Report - kds7uq5kknv.exe

UPX Malicious Library OS Processor Check PE File PE32
ScreenShot
Created 2023.05.30 15:15 Machine s1_win7_x6401
Filename kds7uq5kknv.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
5
Behavior Score
12.6
ZERO API file : clean
VT API (file) 50 detected (AIDetectMalware, GenericKD, Save, ZexaF, cEW@aiXeIDli, Genus, ABRisk, WFBI, Attribute, HighConfidence, malicious, high confidence, Kryptik, HSNW, score, Lazy, Gencirc, Nekark, naesy, AMADEY, YXDEXZ, high, Static AI, Malicious PE, Detected, TrojanPSW, Lumma, ai score=84, unsafe, Convagent, 3HahcDVvmbM, HTLQ, Chgt, confidence, 100%)
md5 433dbed8a7afbf15bfee967c63a50769
sha256 6c5cff00451680070af8daca0a59ee6a6f467f6b3152f60de6cec6cdcb9cf601
ssdeep 12288:8+GMPjZBXBlm7PRfbjn9pmhpeXN9wqdOlt:VP7QPRz/mhpK4
imphash 1760ca228d5e3c2945fdc472a803bed4
impfuzzy 24:OFAcpVWZYtMS1IGhlJBlCDoLoEOovbO3kFZMvtGMA+EZHu9n:OFAcpVeYtMS1IGnVc30FZG9
  Network IP location

Signature (26cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Appends a known CryptoMix ransomware file extension to files that have been encrypted
watch Attempts to access Bitcoin/ALTCoin wallets
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Detects Virtual Machines through their custom firmware
watch One or more of the buffers contains an embedded PE file
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.99.133.246/c2sock NZ Zappie Host LLC 185.99.133.246 33485 mailcious
185.99.133.246 NZ Zappie Host LLC 185.99.133.246 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

SHELL32.dll
 0x42313c None
 0x423140 None
USER32.dll
 0x423148 DdeQueryNextServer
KERNEL32.dll
 0x423000 FreeLibrary
 0x423004 CreateFileW
 0x423008 HeapSize
 0x42300c ReadConsoleW
 0x423010 GetProcessHeap
 0x423014 GetDateFormatEx
 0x423018 GetModuleHandleA
 0x42301c FreeConsole
 0x423020 MultiByteToWideChar
 0x423024 GetStringTypeW
 0x423028 WideCharToMultiByte
 0x42302c EnterCriticalSection
 0x423030 LeaveCriticalSection
 0x423034 InitializeCriticalSectionEx
 0x423038 DeleteCriticalSection
 0x42303c EncodePointer
 0x423040 DecodePointer
 0x423044 LCMapStringEx
 0x423048 GetCPInfo
 0x42304c UnhandledExceptionFilter
 0x423050 SetUnhandledExceptionFilter
 0x423054 GetCurrentProcess
 0x423058 TerminateProcess
 0x42305c IsProcessorFeaturePresent
 0x423060 QueryPerformanceCounter
 0x423064 GetCurrentProcessId
 0x423068 GetCurrentThreadId
 0x42306c GetSystemTimeAsFileTime
 0x423070 InitializeSListHead
 0x423074 IsDebuggerPresent
 0x423078 GetStartupInfoW
 0x42307c GetModuleHandleW
 0x423080 SetStdHandle
 0x423084 RaiseException
 0x423088 RtlUnwind
 0x42308c GetLastError
 0x423090 SetLastError
 0x423094 InitializeCriticalSectionAndSpinCount
 0x423098 TlsAlloc
 0x42309c TlsGetValue
 0x4230a0 TlsSetValue
 0x4230a4 TlsFree
 0x4230a8 WriteConsoleW
 0x4230ac GetProcAddress
 0x4230b0 LoadLibraryExW
 0x4230b4 GetStdHandle
 0x4230b8 WriteFile
 0x4230bc GetModuleFileNameW
 0x4230c0 ExitProcess
 0x4230c4 GetModuleHandleExW
 0x4230c8 GetCommandLineA
 0x4230cc GetCommandLineW
 0x4230d0 HeapAlloc
 0x4230d4 HeapFree
 0x4230d8 CompareStringW
 0x4230dc LCMapStringW
 0x4230e0 GetLocaleInfoW
 0x4230e4 IsValidLocale
 0x4230e8 GetUserDefaultLCID
 0x4230ec EnumSystemLocalesW
 0x4230f0 GetFileType
 0x4230f4 GetFileSizeEx
 0x4230f8 SetFilePointerEx
 0x4230fc CloseHandle
 0x423100 FlushFileBuffers
 0x423104 GetConsoleOutputCP
 0x423108 GetConsoleMode
 0x42310c ReadFile
 0x423110 HeapReAlloc
 0x423114 FindClose
 0x423118 FindFirstFileExW
 0x42311c FindNextFileW
 0x423120 IsValidCodePage
 0x423124 GetACP
 0x423128 GetOEMCP
 0x42312c GetEnvironmentStringsW
 0x423130 FreeEnvironmentStringsW
 0x423134 SetEnvironmentVariableW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure