Report - white.exe

NPKI UPX Malicious Packer PE32 PE File
ScreenShot
Created 2023.03.31 16:33 Machine s1_win7_x6401
Filename white.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
1
Behavior Score
3.4
ZERO API file : malware
VT API (file) 30 detected (GenericKD, Stealc, Attribute, HighConfidence, malicious, moderate confidence, Kryptik, HTEZ, score, Stealerc, PWSX, juiav, Artemis, Tnega, FPWUAG, Detected, ai score=85, CLOUD, AGen, ZexaF, PM2@a4wjBpYT)
md5 89a133e7158e8bb6e2614a7c9bd7ff5d
sha256 b974225598477c7a4692e46cb12da74272a55f762f4e4b2539ce43ea5d502b61
ssdeep 24576:IBHp0AVAyuFvrOaq7Dk17o3SFGAcRbNft7+xElgjRcDJLX2FmI7oyO:IBHSQkFSDk1E+GtJNft7WjjRcVLT
imphash 4f49b28f7be60d11310d563049d6e2ee
impfuzzy 48:lAofCCaFc5JOgXlhNOqdQGhETS5o30QlJEkJZZe:uofCCec5gil3OqdQIIEgZE
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
info Queries for the computername

Rules (5cnts)

Level Name Description Collection
danger NPKI_Zero File included NPKI binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://79.137.206.15/385785d59336a866.php RU Psk-set LLC 79.137.206.15 28261 mailcious
79.137.206.15 RU Psk-set LLC 79.137.206.15 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

GDI32.dll
 0x6a41d8 CreateFontIndirectA
 0x6a41dc DeleteObject
 0x6a41e0 GetObjectA
 0x6a41e4 GetStockObject
 0x6a41e8 SetBkMode
 0x6a41ec SetPixel
 0x6a41f0 SetTextColor
KERNEL32.dll
 0x6a41f8 CloseHandle
 0x6a41fc CreateWaitableTimerW
 0x6a4200 DeleteCriticalSection
 0x6a4204 EnterCriticalSection
 0x6a4208 ExitProcess
 0x6a420c FindClose
 0x6a4210 FindFirstFileA
 0x6a4214 FindNextFileA
 0x6a4218 FreeLibrary
 0x6a421c GetCommandLineA
 0x6a4220 GetLastError
 0x6a4224 GetModuleHandleA
 0x6a4228 GetProcAddress
 0x6a422c GetStdHandle
 0x6a4230 GetSystemInfo
 0x6a4234 GlobalAlloc
 0x6a4238 GlobalFlags
 0x6a423c HeapDestroy
 0x6a4240 InitializeCriticalSection
 0x6a4244 LeaveCriticalSection
 0x6a4248 LoadLibraryA
 0x6a424c SetUnhandledExceptionFilter
 0x6a4250 SetWaitableTimer
 0x6a4254 TlsGetValue
 0x6a4258 VirtualProtect
 0x6a425c VirtualQuery
 0x6a4260 WaitForSingleObject
msvcrt.dll
 0x6a4268 _strdup
 0x6a426c _stricoll
msvcrt.dll
 0x6a4274 __getmainargs
 0x6a4278 __mb_cur_max
 0x6a427c __p__environ
 0x6a4280 __p__fmode
 0x6a4284 __set_app_type
 0x6a4288 _cexit
 0x6a428c _errno
 0x6a4290 _fpreset
 0x6a4294 _fullpath
 0x6a4298 _iob
 0x6a429c _isctype
 0x6a42a0 _onexit
 0x6a42a4 _pctype
 0x6a42a8 _setmode
 0x6a42ac abort
 0x6a42b0 atexit
 0x6a42b4 calloc
 0x6a42b8 free
 0x6a42bc fwrite
 0x6a42c0 malloc
 0x6a42c4 mbstowcs
 0x6a42c8 memcpy
 0x6a42cc realloc
 0x6a42d0 setlocale
 0x6a42d4 signal
 0x6a42d8 strcmp
 0x6a42dc strcoll
 0x6a42e0 strlen
 0x6a42e4 tolower
 0x6a42e8 vfprintf
 0x6a42ec wcstombs
USER32.dll
 0x6a42f4 BeginPaint
 0x6a42f8 DispatchMessageA
 0x6a42fc EndPaint
 0x6a4300 GetClientRect
 0x6a4304 GetMessageA
 0x6a4308 RegisterClassA
 0x6a430c TranslateMessage
USERENV.dll
 0x6a4314 CreateEnvironmentBlock
 0x6a4318 DestroyEnvironmentBlock
 0x6a431c GetUserProfileDirectoryW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure