Report - laoxiang.exe

Malicious Library PE32 PE File
ScreenShot
Created 2023.03.21 10:06 Machine s1_win7_x6401
Filename laoxiang.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed
AI Score
9
Behavior Score
6.6
ZERO API file : malware
VT API (file) 43 detected (NetWiredRC, SPVPk, Vpey, malicious, confidence, Attribute, HighConfidence, high confidence, score, Zmhl, moderate, Static AI, Suspicious PE, fvubr, Malware@#3i2kt6cvp1358, Casdet, Detected, Generic PWS, ai score=83, BScope, AntiAV, unsafe, R002H0DCK23, CLOUD, susgen, PossibleThreat, ZexaF, gmWfamFS1kki)
md5 a6a9abf50eb980d12622e14c237a9f37
sha256 1ef14f23c1c3fad652b81376340e8882a942b27052f85e96040067fc0ac4cd5a
ssdeep 3072:/3pQItUOllgxfMBZq6oopIISfXfQ9B0nk5tR:P6ObgxUPqaIISfXfQkn4
imphash 09d0478591d4f788cb3e5ea416c25237
impfuzzy 3:swBJAEPwS9KTXzhAXwEBJJ67EGVn:dBJAEHGDymVn
  Network IP location

Signature (15cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
watch Checks the CPU name from registry
watch Communicates with host for which no DNS query was performed
watch Installs an hook procedure to monitor for mouse events
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks whether any human activity is being performed by constantly checking whether the foreground window changed
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info The executable uses a known packer

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
202.146.218.59 HK Sun Network (Hong Kong) Limited - HongKong Backbone 202.146.218.59 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x4491d0 LoadLibraryA
 0x4491d4 GetProcAddress
 0x4491d8 VirtualAlloc
 0x4491dc VirtualFree

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure