Report - neee.exe

UPX Malicious Library Antivirus OS Processor Check PE32 PE File
ScreenShot
Created 2023.03.20 09:43 Machine s1_win7_x6403
Filename neee.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
7.6
ZERO API file : malware
VT API (file) 45 detected (AIDetectNet, malicious, high confidence, GenericKD, ClipBanker, unsafe, Save, confidence, 100%, TrojanBanker, ZexaF, @J0@aik, 1ynj, ABRisk, MTJC, Attribute, HighConfidence, VMProtect, score, TrojanX, Gencirc, Generic ML PUA, high, AGEN, ai score=82, Sabsik, Casdet, Detected, Artemis, R002H0CCE23, R9MN1BAHivH, PossibleThreat)
md5 99f16ab6ab670935b5aa5c84b1b5f6bd
sha256 348014d89503967f134b988559b2ac694e0d3256708bbf7d8b96aa8c49fe1057
ssdeep 196608:Ltu5ODXM16mjmKSRFWuxx6ruj3nK/x9jWuy:L05ODcgR6mix1
imphash 8aa23bea230ae1c890d1bde72074903b
impfuzzy 96:TJcpVY3S1RtaMDpJE0j21AXJ+Zcp+qjwSttLyuua:KJ1Z+Ra
  Network IP location

Signature (17cnts)

Level Description
danger File has been identified by 45 AntiVirus engines on VirusTotal as malicious
watch A process performed obfuscation on information about the computer or sent it to a remote location indicative of CnC Traffic/Preperations.
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Foreign language identified in PE resource
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (12cnts)

Level Name Description Collection
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.106.92.104/bot/online?guid=TEST22-PC\\test22&key=bc2dceabe69fa26dbf4dd8295d65e03e1990633a88c1c8410825c9266b239396 RU NTX Technologies s.r.o. 185.106.92.104 clean
http://185.106.92.104/bot/regex RU NTX Technologies s.r.o. 185.106.92.104 clean
185.106.92.104 RU NTX Technologies s.r.o. 185.106.92.104 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x832000 CloseHandle
 0x832004 GetProcAddress
 0x832008 GetModuleFileNameA
 0x83200c IsDebuggerPresent
 0x832010 GetComputerNameA
 0x832014 Sleep
 0x832018 CreateDirectoryA
 0x83201c WriteConsoleW
 0x832020 HeapSize
 0x832024 CreateFileW
 0x832028 GetProcessHeap
 0x83202c SetStdHandle
 0x832030 SetEnvironmentVariableW
 0x832034 FreeEnvironmentStringsW
 0x832038 GlobalUnlock
 0x83203c GlobalLock
 0x832040 GlobalFree
 0x832044 GetModuleHandleW
 0x832048 GlobalAlloc
 0x83204c GetEnvironmentStringsW
 0x832050 GetOEMCP
 0x832054 GetACP
 0x832058 IsValidCodePage
 0x83205c FindNextFileW
 0x832060 FindFirstFileExW
 0x832064 FindClose
 0x832068 MultiByteToWideChar
 0x83206c WideCharToMultiByte
 0x832070 LCMapStringEx
 0x832074 EnterCriticalSection
 0x832078 LeaveCriticalSection
 0x83207c InitializeCriticalSectionEx
 0x832080 DeleteCriticalSection
 0x832084 EncodePointer
 0x832088 DecodePointer
 0x83208c CompareStringEx
 0x832090 GetCPInfo
 0x832094 GetStringTypeW
 0x832098 IsProcessorFeaturePresent
 0x83209c QueryPerformanceCounter
 0x8320a0 GetCurrentProcessId
 0x8320a4 GetCurrentThreadId
 0x8320a8 GetSystemTimeAsFileTime
 0x8320ac InitializeSListHead
 0x8320b0 UnhandledExceptionFilter
 0x8320b4 SetUnhandledExceptionFilter
 0x8320b8 GetStartupInfoW
 0x8320bc GetCurrentProcess
 0x8320c0 TerminateProcess
 0x8320c4 RtlUnwind
 0x8320c8 RaiseException
 0x8320cc GetLastError
 0x8320d0 SetLastError
 0x8320d4 InitializeCriticalSectionAndSpinCount
 0x8320d8 TlsAlloc
 0x8320dc TlsGetValue
 0x8320e0 TlsSetValue
 0x8320e4 TlsFree
 0x8320e8 FreeLibrary
 0x8320ec LoadLibraryExW
 0x8320f0 GetStdHandle
 0x8320f4 WriteFile
 0x8320f8 GetModuleFileNameW
 0x8320fc ExitProcess
 0x832100 GetModuleHandleExW
 0x832104 GetCommandLineA
 0x832108 GetCommandLineW
 0x83210c HeapReAlloc
 0x832110 CompareStringW
 0x832114 LCMapStringW
 0x832118 GetLocaleInfoW
 0x83211c IsValidLocale
 0x832120 GetUserDefaultLCID
 0x832124 EnumSystemLocalesW
 0x832128 HeapFree
 0x83212c GetFileSizeEx
 0x832130 SetFilePointerEx
 0x832134 GetFileType
 0x832138 FlushFileBuffers
 0x83213c GetConsoleOutputCP
 0x832140 GetConsoleMode
 0x832144 HeapAlloc
 0x832148 ReadFile
 0x83214c ReadConsoleW
 0x832150 SetEndOfFile
USER32.dll
 0x832158 EmptyClipboard
 0x83215c GetClipboardData
 0x832160 OpenClipboard
 0x832164 CloseClipboard
 0x832168 SetClipboardData
ADVAPI32.dll
 0x832170 RegSetValueExA
 0x832174 RegOpenKeyExW
 0x832178 GetUserNameA
 0x83217c RegCloseKey
SHELL32.dll
 0x832184 ShellExecuteA
 0x832188 SHGetFolderPathA
WININET.dll
 0x832190 InternetCloseHandle
 0x832194 HttpOpenRequestA
 0x832198 InternetOpenA
 0x83219c HttpSendRequestW
 0x8321a0 InternetConnectA
 0x8321a4 InternetReadFile
KERNEL32.dll
 0x8321ac GetSystemTimeAsFileTime
 0x8321b0 GetModuleHandleA
 0x8321b4 CreateEventA
 0x8321b8 GetModuleFileNameW
 0x8321bc TerminateProcess
 0x8321c0 GetCurrentProcess
 0x8321c4 CreateToolhelp32Snapshot
 0x8321c8 Thread32First
 0x8321cc GetCurrentProcessId
 0x8321d0 GetCurrentThreadId
 0x8321d4 OpenThread
 0x8321d8 Thread32Next
 0x8321dc CloseHandle
 0x8321e0 SuspendThread
 0x8321e4 ResumeThread
 0x8321e8 WriteProcessMemory
 0x8321ec GetSystemInfo
 0x8321f0 VirtualAlloc
 0x8321f4 VirtualProtect
 0x8321f8 VirtualFree
 0x8321fc GetProcessAffinityMask
 0x832200 SetProcessAffinityMask
 0x832204 GetCurrentThread
 0x832208 SetThreadAffinityMask
 0x83220c Sleep
 0x832210 LoadLibraryA
 0x832214 FreeLibrary
 0x832218 GetTickCount
 0x83221c SystemTimeToFileTime
 0x832220 FileTimeToSystemTime
 0x832224 GlobalFree
 0x832228 LocalAlloc
 0x83222c LocalFree
 0x832230 GetProcAddress
 0x832234 ExitProcess
 0x832238 EnterCriticalSection
 0x83223c LeaveCriticalSection
 0x832240 InitializeCriticalSection
 0x832244 DeleteCriticalSection
 0x832248 GetModuleHandleW
 0x83224c LoadResource
 0x832250 MultiByteToWideChar
 0x832254 FindResourceExW
 0x832258 FindResourceExA
 0x83225c WideCharToMultiByte
 0x832260 GetThreadLocale
 0x832264 GetUserDefaultLCID
 0x832268 GetSystemDefaultLCID
 0x83226c EnumResourceNamesA
 0x832270 EnumResourceNamesW
 0x832274 EnumResourceLanguagesA
 0x832278 EnumResourceLanguagesW
 0x83227c EnumResourceTypesA
 0x832280 EnumResourceTypesW
 0x832284 CreateFileW
 0x832288 LoadLibraryW
 0x83228c GetLastError
 0x832290 FlushFileBuffers
 0x832294 WriteConsoleW
 0x832298 SetStdHandle
 0x83229c IsProcessorFeaturePresent
 0x8322a0 DecodePointer
 0x8322a4 GetCommandLineA
 0x8322a8 RaiseException
 0x8322ac HeapFree
 0x8322b0 GetCPInfo
 0x8322b4 InterlockedIncrement
 0x8322b8 InterlockedDecrement
 0x8322bc GetACP
 0x8322c0 GetOEMCP
 0x8322c4 IsValidCodePage
 0x8322c8 EncodePointer
 0x8322cc TlsAlloc
 0x8322d0 TlsGetValue
 0x8322d4 TlsSetValue
 0x8322d8 TlsFree
 0x8322dc SetLastError
 0x8322e0 UnhandledExceptionFilter
 0x8322e4 SetUnhandledExceptionFilter
 0x8322e8 IsDebuggerPresent
 0x8322ec HeapAlloc
 0x8322f0 LCMapStringW
 0x8322f4 GetStringTypeW
 0x8322f8 SetHandleCount
 0x8322fc GetStdHandle
 0x832300 InitializeCriticalSectionAndSpinCount
 0x832304 GetFileType
 0x832308 GetStartupInfoW
 0x83230c GetModuleFileNameA
 0x832310 FreeEnvironmentStringsW
 0x832314 GetEnvironmentStringsW
 0x832318 HeapCreate
 0x83231c HeapDestroy
 0x832320 QueryPerformanceCounter
 0x832324 HeapSize
 0x832328 WriteFile
 0x83232c RtlUnwind
 0x832330 SetFilePointer
 0x832334 GetConsoleCP
 0x832338 GetConsoleMode
 0x83233c HeapReAlloc
 0x832340 VirtualQuery
USER32.dll
 0x832348 CharUpperBuffW
KERNEL32.dll
 0x832350 LocalAlloc
 0x832354 LocalFree
 0x832358 GetModuleFileNameW
 0x83235c ExitProcess
 0x832360 LoadLibraryA
 0x832364 GetModuleHandleA
 0x832368 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure