Report - distributive095.exe

CoinMiner Generic Malware UPX Malicious Library Antivirus OS Processor Check PE32 PE File
ScreenShot
Created 2023.05.04 17:59 Machine s1_win7_x6403
Filename distributive095.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
3.8
ZERO API file : clean
VT API (file) 21 detected (AIDetectMalware, malicious, high confidence, Artemis, unsafe, Save, confidence, 100%, VMProtect, AU suspicious, TrojanX, Generic@AI, RDMK, cmRtazpPx4RVPnTvt8Y8uVyceUtb, Seheq, ZexaF, @JW@aqTzQ4fi, susgen)
md5 5a2548ee26c5b3613a8096befe770a0f
sha256 be23d93128af34f8a0c84faeb605c524906d7d0f1f88ee3c3e50e2419819042b
ssdeep 196608:sWtV7YeiolI0wtfX+wZIX2frbwMXmbwnsbMi3oqLNkE:r7YtolIl5XmskQmEns4i3nLNkE
imphash ce1caa42157340f3d78c9dc597bc1009
impfuzzy 96:SYYStWcpeiS1nxWZPozGonC2de1AXJ+Zcp+qjwSttLyuua:RCWanCIZ+Ra
  Network IP location

Signature (11cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Drops an executable to the user AppData folder
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Uses Windows APIs to generate a cryptographic key

Rules (14cnts)

Level Name Description Collection
danger CoinMiner_IN CoinMiner binaries (download)
danger CoinMiner_IN CoinMiner binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (7cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://iqowocguasswcmca.xyz:1775/api/client_hello US NEXEON 167.88.12.99 clean
http://iqowocguasswcmca.xyz:1775/tasks/get_worker US NEXEON 167.88.12.99 clean
http://iqowocguasswcmca.xyz:1775/api/client/new US NEXEON 167.88.12.99 clean
http://iqowocguasswcmca.xyz:1775/tasks/collect US NEXEON 167.88.12.99 clean
http://iqowocguasswcmca.xyz:1775/avast_update US NEXEON 167.88.12.99 clean
iqowocguasswcmca.xyz US NEXEON 167.88.12.99 clean
167.88.12.99 US NEXEON 167.88.12.99 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x7c4000 GetLastError
 0x7c4004 SetLastError
 0x7c4008 WaitForSingleObject
 0x7c400c CreateEventA
 0x7c4010 HeapAlloc
 0x7c4014 HeapFree
 0x7c4018 GetProcessHeap
 0x7c401c GetNativeSystemInfo
 0x7c4020 VirtualAlloc
 0x7c4024 VirtualProtect
 0x7c4028 VirtualFree
 0x7c402c Beep
 0x7c4030 GetModuleHandleA
 0x7c4034 GetProcAddress
 0x7c4038 IsBadReadPtr
 0x7c403c WriteConsoleW
 0x7c4040 CreateFileW
 0x7c4044 HeapSize
 0x7c4048 SetStdHandle
 0x7c404c FreeLibrary
 0x7c4050 LoadLibraryA
 0x7c4054 FreeEnvironmentStringsW
 0x7c4058 GetEnvironmentStringsW
 0x7c405c GetCommandLineW
 0x7c4060 GetCommandLineA
 0x7c4064 GetOEMCP
 0x7c4068 GetACP
 0x7c406c IsValidCodePage
 0x7c4070 FindNextFileW
 0x7c4074 FindFirstFileExW
 0x7c4078 FindClose
 0x7c407c HeapReAlloc
 0x7c4080 ReadConsoleW
 0x7c4084 SetFilePointerEx
 0x7c4088 GetFileSizeEx
 0x7c408c ReadFile
 0x7c4090 GetConsoleMode
 0x7c4094 GetConsoleOutputCP
 0x7c4098 FlushFileBuffers
 0x7c409c GetFileType
 0x7c40a0 EnumSystemLocalesW
 0x7c40a4 GetUserDefaultLCID
 0x7c40a8 IsValidLocale
 0x7c40ac GetLocaleInfoW
 0x7c40b0 UnhandledExceptionFilter
 0x7c40b4 SetUnhandledExceptionFilter
 0x7c40b8 GetCurrentProcess
 0x7c40bc TerminateProcess
 0x7c40c0 IsProcessorFeaturePresent
 0x7c40c4 CloseHandle
 0x7c40c8 EnterCriticalSection
 0x7c40cc LeaveCriticalSection
 0x7c40d0 InitializeCriticalSectionAndSpinCount
 0x7c40d4 DeleteCriticalSection
 0x7c40d8 SetEvent
 0x7c40dc ResetEvent
 0x7c40e0 WaitForSingleObjectEx
 0x7c40e4 CreateEventW
 0x7c40e8 GetModuleHandleW
 0x7c40ec IsDebuggerPresent
 0x7c40f0 GetStartupInfoW
 0x7c40f4 QueryPerformanceCounter
 0x7c40f8 GetCurrentProcessId
 0x7c40fc GetCurrentThreadId
 0x7c4100 GetSystemTimeAsFileTime
 0x7c4104 InitializeSListHead
 0x7c4108 QueryPerformanceFrequency
 0x7c410c Sleep
 0x7c4110 InitializeSRWLock
 0x7c4114 ReleaseSRWLockExclusive
 0x7c4118 AcquireSRWLockExclusive
 0x7c411c TryAcquireSRWLockExclusive
 0x7c4120 InitializeCriticalSectionEx
 0x7c4124 EncodePointer
 0x7c4128 DecodePointer
 0x7c412c MultiByteToWideChar
 0x7c4130 WideCharToMultiByte
 0x7c4134 LCMapStringEx
 0x7c4138 CompareStringEx
 0x7c413c GetCPInfo
 0x7c4140 GetStringTypeW
 0x7c4144 RaiseException
 0x7c4148 RtlUnwind
 0x7c414c TlsAlloc
 0x7c4150 TlsGetValue
 0x7c4154 TlsSetValue
 0x7c4158 TlsFree
 0x7c415c LoadLibraryExW
 0x7c4160 CreateThread
 0x7c4164 ExitThread
 0x7c4168 FreeLibraryAndExitThread
 0x7c416c GetModuleHandleExW
 0x7c4170 ExitProcess
 0x7c4174 GetModuleFileNameW
 0x7c4178 GetStdHandle
 0x7c417c WriteFile
 0x7c4180 LCMapStringW
 0x7c4184 SetEndOfFile
USER32.dll
 0x7c418c LoadIconA
 0x7c4190 LoadCursorA
 0x7c4194 CreateWindowExA
 0x7c4198 DefWindowProcA
 0x7c419c RegisterClassA
GDI32.dll
 0x7c41a4 CreateSolidBrush
SHELL32.dll
 0x7c41ac ShellExecuteA
WS2_32.dll
 0x7c41b4 setsockopt
 0x7c41b8 send
 0x7c41bc select
 0x7c41c0 recv
 0x7c41c4 ntohs
 0x7c41c8 socket
 0x7c41cc getsockname
 0x7c41d0 getpeername
 0x7c41d4 ioctlsocket
 0x7c41d8 connect
 0x7c41dc closesocket
 0x7c41e0 __WSAFDIsSet
 0x7c41e4 WSAStartup
 0x7c41e8 WSACleanup
 0x7c41ec shutdown
 0x7c41f0 WSAGetLastError
 0x7c41f4 WSASocketW
 0x7c41f8 getaddrinfo
 0x7c41fc getnameinfo
 0x7c4200 freeaddrinfo
 0x7c4204 getsockopt
KERNEL32.dll
 0x7c420c GetSystemTimeAsFileTime
 0x7c4210 GetModuleHandleA
 0x7c4214 CreateEventA
 0x7c4218 GetModuleFileNameW
 0x7c421c TerminateProcess
 0x7c4220 GetCurrentProcess
 0x7c4224 CreateToolhelp32Snapshot
 0x7c4228 Thread32First
 0x7c422c GetCurrentProcessId
 0x7c4230 GetCurrentThreadId
 0x7c4234 OpenThread
 0x7c4238 Thread32Next
 0x7c423c CloseHandle
 0x7c4240 SuspendThread
 0x7c4244 ResumeThread
 0x7c4248 WriteProcessMemory
 0x7c424c GetSystemInfo
 0x7c4250 VirtualAlloc
 0x7c4254 VirtualProtect
 0x7c4258 VirtualFree
 0x7c425c GetProcessAffinityMask
 0x7c4260 SetProcessAffinityMask
 0x7c4264 GetCurrentThread
 0x7c4268 SetThreadAffinityMask
 0x7c426c Sleep
 0x7c4270 LoadLibraryA
 0x7c4274 FreeLibrary
 0x7c4278 GetTickCount
 0x7c427c SystemTimeToFileTime
 0x7c4280 FileTimeToSystemTime
 0x7c4284 GlobalFree
 0x7c4288 LocalAlloc
 0x7c428c LocalFree
 0x7c4290 GetProcAddress
 0x7c4294 ExitProcess
 0x7c4298 EnterCriticalSection
 0x7c429c LeaveCriticalSection
 0x7c42a0 InitializeCriticalSection
 0x7c42a4 DeleteCriticalSection
 0x7c42a8 GetModuleHandleW
 0x7c42ac LoadResource
 0x7c42b0 MultiByteToWideChar
 0x7c42b4 FindResourceExW
 0x7c42b8 FindResourceExA
 0x7c42bc WideCharToMultiByte
 0x7c42c0 GetThreadLocale
 0x7c42c4 GetUserDefaultLCID
 0x7c42c8 GetSystemDefaultLCID
 0x7c42cc EnumResourceNamesA
 0x7c42d0 EnumResourceNamesW
 0x7c42d4 EnumResourceLanguagesA
 0x7c42d8 EnumResourceLanguagesW
 0x7c42dc EnumResourceTypesA
 0x7c42e0 EnumResourceTypesW
 0x7c42e4 CreateFileW
 0x7c42e8 LoadLibraryW
 0x7c42ec GetLastError
 0x7c42f0 FlushFileBuffers
 0x7c42f4 WriteConsoleW
 0x7c42f8 SetStdHandle
 0x7c42fc IsProcessorFeaturePresent
 0x7c4300 DecodePointer
 0x7c4304 GetCommandLineA
 0x7c4308 RaiseException
 0x7c430c HeapFree
 0x7c4310 GetCPInfo
 0x7c4314 InterlockedIncrement
 0x7c4318 InterlockedDecrement
 0x7c431c GetACP
 0x7c4320 GetOEMCP
 0x7c4324 IsValidCodePage
 0x7c4328 EncodePointer
 0x7c432c TlsAlloc
 0x7c4330 TlsGetValue
 0x7c4334 TlsSetValue
 0x7c4338 TlsFree
 0x7c433c SetLastError
 0x7c4340 UnhandledExceptionFilter
 0x7c4344 SetUnhandledExceptionFilter
 0x7c4348 IsDebuggerPresent
 0x7c434c HeapAlloc
 0x7c4350 LCMapStringW
 0x7c4354 GetStringTypeW
 0x7c4358 SetHandleCount
 0x7c435c GetStdHandle
 0x7c4360 InitializeCriticalSectionAndSpinCount
 0x7c4364 GetFileType
 0x7c4368 GetStartupInfoW
 0x7c436c GetModuleFileNameA
 0x7c4370 FreeEnvironmentStringsW
 0x7c4374 GetEnvironmentStringsW
 0x7c4378 HeapCreate
 0x7c437c HeapDestroy
 0x7c4380 QueryPerformanceCounter
 0x7c4384 HeapSize
 0x7c4388 WriteFile
 0x7c438c RtlUnwind
 0x7c4390 SetFilePointer
 0x7c4394 GetConsoleCP
 0x7c4398 GetConsoleMode
 0x7c439c HeapReAlloc
 0x7c43a0 VirtualQuery
USER32.dll
 0x7c43a8 CharUpperBuffW
KERNEL32.dll
 0x7c43b0 LocalAlloc
 0x7c43b4 LocalFree
 0x7c43b8 GetModuleFileNameW
 0x7c43bc ExitProcess
 0x7c43c0 LoadLibraryA
 0x7c43c4 GetModuleHandleA
 0x7c43c8 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure