DeleteFileW
 0x1400241f0 GetSystemInfo
 0x1400241f8 GetComputerNameW
 0x140024200 IsWow64Process
 0x140024208 TerminateProcess
 0x140024210 K32GetProcessMemoryInfo
 0x140024218 GetPriorityClass
 0x140024220 GetModuleHandleW
 0x140024228 LocalFree
 0x140024230 GetStartupInfoW
 0x140024238 CreatePipe
 0x140024240 PeekNamedPipe
 0x140024248 DisconnectNamedPipe
 0x140024250 TerminateThread
 0x140024258 WideCharToMultiByte
 0x140024260 lstrcmpiW
 0x140024268 GetModuleHandleExW
 0x140024270 EncodePointer
 0x140024278 RtlUnwindEx
 0x140024280 RaiseException
 0x140024288 OutputDebugStringW
 0x140024290 InitializeSListHead
 0x140024298 GetSystemTimeAsFileTime
 0x1400242a0 QueryPerformanceCounter
 0x1400242a8 IsDebuggerPresent
 0x1400242b0 IsProcessorFeaturePresent
 0x1400242b8 SetUnhandledExceptionFilter
 0x1400242c0 UnhandledExceptionFilter
 0x1400242c8 RtlVirtualUnwind
 0x1400242d0 RtlLookupFunctionEntry
 0x1400242d8 RtlCaptureContext
 0x1400242e0 WaitForSingleObjectEx
 0x1400242e8 ResetEvent
 0x1400242f0 EnterCriticalSection
 0x1400242f8 GlobalFree
 0x140024300 MoveFileW
 0x140024308 K32EnumProcessModules
 0x140024310 Process32FirstW
 0x140024318 lstrcpyA
 0x140024320 GlobalAlloc
 0x140024328 lstrcatW
 0x140024330 Process32NextW
 0x140024338 GetTickCount64
 0x140024340 CreateToolhelp32Snapshot
 0x140024348 GetLogicalDriveStringsW
 0x140024350 OpenProcess
 0x140024358 lstrcatA
 0x140024360 GetSystemDirectoryW
 0x140024368 K32GetProcessImageFileNameW
 0x140024370 GetCurrentThreadId
 0x140024378 CreateFileW
 0x140024380 lstrlenA
 0x140024388 QueryDosDeviceA
 0x140024390 K32GetProcessImageFileNameA
 0x140024398 WriteFile
 0x1400243a0 lstrlenW
 0x1400243a8 GetCurrentProcess
 0x1400243b0 GetVolumeInformationW
 0x1400243b8 VirtualFree
 0x1400243c0 QueryDosDeviceW
 0x1400243c8 lstrcmpiA
 0x1400243d0 lstrcpyW
 0x1400243d8 FreeLibrary
 0x1400243e0 GetFileSize
 0x1400243e8 MoveFileExW
 0x1400243f0 GetWindowsDirectoryW
 0x1400243f8 GetLogicalDriveStringsA
 0x140024400 VirtualProtect
 0x140024408 CloseHandle
 0x140024410 ReadFile
 0x140024418 SetEvent
 0x140024420 GetLastError
 0x140024428 Sleep
 0x140024430 CreateEventW
 0x140024438 WaitForSingleObject
 0x140024440 CancelIo
 0x140024448 VirtualAlloc
 0x140024450 GlobalMemoryStatusEx
USER32.dll
 0x140024490 SetWindowLongPtrW
 0x140024498 CreateWindowExW
 0x1400244a0 CallNextHookEx
 0x1400244a8 GetAsyncKeyState
 0x1400244b0 OpenClipboard
 0x1400244b8 GetKeyState
 0x1400244c0 CloseClipboard
 0x1400244c8 ExitWindowsEx
 0x1400244d0 GetWindowTextA
 0x1400244d8 GetRawInputData
 0x1400244e0 GetForegroundWindow
 0x1400244e8 UnhookWindowsHookEx
 0x1400244f0 DefWindowProcW
 0x1400244f8 GetMessageW
 0x140024500 DispatchMessageW
 0x140024508 GetCursorPos
 0x140024510 wsprintfW
 0x140024518 SystemParametersInfoW
 0x140024520 OpenInputDesktop
 0x140024528 GetDesktopWindow
 0x140024530 LoadCursorW
 0x140024538 GetCursorInfo
 0x140024540 DestroyCursor
 0x140024548 GetSystemMetrics
 0x140024550 SendMessageW
 0x140024558 GetWindowThreadProcessId
 0x140024560 CloseDesktop
 0x140024568 wsprintfA
 0x140024570 GetThreadDesktop
 0x140024578 SetThreadDesktop
 0x140024580 SetRect
 0x140024588 IntersectRect
 0x140024590 CopyRect
 0x140024598 GetMonitorInfoW
 0x1400245a0 OffsetRect
 0x1400245a8 UnionRect
 0x1400245b0 EqualRect
 0x1400245b8 ReleaseDC
 0x1400245c0 GetDC
 0x1400245c8 mouse_event
 0x1400245d0 BlockInput
 0x1400245d8 keybd_event
 0x1400245e0 MapVirtualKeyW
 0x1400245e8 SetWindowsHookExW
 0x1400245f0 GetUserObjectInformationW
 0x1400245f8 TranslateMessage
 0x140024600 GetClipboardData
 0x140024608 RegisterRawInputDevices
GDI32.dll
 0x1400240c0 CreateCompatibleBitmap
 0x1400240c8 SelectObject
 0x1400240d0 CreateDIBSection
 0x1400240d8 CreateCompatibleDC
 0x1400240e0 GetDIBits
 0x1400240e8 DeleteObject
 0x1400240f0 GetDeviceCaps
 0x1400240f8 DeleteDC
 0x140024100 BitBlt
ADVAPI32.dll
 0x140024000 OpenSCManagerW
 0x140024008 OpenProcessToken
 0x140024010 StartServiceW
 0x140024018 RegOpenKeyExW
 0x140024020 OpenServiceW
 0x140024028 LookupAccountSidW
 0x140024030 RegQueryValueExW
 0x140024038 GetTokenInformation
 0x140024040 CloseServiceHandle
 0x140024048 RegCloseKey
 0x140024050 AdjustTokenPrivileges
 0x140024058 LookupPrivilegeValueW
 0x140024060 DeleteService
 0x140024068 RegEnumValueW
 0x140024070 RegEnumKeyExW
 0x140024078 EnumServicesStatusW
 0x140024080 QueryServiceConfig2W
 0x140024088 ChangeServiceConfigW
 0x140024090 QueryServiceConfigW
 0x140024098 ControlService
 0x1400240a0 LockServiceDatabase
 0x1400240a8 UnlockServiceDatabase
 0x1400240b0 QueryServiceStatus
SHELL32.dll
 0x140024478 ShellExecuteW
 0x140024480 SHFileOperationW
ole32.dll
 0x140024840 CoInitializeEx
 0x140024848 CoUninitialize
 0x140024850 CoInitialize
 0x140024858 CoCreateInstance
OLEAUT32.dll
 0x140024460 VariantClear
 0x140024468 VariantInit
WTSAPI32.dll
 0x1400246d0 WTSFreeMemory
 0x1400246d8 WTSQuerySessionInformationW
 0x1400246e0 WTSEnumerateSessionsW
WS2_32.dll
 0x140024628 WSACleanup
 0x140024630 gethostname
 0x140024638 inet_ntoa
 0x140024640 WSAStartup
 0x140024648 WSAEventSelect
 0x140024650 send
 0x140024658 socket
 0x140024660 select
 0x140024668 WSAWaitForMultipleEvents
 0x140024670 recv
 0x140024678 closesocket
 0x140024680 WSAEnumNetworkEvents
 0x140024688 htons
 0x140024690 WSACreateEvent
 0x140024698 setsockopt
 0x1400246a0 getaddrinfo
 0x1400246a8 WSAGetLastError
 0x1400246b0 WSASend
 0x1400246b8 connect
 0x1400246c0 gethostbyname
IPHLPAPI.DLL
 0x140024110 GetExtendedUdpTable
 0x140024118 GetExtendedTcpTable
WINMM.dll
 0x140024618 timeGetTime
gdiplus.dll
 0x1400246f0 GdipCloneImage
 0x1400246f8 GdiplusShutdown
 0x140024700 GdipFree
 0x140024708 GdipGetImageGraphicsContext
 0x140024710 GdipDeleteGraphics
 0x140024718 GdipCreateBitmapFromScan0
 0x140024720 GdipDrawImageI
 0x140024728 GdiplusStartup
 0x140024730 GdipDisposeImage
 0x140024738 GdipAlloc
msvcrt.dll
 0x140024748 _msize
 0x140024750 _XcptFilter
 0x140024758 __set_app_type
 0x140024760 _acmdln
 0x140024768 _fmode
 0x140024770 ?_set_new_mode@@YAHH@Z
 0x140024778 _commode
 0x140024780 ?terminate@@YAXXZ
 0x140024788 realloc
 0x140024790 _initterm
 0x140024798 _callnewh
 0x1400247a0 _errno
 0x1400247a8 wcsncmp
 0x1400247b0 strncmp
 0x1400247b8 _beginthreadex
 0x1400247c0 malloc
 0x1400247c8 free
 0x1400247d0 abort
 0x1400247d8 __DestructExceptionObject
 0x1400247e0 _amsg_exit
 0x1400247e8 memmove
 0x1400247f0 memset
 0x1400247f8 memcpy
 0x140024800 _CxxThrowException
 0x140024808 __C_specific_handler
 0x140024810 wcsstr
 0x140024818 __getmainargs
 0x140024820 __CxxFrameHandler
 0x140024828 _ismbblead
 0x140024830 ceil

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure