Report - nxmr.exe

PE64 PE File
ScreenShot
Created 2023.04.26 18:08 Machine s1_win7_x6401
Filename nxmr.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
1
Behavior Score
2.2
ZERO API file : malware
VT API (file) 46 detected (Miner, Tedy, Artemis, Kryptik, Vthc, malicious, confidence, 100%, ABRisk, GBRM, Attribute, HighConfidence, high confidence, GenKryptik, GIIA, score, lgdo, Imnw, AGEN, Inject4, Sabsik, Xmrig, Detected, R571995, ai score=86, unsafe, Chgt, R002H0CDM23, DisguisedXMRigMiner, YhzrPCllRHI, Krypt)
md5 41ab08c1955fce44bfd0c76a64d1945a
sha256 dd12cb27b3867341bf6ca48715756500d3ec56c19b21bb1c1290806aa74cb493
ssdeep 98304:vavlQIN33nVKboT7MAwtCUxDwoQtKjnX6Og6X2XcNlfYWzdgIT3:vIlQIN33nVKboT7MAwtCYzQQjn46yQls
imphash f7505c167603909b7180406402fef19e
impfuzzy 24:1fPJx+kTdF0tWJd1jIlMblRf5XG6qXZgJkomvlA/Gbtcqc6ZJF:1fPL+kT6kSslJJG6qJgk1vm/GbuqcoF
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
185.215.113.66 Unknown 185.215.113.66 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14057128c CloseHandle
 0x140571294 CreateSemaphoreW
 0x14057129c DeleteCriticalSection
 0x1405712a4 EnterCriticalSection
 0x1405712ac GetCurrentThreadId
 0x1405712b4 GetLastError
 0x1405712bc GetStartupInfoA
 0x1405712c4 InitializeCriticalSection
 0x1405712cc IsDBCSLeadByteEx
 0x1405712d4 LeaveCriticalSection
 0x1405712dc MultiByteToWideChar
 0x1405712e4 RaiseException
 0x1405712ec ReleaseSemaphore
 0x1405712f4 RtlCaptureContext
 0x1405712fc RtlLookupFunctionEntry
 0x140571304 RtlUnwindEx
 0x14057130c RtlVirtualUnwind
 0x140571314 SetLastError
 0x14057131c SetUnhandledExceptionFilter
 0x140571324 Sleep
 0x14057132c TlsAlloc
 0x140571334 TlsFree
 0x14057133c TlsGetValue
 0x140571344 TlsSetValue
 0x14057134c VirtualProtect
 0x140571354 VirtualQuery
 0x14057135c WaitForSingleObject
 0x140571364 WideCharToMultiByte
msvcrt.dll
 0x140571374 __C_specific_handler
 0x14057137c ___lc_codepage_func
 0x140571384 ___mb_cur_max_func
 0x14057138c __getmainargs
 0x140571394 __initenv
 0x14057139c __iob_func
 0x1405713a4 __set_app_type
 0x1405713ac __setusermatherr
 0x1405713b4 _acmdln
 0x1405713bc _amsg_exit
 0x1405713c4 _cexit
 0x1405713cc _commode
 0x1405713d4 _errno
 0x1405713dc _fmode
 0x1405713e4 _initterm
 0x1405713ec _onexit
 0x1405713f4 _wcsicmp
 0x1405713fc _wcsnicmp
 0x140571404 abort
 0x14057140c calloc
 0x140571414 exit
 0x14057141c fprintf
 0x140571424 fputc
 0x14057142c fputs
 0x140571434 fputwc
 0x14057143c free
 0x140571444 fwprintf
 0x14057144c fwrite
 0x140571454 localeconv
 0x14057145c malloc
 0x140571464 memcpy
 0x14057146c memset
 0x140571474 realloc
 0x14057147c signal
 0x140571484 strcmp
 0x14057148c strerror
 0x140571494 strlen
 0x14057149c strncmp
 0x1405714a4 vfprintf
 0x1405714ac wcscat
 0x1405714b4 wcscpy
 0x1405714bc wcslen
 0x1405714c4 wcsncmp
 0x1405714cc wcsstr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure