Report - dan.exe

Gen2 Gen1 UPX Malicious Library OS Processor Check PE32 PE File
ScreenShot
Created 2023.04.25 18:55 Machine s1_win7_x6403
Filename dan.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
4.2
ZERO API file : malware
VT API (file) 57 detected (AIDetect, malware2, malicious, high confidence, Tedy, Ulise, Save, confidence, 100%, Zegost, ZexaF, hq0@aafp8Mci, Farfli, Eldorado, Attribute, HighConfidence, score, Gencirc, DownLoader32, R002C0DDH23, GenericRXKQ, AutoG, Redosdru, aevhg, AGeneric, Detected, ai score=86, BScope, unsafe, Genetic, CLASSIC, GenAsa, zN47n0WgSfw, Static AI, Suspicious PE)
md5 2a531fb5a055bec266f11c721ee3deca
sha256 d8b52233d360be77ce7dc53efa56b50c039c6e8d3e579b239cec8131c6a1c4a0
ssdeep 1536:8BlhXZ0gaYZl5yXmhVzjn7qcc3lIOwnToIftSxb3pY+LmTHh20:mXTLhVfnvc3vETBftSxb3pY+LmTHh2
imphash a9a1a9708843c8adf71cdab349fb6131
impfuzzy 48:E87FgOBduWsQP6dsclpPKQjxXp8953sjRECvlQ7kl0cEhx02GOtqqksJeRko:E87Fg2duWsQP2sclpC+X73uXRGOtqq1U
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 57 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (7cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
156.236.72.163 US HK Kwaifong Group Limited 156.236.72.163 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40e034 CloseHandle
 0x40e038 WriteFile
 0x40e03c SetFilePointer
 0x40e040 CreateFileA
 0x40e044 GetFileSize
 0x40e048 ReadFile
 0x40e04c GetFileAttributesA
 0x40e050 GetProcAddress
 0x40e054 LoadLibraryA
 0x40e058 FreeLibrary
 0x40e05c GetVersionExA
 0x40e060 ExitProcess
 0x40e064 GetModuleFileNameA
 0x40e068 CreateProcessA
 0x40e06c lstrlenA
 0x40e070 GetLastError
 0x40e074 GetCurrentProcess
 0x40e078 Process32Next
 0x40e07c TerminateProcess
 0x40e080 OpenProcess
 0x40e084 Process32First
 0x40e088 CreateToolhelp32Snapshot
 0x40e08c Sleep
 0x40e090 TerminateThread
 0x40e094 CreateThread
 0x40e098 lstrcatA
 0x40e09c GetTickCount
 0x40e0a0 DeleteFileA
 0x40e0a4 HeapAlloc
 0x40e0a8 GetProcessHeap
 0x40e0ac GetDiskFreeSpaceExA
 0x40e0b0 GetDriveTypeA
 0x40e0b4 GetCurrentThreadId
 0x40e0b8 GetModuleHandleA
 0x40e0bc GlobalMemoryStatusEx
 0x40e0c0 GetSystemInfo
 0x40e0c4 OutputDebugStringA
 0x40e0c8 SetErrorMode
 0x40e0cc SetUnhandledExceptionFilter
 0x40e0d0 SetPriorityClass
 0x40e0d4 GetCurrentProcessId
 0x40e0d8 GetStartupInfoA
 0x40e0dc CancelIo
 0x40e0e0 InterlockedExchange
 0x40e0e4 SetEvent
 0x40e0e8 ResetEvent
 0x40e0ec WaitForSingleObject
 0x40e0f0 CreateEventA
 0x40e0f4 VirtualAlloc
 0x40e0f8 EnterCriticalSection
 0x40e0fc LeaveCriticalSection
 0x40e100 VirtualFree
 0x40e104 DeleteCriticalSection
 0x40e108 InitializeCriticalSection
 0x40e10c lstrcpyA
USER32.dll
 0x40e19c wsprintfA
 0x40e1a0 CloseDesktop
 0x40e1a4 SetThreadDesktop
 0x40e1a8 GetUserObjectInformationA
 0x40e1ac GetThreadDesktop
 0x40e1b0 OpenInputDesktop
 0x40e1b4 OpenDesktopA
 0x40e1b8 GetClassNameA
 0x40e1bc GetWindow
 0x40e1c0 GetWindowTextA
 0x40e1c4 FindWindowA
 0x40e1c8 SetProcessWindowStation
 0x40e1cc OpenWindowStationA
ADVAPI32.dll
 0x40e000 ClearEventLogA
 0x40e004 OpenEventLogA
 0x40e008 AdjustTokenPrivileges
 0x40e00c LookupPrivilegeValueA
 0x40e010 OpenProcessToken
 0x40e014 GetUserNameA
 0x40e018 RegCloseKey
 0x40e01c RegQueryValueExA
 0x40e020 RegOpenKeyExA
 0x40e024 RegOpenKeyA
 0x40e028 RegSetValueExA
 0x40e02c CloseEventLog
SHELL32.dll
 0x40e18c ShellExecuteExA
 0x40e190 ShellExecuteA
 0x40e194 SHGetSpecialFolderPathA
ole32.dll
 0x40e228 CoCreateInstance
 0x40e22c CoUninitialize
 0x40e230 CoInitialize
OLEAUT32.dll
 0x40e184 SysFreeString
MFC42.DLL
 0x40e114 None
 0x40e118 None
MSVCRT.dll
 0x40e120 _controlfp
 0x40e124 __set_app_type
 0x40e128 __p__fmode
 0x40e12c __p__commode
 0x40e130 _adjust_fdiv
 0x40e134 __setusermatherr
 0x40e138 _initterm
 0x40e13c __getmainargs
 0x40e140 _acmdln
 0x40e144 exit
 0x40e148 _exit
 0x40e14c _strcmpi
 0x40e150 free
 0x40e154 realloc
 0x40e158 _beginthreadex
 0x40e15c sprintf
 0x40e160 atol
 0x40e164 _except_handler3
 0x40e168 malloc
 0x40e16c __CxxFrameHandler
 0x40e170 _ftol
 0x40e174 _XcptFilter
 0x40e178 atoi
 0x40e17c memmove
WS2_32.dll
 0x40e1e4 recv
 0x40e1e8 WSAIoctl
 0x40e1ec setsockopt
 0x40e1f0 connect
 0x40e1f4 htons
 0x40e1f8 select
 0x40e1fc socket
 0x40e200 closesocket
 0x40e204 send
 0x40e208 WSACleanup
 0x40e20c gethostname
 0x40e210 getsockname
 0x40e214 WSAStartup
 0x40e218 gethostbyname
iphlpapi.dll
 0x40e220 GetIfTable
WININET.dll
 0x40e1d4 InternetOpenA
 0x40e1d8 InternetOpenUrlA
 0x40e1dc InternetCloseHandle

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure