Report - 136.exe

UPX Malicious Library Malicious Packer OS Processor Check PE File PE32
ScreenShot
Created 2023.05.19 18:02 Machine s1_win7_x6401
Filename 136.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
11
Behavior Score
7.4
ZERO API file : malware
VT API (file) 43 detected (AIDetectMalware, GenericKD, Artemis, Stealerc, V6ku, TrojanPSW, ABRisk, NRAM, Attribute, HighConfidence, malicious, high confidence, score, SpywareX, QQPass, QQRob, Kcnw, waigy, LUMMASTEALER, YXDEQZ, high, Wacatac, Detected, ZexaF, CyW@aC2ovd, ai score=84, unsafe, Chgt, Generic@AI, RDML, G7nKusGuzpM0pwemSQfkGQ, PossibleThreat, PALLAS, confidence, 100%)
md5 a1feeca49654dafe62b72623b20cd8bd
sha256 f261b983871017c3b616dd7d762602f5d8313c92981706fe587a02efbea23cc5
ssdeep 12288:24LOMyTvlmerfing0sdcQwX3FpTry1af0:2rtTvDrfiU6f3Fp/
imphash 35ef3be2e1db54617ec4882897e31d4b
impfuzzy 48:UYXOtCkx3LOn1LqI44rphCbwrjO6rcRgOqyv9DD4rz0F5bMw:lXCCkNOn1LLDrphB/O6rc6rO
  Network IP location

Signature (16cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
watch Appends a known CryptoMix ransomware file extension to files that have been encrypted
watch Attempts to access Bitcoin/ALTCoin wallets
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Detects Virtual Machines through their custom firmware
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
info Checks if process is being debugged by a debugger
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://195.123.227.138/c2sock BG ITL LLC 195.123.227.138 clean
195.123.227.138 BG ITL LLC 195.123.227.138 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x46f07c CloseHandle
 0x46f080 CompareStringW
 0x46f084 CreateDirectoryW
 0x46f088 CreateFileW
 0x46f08c DecodePointer
 0x46f090 DeleteCriticalSection
 0x46f094 DeleteFileW
 0x46f098 EncodePointer
 0x46f09c EnterCriticalSection
 0x46f0a0 ExitProcess
 0x46f0a4 FileTimeToSystemTime
 0x46f0a8 FindAtomA
 0x46f0ac FindAtomW
 0x46f0b0 FindClose
 0x46f0b4 FindFirstFileExW
 0x46f0b8 FindNextFileW
 0x46f0bc FindResourceA
 0x46f0c0 FindResourceW
 0x46f0c4 FlushFileBuffers
 0x46f0c8 FreeEnvironmentStringsW
 0x46f0cc FreeLibrary
 0x46f0d0 GetACP
 0x46f0d4 GetCPInfo
 0x46f0d8 GetCommandLineA
 0x46f0dc GetCommandLineW
 0x46f0e0 GetComputerNameA
 0x46f0e4 GetComputerNameW
 0x46f0e8 GetConsoleMode
 0x46f0ec GetConsoleOutputCP
 0x46f0f0 GetCurrentDirectoryA
 0x46f0f4 GetCurrentDirectoryW
 0x46f0f8 GetCurrentProcess
 0x46f0fc GetCurrentProcessId
 0x46f100 GetCurrentThreadId
 0x46f104 GetDriveTypeW
 0x46f108 GetEnvironmentStringsW
 0x46f10c GetFileInformationByHandle
 0x46f110 GetFileSizeEx
 0x46f114 GetFileType
 0x46f118 GetFullPathNameW
 0x46f11c GetLastError
 0x46f120 GetLocalTime
 0x46f124 GetModuleFileNameW
 0x46f128 GetModuleHandleExW
 0x46f12c GetModuleHandleW
 0x46f130 GetOEMCP
 0x46f134 GetProcAddress
 0x46f138 GetProcessHeap
 0x46f13c GetProcessId
 0x46f140 GetStartupInfoW
 0x46f144 GetStdHandle
 0x46f148 GetStringTypeW
 0x46f14c GetSystemTimeAsFileTime
 0x46f150 GetTickCount64
 0x46f154 GetTimeZoneInformation
 0x46f158 GetUserDefaultLangID
 0x46f15c GetUserDefaultUILanguage
 0x46f160 HeapAlloc
 0x46f164 HeapDestroy
 0x46f168 HeapFree
 0x46f16c HeapReAlloc
 0x46f170 HeapSize
 0x46f174 InitializeCriticalSectionAndSpinCount
 0x46f178 InitializeSListHead
 0x46f17c IsDebuggerPresent
 0x46f180 IsProcessorFeaturePresent
 0x46f184 IsValidCodePage
 0x46f188 LCMapStringW
 0x46f18c LeaveCriticalSection
 0x46f190 LoadLibraryA
 0x46f194 LoadLibraryExW
 0x46f198 LoadLibraryW
 0x46f19c MultiByteToWideChar
 0x46f1a0 OpenMutexA
 0x46f1a4 OpenMutexW
 0x46f1a8 OutputDebugStringA
 0x46f1ac OutputDebugStringW
 0x46f1b0 PeekNamedPipe
 0x46f1b4 QueryPerformanceCounter
 0x46f1b8 RaiseException
 0x46f1bc ReadConsoleW
 0x46f1c0 ReadFile
 0x46f1c4 RtlUnwind
 0x46f1c8 SetEndOfFile
 0x46f1cc SetEnvironmentVariableW
 0x46f1d0 SetFilePointerEx
 0x46f1d4 SetFileTime
 0x46f1d8 SetLastError
 0x46f1dc SetStdHandle
 0x46f1e0 SetUnhandledExceptionFilter
 0x46f1e4 Sleep
 0x46f1e8 SystemTimeToFileTime
 0x46f1ec SystemTimeToTzSpecificLocalTime
 0x46f1f0 TerminateProcess
 0x46f1f4 TlsAlloc
 0x46f1f8 TlsFree
 0x46f1fc TlsGetValue
 0x46f200 TlsSetValue
 0x46f204 TzSpecificLocalTimeToSystemTime
 0x46f208 UnhandledExceptionFilter
 0x46f20c VirtualQuery
 0x46f210 WideCharToMultiByte
 0x46f214 WriteConsoleW
 0x46f218 WriteFile
 0x46f21c lstrcatW
 0x46f220 lstrcmpW
 0x46f224 lstrcmpiW
 0x46f228 lstrlenW
ADVAPI32.dll
 0x46f230 GetUserNameW
 0x46f234 RegCloseKey
 0x46f238 RegEnumKeyExW
 0x46f23c RegOpenKeyExW
 0x46f240 RegQueryValueExW
USER32.dll
 0x46f248 EnumDisplayDevicesA
 0x46f24c FindWindowA
 0x46f250 FindWindowW
 0x46f254 GetActiveWindow
 0x46f258 GetCursorPos
 0x46f25c GetDC
 0x46f260 GetDesktopWindow
 0x46f264 GetForegroundWindow
 0x46f268 GetSystemMetrics
 0x46f26c ReleaseDC
 0x46f270 SystemParametersInfoW
 0x46f274 wsprintfW
GDI32.dll
 0x46f27c BitBlt
 0x46f280 CreateCompatibleBitmap
 0x46f284 CreateCompatibleDC
 0x46f288 CreateDCW
 0x46f28c DeleteDC
 0x46f290 DeleteObject
 0x46f294 GetDIBits
 0x46f298 GetObjectW
 0x46f29c SelectObject

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure