Report - 100.exe

RAT Generic Malware UPX Malicious Library Antivirus Malicious Packer OS Processor Check PE File PE32 PE64
ScreenShot
Created 2023.05.30 17:19 Machine s1_win7_x6401
Filename 100.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
7.2
ZERO API file : malware
VT API (file) 41 detected (AIDetectMalware, Malicious, score, YakbeexMSIL, Artemis, Fugrafa, Save, high confidence, multiple detections, njRAT, Bkjl, Archive, Bomb, AGEN, InjectNET, Generic ML PUA, Redline, Detected, ai score=86, BitCoinMiner, SwollenFile, CLASSIC, Static AI, Suspicious PE, CoinMiner, confidence)
md5 022ffcaf0d05a9f02b4199f44c40d86a
sha256 6aa12fc8b880af7f1ba4edc944be0cc79a0cc4b58adc5439c4263870531b61d2
ssdeep 24576:NLllLl72qOMO3J8VP9kSLOCcwpHf589p1YBHl:VllLXOMOJ8VP9vd/5WpAl
imphash 91e96141ed5dbe3bc541c8aad7ff3c38
impfuzzy 48:J9FprOcLy1XFjn6S3gYMwBtDXzKc+pn5KFi:JVrFLy1XFLDVJBtDXzKc+pn5KFi
  Network IP location

Signature (20cnts)

Level Description
danger File has been identified by 41 AntiVirus engines on VirusTotal as malicious
watch The process powershell.exe wrote an executable file to disk
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (15cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info Win_Backdoor_AsyncRAT_Zero Win Backdoor AsyncRAT binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x429000 GetLastError
 0x429004 SetLastError
 0x429008 FormatMessageW
 0x42900c GetFileType
 0x429010 GetStdHandle
 0x429014 WriteFile
 0x429018 ReadFile
 0x42901c FlushFileBuffers
 0x429020 SetEndOfFile
 0x429024 SetFilePointer
 0x429028 SetFileTime
 0x42902c CloseHandle
 0x429030 CreateFileW
 0x429034 GetCurrentProcessId
 0x429038 CreateDirectoryW
 0x42903c SetFileAttributesW
 0x429040 GetFileAttributesW
 0x429044 DeleteFileW
 0x429048 MoveFileW
 0x42904c FindClose
 0x429050 FindFirstFileW
 0x429054 FindNextFileW
 0x429058 GetVersionExW
 0x42905c GetCurrentDirectoryW
 0x429060 GetFullPathNameW
 0x429064 FoldStringW
 0x429068 GetModuleFileNameW
 0x42906c GetModuleHandleW
 0x429070 FindResourceW
 0x429074 FreeLibrary
 0x429078 GetProcAddress
 0x42907c ExitProcess
 0x429080 SetThreadExecutionState
 0x429084 Sleep
 0x429088 LoadLibraryW
 0x42908c GetSystemDirectoryW
 0x429090 CompareStringW
 0x429094 AllocConsole
 0x429098 FreeConsole
 0x42909c AttachConsole
 0x4290a0 WriteConsoleW
 0x4290a4 SystemTimeToTzSpecificLocalTime
 0x4290a8 TzSpecificLocalTimeToSystemTime
 0x4290ac SystemTimeToFileTime
 0x4290b0 LocalFileTimeToFileTime
 0x4290b4 FileTimeToSystemTime
 0x4290b8 GetCPInfo
 0x4290bc IsDBCSLeadByte
 0x4290c0 MultiByteToWideChar
 0x4290c4 WideCharToMultiByte
 0x4290c8 GlobalAlloc
 0x4290cc LockResource
 0x4290d0 GlobalLock
 0x4290d4 GlobalUnlock
 0x4290d8 GlobalFree
 0x4290dc LoadResource
 0x4290e0 SizeofResource
 0x4290e4 SetCurrentDirectoryW
 0x4290e8 GetTimeFormatW
 0x4290ec GetDateFormatW
 0x4290f0 GetExitCodeProcess
 0x4290f4 WaitForSingleObject
 0x4290f8 GetLocalTime
 0x4290fc GetTickCount
 0x429100 MapViewOfFile
 0x429104 UnmapViewOfFile
 0x429108 CreateFileMappingW
 0x42910c OpenFileMappingW
 0x429110 GetCommandLineW
 0x429114 SetEnvironmentVariableW
 0x429118 ExpandEnvironmentStringsW
 0x42911c GetTempPathW
 0x429120 MoveFileExW
 0x429124 GetLocaleInfoW
 0x429128 GetNumberFormatW
 0x42912c GetProcessHeap
 0x429130 FreeEnvironmentStringsW
 0x429134 GetEnvironmentStringsW
 0x429138 GetCommandLineA
 0x42913c GetOEMCP
 0x429140 DecodePointer
 0x429144 SetFilePointerEx
 0x429148 GetConsoleMode
 0x42914c GetConsoleCP
 0x429150 HeapSize
 0x429154 SetStdHandle
 0x429158 RaiseException
 0x42915c GetSystemInfo
 0x429160 VirtualProtect
 0x429164 VirtualQuery
 0x429168 LoadLibraryExA
 0x42916c IsProcessorFeaturePresent
 0x429170 IsDebuggerPresent
 0x429174 UnhandledExceptionFilter
 0x429178 SetUnhandledExceptionFilter
 0x42917c GetStartupInfoW
 0x429180 QueryPerformanceCounter
 0x429184 GetCurrentThreadId
 0x429188 GetSystemTimeAsFileTime
 0x42918c InitializeSListHead
 0x429190 GetCurrentProcess
 0x429194 TerminateProcess
 0x429198 LocalFree
 0x42919c RtlUnwind
 0x4291a0 EncodePointer
 0x4291a4 EnterCriticalSection
 0x4291a8 LeaveCriticalSection
 0x4291ac DeleteCriticalSection
 0x4291b0 InitializeCriticalSectionAndSpinCount
 0x4291b4 TlsAlloc
 0x4291b8 TlsGetValue
 0x4291bc TlsSetValue
 0x4291c0 TlsFree
 0x4291c4 LoadLibraryExW
 0x4291c8 QueryPerformanceFrequency
 0x4291cc GetModuleHandleExW
 0x4291d0 GetModuleFileNameA
 0x4291d4 GetACP
 0x4291d8 HeapFree
 0x4291dc HeapAlloc
 0x4291e0 HeapReAlloc
 0x4291e4 GetStringTypeW
 0x4291e8 LCMapStringW
 0x4291ec FindFirstFileExA
 0x4291f0 FindNextFileA
 0x4291f4 IsValidCodePage
OLEAUT32.dll
 0x4291fc VariantClear
gdiplus.dll
 0x429204 GdiplusStartup
 0x429208 GdipCreateHBITMAPFromBitmap
 0x42920c GdipCreateBitmapFromStreamICM
 0x429210 GdiplusShutdown
 0x429214 GdipCreateBitmapFromStream
 0x429218 GdipDisposeImage
 0x42921c GdipCloneImage
 0x429220 GdipFree
 0x429224 GdipAlloc

EAT(Export Address Table) Library



Similarity measure (PE file only) - Checking for service failure