Report - postmon.exe

Generic Malware UPX Malicious Library Malicious Packer Antivirus OS Processor Check PE File PE32 PowerShell
ScreenShot
Created 2023.05.29 13:26 Machine s1_win7_x6401
Filename postmon.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
10.0
ZERO API file : malware
VT API (file) 52 detected (AIDetectMalware, MulDrop22, GenericKD, Phonzy, GenericRXVW, Malicious, Coins, Save, TrojanPSW, ZexaF, pCW@aqR, Dnni, ABRisk, ONVO, Attribute, HighConfidence, high confidence, Kryptik, AGen, score, PWSX, Gencirc, FileFinder, Gen7, TMLOADER, YXDEJZ, Burden, ai score=100, Sabsik, Casdet, UN14F8, Detected, PowershellDownloader, R575694, unsafe, qlDhpU51GmN, susgen, HROL, confidence, 100%)
md5 f3e968ba5b17cca9be62e5ca9c9b06f0
sha256 869abff3b6b8d0d0e854a0b7708ece00ab0e578902c694b816a35f102aa9ea5b
ssdeep 3072:PRYHxx1X/nD7OWQHBJB79Vd1i+qfsidTij98UwXVoM9EoJfsy9Om4QNYYTAFRNln:PuM9GFoMmEXOm4KMvAOeHz5+
imphash 8ad88ac708ddb8f8b13f36cf34d63196
impfuzzy 48:+BKkUBHve4xc+ULtoS1xGoZZGK3/ZRdK+:+A5veoc+ULtoS1xGojBZRdK+
  Network IP location

Signature (22cnts)

Level Description
danger File has been identified by 52 AntiVirus engines on VirusTotal as malicious
watch Network communications indicative of a potential document or script payload download was initiated by the process powershell.exe
watch The process powershell.exe wrote an executable file to disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Drops an executable to the user AppData folder
notice Poweshell is sending data to a remote host
notice URL downloaded by powershell script
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info Powershell script has download & invoke calls
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info Uses Windows APIs to generate a cryptographic key

Rules (16cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts
info PowershellDI Extract Download/Invoke calls from powershell script scripts

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
slpbridge.com Unknown 92.204.218.253 malware
92.204.218.253 Unknown 92.204.218.253 malware

Suricata ids

PE API

IAT(Import Address Table) Library

WININET.dll
 0x42b188 InternetReadFile
 0x42b18c InternetCloseHandle
 0x42b190 InternetCrackUrlW
 0x42b194 InternetOpenW
 0x42b198 InternetOpenUrlW
 0x42b19c InternetQueryDataAvailable
SHLWAPI.dll
 0x42b170 StrStrW
 0x42b174 wnsprintfW
KERNEL32.dll
 0x42b01c GetCommandLineW
 0x42b020 GetCommandLineA
 0x42b024 GetOEMCP
 0x42b028 WriteFile
 0x42b02c GetModuleFileNameW
 0x42b030 GetEnvironmentVariableW
 0x42b034 lstrlenA
 0x42b038 CreateFileW
 0x42b03c GetFileAttributesW
 0x42b040 GetSystemWow64DirectoryW
 0x42b044 GetLastError
 0x42b048 LoadLibraryA
 0x42b04c lstrcatW
 0x42b050 lstrcpyA
 0x42b054 GetEnvironmentStringsW
 0x42b058 CloseHandle
 0x42b05c ExitProcess
 0x42b060 GetModuleHandleW
 0x42b064 lstrcpyW
 0x42b068 GetTempFileNameW
 0x42b06c HeapFree
 0x42b070 HeapReAlloc
 0x42b074 HeapAlloc
 0x42b078 GetProcessHeap
 0x42b07c WideCharToMultiByte
 0x42b080 GetACP
 0x42b084 IsValidCodePage
 0x42b088 FindNextFileW
 0x42b08c FreeEnvironmentStringsW
 0x42b090 SetStdHandle
 0x42b094 HeapSize
 0x42b098 TlsSetValue
 0x42b09c EnterCriticalSection
 0x42b0a0 LeaveCriticalSection
 0x42b0a4 DeleteCriticalSection
 0x42b0a8 EncodePointer
 0x42b0ac DecodePointer
 0x42b0b0 MultiByteToWideChar
 0x42b0b4 SetLastError
 0x42b0b8 InitializeCriticalSectionAndSpinCount
 0x42b0bc CreateEventW
 0x42b0c0 TlsAlloc
 0x42b0c4 TlsGetValue
 0x42b0c8 WriteConsoleW
 0x42b0cc TlsFree
 0x42b0d0 GetSystemTimeAsFileTime
 0x42b0d4 GetProcAddress
 0x42b0d8 LCMapStringW
 0x42b0dc GetLocaleInfoW
 0x42b0e0 GetStringTypeW
 0x42b0e4 GetCPInfo
 0x42b0e8 SetEvent
 0x42b0ec ResetEvent
 0x42b0f0 WaitForSingleObjectEx
 0x42b0f4 UnhandledExceptionFilter
 0x42b0f8 SetUnhandledExceptionFilter
 0x42b0fc GetCurrentProcess
 0x42b100 TerminateProcess
 0x42b104 IsProcessorFeaturePresent
 0x42b108 IsDebuggerPresent
 0x42b10c GetStartupInfoW
 0x42b110 QueryPerformanceCounter
 0x42b114 GetCurrentProcessId
 0x42b118 GetCurrentThreadId
 0x42b11c InitializeSListHead
 0x42b120 RaiseException
 0x42b124 RtlUnwind
 0x42b128 FreeLibrary
 0x42b12c LoadLibraryExW
 0x42b130 GetModuleHandleExW
 0x42b134 GetStdHandle
 0x42b138 ReadFile
 0x42b13c GetConsoleMode
 0x42b140 ReadConsoleW
 0x42b144 IsValidLocale
 0x42b148 GetUserDefaultLCID
 0x42b14c EnumSystemLocalesW
 0x42b150 GetFileType
 0x42b154 FlushFileBuffers
 0x42b158 GetConsoleOutputCP
 0x42b15c GetFileSizeEx
 0x42b160 SetFilePointerEx
 0x42b164 FindClose
 0x42b168 FindFirstFileExW
USER32.dll
 0x42b17c wsprintfW
 0x42b180 wsprintfA
ADVAPI32.dll
 0x42b000 GetSidSubAuthorityCount
 0x42b004 GetSidSubAuthority
 0x42b008 RegSetValueExW
 0x42b00c RegOpenKeyExW
 0x42b010 RegCreateKeyW
 0x42b014 RegCloseKey

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure