Report - ss47.exe

UPX Malicious Library Malicious Packer OS Processor Check PE64 PE File
ScreenShot
Created 2023.03.23 18:45 Machine s1_win7_x6403
Filename ss47.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
2
Behavior Score
5.2
ZERO API file : malware
VT API (file) 17 detected (GenericKDZ, FileRepMalware, Misc, Sabsik, Wacapew, Detected, Artemis, ai score=82, CLOUD)
md5 44d59cf2b7e4700b703e95eaa7fdbdc7
sha256 43e4574bbe757104766b7299c8ebf76026f0932b079e6a0ecd4325f6c0ddb36f
ssdeep 24576:6yE8JiMHd/BieyIMZR9ejI21FiWOnoxkNMu4dXxbfat6Z:kCiMHtBiez+Rb21FiWOnoxkNMu4dX9aE
imphash ca4024c0e7ca045d1b257058baf9658b
impfuzzy 96:udFssstDqF01DuRvOzm2yBMkaersm1VKcpek4KhlBgPnar:udFsttuaDGserJhSar
  Network IP location

Signature (14cnts)

Level Description
watch Attempts to create or modify system certificates
watch File has been identified by 17 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
info Collects information to fingerprint the system (MachineGuid
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (11cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://bz.bbbeioaag.com/sts/bimage.jpg NL ENZUINC 45.136.113.107
http://count.iiagjaggg.com/check/safe RU ENZUINC 45.66.159.179
http://www.facebook.com/check/?sid=1251809&key=0dcaeaf81593814fe2ahttps://www.facebook.com/d06851037 US FACEBOOK 157.240.11.35 clean
https://www.facebook.com/ads/manager/account_settings/account_billing IE FACEBOOK 31.13.82.36 clean
https://www.facebook.com/login.php?next=https%3A%2F%2Fwww.facebook.com%2Fads%2Fmanager%2Faccount_settings%2Faccount_billing IE FACEBOOK 31.13.82.36 clean
bz.bbbeioaag.com NL ENZUINC 45.136.113.107 clean
www.facebook.com US FACEBOOK 157.240.31.35 clean
count.iiagjaggg.com RU ENZUINC 45.66.159.179 clean
45.136.113.107 NL ENZUINC 45.136.113.107 clean
31.13.82.36 IE FACEBOOK 31.13.82.36 clean
45.66.159.179 RU ENZUINC 45.66.159.179 clean

Suricata ids

PE API

IAT(Import Address Table) Library

POWRPROF.dll
 0x140095500 CallNtPowerInformation
USER32.dll
 0x140095510 RegisterClassW
 0x140095518 GetMessageW
 0x140095520 TranslateMessage
 0x140095528 DispatchMessageW
 0x140095530 PostMessageW
 0x140095538 DefWindowProcW
 0x140095540 GetWindowLongPtrW
 0x140095548 UnregisterClassW
 0x140095550 CreateWindowExW
 0x140095558 DestroyWindow
 0x140095560 SetWindowLongPtrW
VERSION.dll
 0x140095570 GetFileVersionInfoSizeW
 0x140095578 VerQueryValueW
 0x140095580 GetFileVersionInfoW
WINHTTP.dll
 0x140095590 WinHttpWriteData
 0x140095598 WinHttpCrackUrl
 0x1400955a0 WinHttpOpen
 0x1400955a8 WinHttpCloseHandle
 0x1400955b0 WinHttpConnect
 0x1400955b8 WinHttpReadData
 0x1400955c0 WinHttpQueryHeaders
 0x1400955c8 WinHttpSetTimeouts
 0x1400955d0 WinHttpOpenRequest
 0x1400955d8 WinHttpAddRequestHeaders
 0x1400955e0 WinHttpSendRequest
 0x1400955e8 WinHttpReceiveResponse
ADVAPI32.dll
 0x140095000 SystemFunction036
 0x140095008 ConvertStringSecurityDescriptorToSecurityDescriptorW
 0x140095010 BuildExplicitAccessWithNameW
 0x140095018 BuildSecurityDescriptorW
 0x140095020 RevertToSelf
 0x140095028 ImpersonateNamedPipeClient
 0x140095030 RegQueryValueExW
 0x140095038 RegQueryValueExA
 0x140095040 RegOpenKeyExW
 0x140095048 RegCloseKey
KERNEL32.dll
 0x140095058 GetFileTime
 0x140095060 CreateProcessW
 0x140095068 Sleep
 0x140095070 SleepEx
 0x140095078 RemoveDirectoryW
 0x140095080 DeleteFileW
 0x140095088 CreateDirectoryW
 0x140095090 WriteConsoleW
 0x140095098 GetProcessHeap
 0x1400950a0 SetStdHandle
 0x1400950a8 SetEnvironmentVariableW
 0x1400950b0 FreeEnvironmentStringsW
 0x1400950b8 GetEnvironmentStringsW
 0x1400950c0 GetOEMCP
 0x1400950c8 InitializeCriticalSection
 0x1400950d0 GetDriveTypeW
 0x1400950d8 GetFileInformationByHandle
 0x1400950e0 PeekNamedPipe
 0x1400950e8 SystemTimeToTzSpecificLocalTime
 0x1400950f0 FileTimeToSystemTime
 0x1400950f8 GetCurrentDirectoryW
 0x140095100 GetFileAttributesW
 0x140095108 WriteFile
 0x140095110 SetUnhandledExceptionFilter
 0x140095118 SetProcessShutdownParameters
 0x140095120 SetConsoleCtrlHandler
 0x140095128 GetProcessTimes
 0x140095130 SuspendThread
 0x140095138 ResumeThread
 0x140095140 GetProcessId
 0x140095148 GetThreadContext
 0x140095150 Wow64GetThreadContext
 0x140095158 VerSetConditionMask
 0x140095160 IsProcessorFeaturePresent
 0x140095168 GetSystemInfo
 0x140095170 VerifyVersionInfoW
 0x140095178 GetTimeZoneInformation
 0x140095180 GetThreadLocale
 0x140095188 GetSystemDefaultLCID
 0x140095190 GetUserDefaultLCID
 0x140095198 GetModuleFileNameW
 0x1400951a0 DuplicateHandle
 0x1400951a8 GetLastError
 0x1400951b0 ConnectNamedPipe
 0x1400951b8 DisconnectNamedPipe
 0x1400951c0 CreateIoCompletionPort
 0x1400951c8 GetQueuedCompletionStatus
 0x1400951d0 PostQueuedCompletionStatus
 0x1400951d8 SetEvent
 0x1400951e0 WaitForSingleObject
 0x1400951e8 CreateEventW
 0x1400951f0 GetCurrentProcess
 0x1400951f8 TerminateProcess
 0x140095200 CreateThread
 0x140095208 OpenProcess
 0x140095210 UnregisterWaitEx
 0x140095218 RegisterWaitForSingleObject
 0x140095220 GetFileInformationByHandleEx
 0x140095228 SetLastError
 0x140095230 IsWow64Process
 0x140095238 GetModuleHandleW
 0x140095240 FormatMessageA
 0x140095248 VirtualQueryEx
 0x140095250 ReadProcessMemory
 0x140095258 GetSystemTimeAsFileTime
 0x140095260 FindClose
 0x140095268 CloseHandle
 0x140095270 GetProcAddress
 0x140095278 LoadLibraryW
 0x140095280 CreateFileW
 0x140095288 SetNamedPipeHandleState
 0x140095290 TransactNamedPipe
 0x140095298 CreateNamedPipeW
 0x1400952a0 WaitNamedPipeW
 0x1400952a8 GetVersion
 0x1400952b0 ReleaseSemaphore
 0x1400952b8 CreateSemaphoreW
 0x1400952c0 GetStdHandle
 0x1400952c8 GetFileSizeEx
 0x1400952d0 GetFileType
 0x1400952d8 LockFileEx
 0x1400952e0 ReadFile
 0x1400952e8 SetEndOfFile
 0x1400952f0 SetFilePointerEx
 0x1400952f8 UnlockFileEx
 0x140095300 GetFullPathNameW
 0x140095308 LocalFree
 0x140095310 OutputDebugStringW
 0x140095318 GetCurrentProcessId
 0x140095320 GetCurrentThreadId
 0x140095328 GetLocalTime
 0x140095330 FormatMessageW
 0x140095338 EnterCriticalSection
 0x140095340 LeaveCriticalSection
 0x140095348 InitializeCriticalSectionAndSpinCount
 0x140095350 DeleteCriticalSection
 0x140095358 GetACP
 0x140095360 WideCharToMultiByte
 0x140095368 InitializeCriticalSectionEx
 0x140095370 EncodePointer
 0x140095378 DecodePointer
 0x140095380 MultiByteToWideChar
 0x140095388 LCMapStringEx
 0x140095390 GetStringTypeW
 0x140095398 GetCPInfo
 0x1400953a0 ResetEvent
 0x1400953a8 WaitForSingleObjectEx
 0x1400953b0 RtlCaptureContext
 0x1400953b8 RtlLookupFunctionEntry
 0x1400953c0 RtlVirtualUnwind
 0x1400953c8 UnhandledExceptionFilter
 0x1400953d0 QueryPerformanceCounter
 0x1400953d8 InitializeSListHead
 0x1400953e0 IsDebuggerPresent
 0x1400953e8 GetStartupInfoW
 0x1400953f0 RtlUnwindEx
 0x1400953f8 RtlPcToFileHeader
 0x140095400 RaiseException
 0x140095408 TlsAlloc
 0x140095410 TlsGetValue
 0x140095418 TlsSetValue
 0x140095420 TlsFree
 0x140095428 FreeLibrary
 0x140095430 LoadLibraryExW
 0x140095438 RtlUnwind
 0x140095440 GetCommandLineA
 0x140095448 GetCommandLineW
 0x140095450 ExitProcess
 0x140095458 GetModuleHandleExW
 0x140095460 HeapAlloc
 0x140095468 HeapFree
 0x140095470 FlsAlloc
 0x140095478 FlsGetValue
 0x140095480 FlsSetValue
 0x140095488 FlsFree
 0x140095490 CompareStringW
 0x140095498 LCMapStringW
 0x1400954a0 GetLocaleInfoW
 0x1400954a8 IsValidLocale
 0x1400954b0 EnumSystemLocalesW
 0x1400954b8 HeapReAlloc
 0x1400954c0 HeapSize
 0x1400954c8 FlushFileBuffers
 0x1400954d0 GetConsoleOutputCP
 0x1400954d8 GetConsoleMode
 0x1400954e0 FindFirstFileExW
 0x1400954e8 FindNextFileW
 0x1400954f0 IsValidCodePage

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure