Report - 97.exe

UPX Malicious Library OS Processor Check PE32 PE File .NET DLL DLL
ScreenShot
Created 2023.03.27 10:45 Machine s1_win7_x6401
Filename 97.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
5.4
ZERO API file : malware
VT API (file) 45 detected (malicious, high confidence, score, GenericKD, Vuis, confidence, 100%, Donut, ABRisk, TGDN, Attribute, HighConfidence, Xwhl, MulDrop21, Artemis, Redcap, conqm, ai score=84, Wacatac, Casdet, Detected, BScope, TrojanPSW, Reline, R002H0CCO23, Generic@AI, RDML, kdfxKy, kwtJ7jz6gyeYmgA, PossibleThreat, ZexaE, nuW@a4aw2ffi, Chgt)
md5 571ce7de07a8e7ad2bb8abae3c625f11
sha256 5746e05d0d33d2e861dde5df9ca23c71cff9275e7b8b81bd711175de46ca7c6d
ssdeep 3072:hTYk3kXPDy4lZXbDNySimBEvF4fTJHqV9vdjmbYYdYUm:N3UPBjbMtyfTlqbdjZ
imphash 7d7fef53be2736bf6dc6acb718bbcbc9
impfuzzy 24:SdecDojtMS12bJnc+pl39/CYoQTNvJzGM1SOovbO9ZY:TtMS12lc+ppQYrz3M
  Network IP location

Signature (13cnts)

Level Description
danger File has been identified by 45 AntiVirus engines on VirusTotal as malicious
watch Deletes executed files from disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Moves the original executable to a new location
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Uses Windows APIs to generate a cryptographic key

Rules (9cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info Is_DotNET_DLL (no description) binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
windowsupdate.microsoft.com US MICROSOFT-CORP-MSN-AS-BLOCK 20.72.235.82 clean
20.72.235.82 US MICROSOFT-CORP-MSN-AS-BLOCK 20.72.235.82 clean

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x42a118 MessageBoxA
KERNEL32.dll
 0x42a000 SetStdHandle
 0x42a004 WriteConsoleW
 0x42a008 GetLastError
 0x42a00c VirtualAlloc
 0x42a010 VirtualFree
 0x42a014 GetProcAddress
 0x42a018 LoadLibraryA
 0x42a01c UnhandledExceptionFilter
 0x42a020 SetUnhandledExceptionFilter
 0x42a024 GetCurrentProcess
 0x42a028 TerminateProcess
 0x42a02c IsProcessorFeaturePresent
 0x42a030 QueryPerformanceCounter
 0x42a034 GetCurrentProcessId
 0x42a038 GetCurrentThreadId
 0x42a03c GetSystemTimeAsFileTime
 0x42a040 InitializeSListHead
 0x42a044 IsDebuggerPresent
 0x42a048 GetStartupInfoW
 0x42a04c GetModuleHandleW
 0x42a050 CreateFileW
 0x42a054 RtlUnwind
 0x42a058 SetLastError
 0x42a05c EnterCriticalSection
 0x42a060 LeaveCriticalSection
 0x42a064 DeleteCriticalSection
 0x42a068 InitializeCriticalSectionAndSpinCount
 0x42a06c TlsAlloc
 0x42a070 TlsGetValue
 0x42a074 TlsSetValue
 0x42a078 TlsFree
 0x42a07c FreeLibrary
 0x42a080 LoadLibraryExW
 0x42a084 EncodePointer
 0x42a088 RaiseException
 0x42a08c ExitProcess
 0x42a090 GetModuleHandleExW
 0x42a094 SetConsoleCtrlHandler
 0x42a098 GetStdHandle
 0x42a09c WriteFile
 0x42a0a0 GetModuleFileNameW
 0x42a0a4 DecodePointer
 0x42a0a8 GetFileType
 0x42a0ac HeapAlloc
 0x42a0b0 HeapFree
 0x42a0b4 LCMapStringW
 0x42a0b8 FlushFileBuffers
 0x42a0bc GetConsoleOutputCP
 0x42a0c0 GetConsoleMode
 0x42a0c4 GetFileSizeEx
 0x42a0c8 SetFilePointerEx
 0x42a0cc FindClose
 0x42a0d0 FindFirstFileExW
 0x42a0d4 FindNextFileW
 0x42a0d8 IsValidCodePage
 0x42a0dc GetACP
 0x42a0e0 GetOEMCP
 0x42a0e4 GetCPInfo
 0x42a0e8 GetCommandLineA
 0x42a0ec GetCommandLineW
 0x42a0f0 MultiByteToWideChar
 0x42a0f4 WideCharToMultiByte
 0x42a0f8 GetEnvironmentStringsW
 0x42a0fc FreeEnvironmentStringsW
 0x42a100 GetStringTypeW
 0x42a104 GetProcessHeap
 0x42a108 HeapSize
 0x42a10c HeapReAlloc
 0x42a110 CloseHandle

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure