Report - tg.exe

UPX Malicious Library ScreenShot AntiDebug AntiVM OS Processor Check PE File PE32
ScreenShot
Created 2023.05.31 09:18 Machine s1_win7_x6401
Filename tg.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
4
Behavior Score
7.4
ZERO API file : malware
VT API (file) 39 detected (AIDetectMalware, Stealerc, malicious, high confidence, Save, TrojanPSW, confidence, 100%, Attribute, HighConfidence, Kryptik, HSNW, score, Lazy, PWSX, QQPass, QQRob, Rgil, AGEN, R014C0DEU23, high, Steal, RedLine, 6N6W4Q, Detected, Artemis, unsafe, Chgt, kqXc7BNj1qJ, Static AI, Malicious PE, ZexaF, kEW@aOEsQ6oi)
md5 da5b8144aed2113cdd7df3f3c164fb0b
sha256 3e0614367a4306ad0692212eb5704af5982995ca52c80f3aacef74a9883b6536
ssdeep 12288:x4ZO2poYvtcyrdxyfz/FLIMyhWkpDsW8wkpnabzIA+N:yZhp0yhxyftOWEzYpaz
imphash 65d9c1a9ed29f52599b050c6a36bebe6
impfuzzy 24:Q8jTcpVWZjeD1th4GhlJBl39WuPLOovbO3kFZMv5GMA+EZHu95:Q0cpVejeth4Gnpn630FZGf
  Network IP location

Signature (14cnts)

Level Description
danger Executed a process and injected code into it
danger File has been identified by 39 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch One or more of the buffers contains an embedded PE file
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (14cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41f000 VirtualProtect
 0x41f004 FreeConsole
 0x41f008 MultiByteToWideChar
 0x41f00c GetStringTypeW
 0x41f010 WideCharToMultiByte
 0x41f014 GetCurrentThreadId
 0x41f018 CloseHandle
 0x41f01c WaitForSingleObjectEx
 0x41f020 GetExitCodeThread
 0x41f024 EnterCriticalSection
 0x41f028 LeaveCriticalSection
 0x41f02c InitializeCriticalSectionEx
 0x41f030 DeleteCriticalSection
 0x41f034 EncodePointer
 0x41f038 DecodePointer
 0x41f03c LCMapStringEx
 0x41f040 QueryPerformanceCounter
 0x41f044 GetSystemTimeAsFileTime
 0x41f048 GetModuleHandleW
 0x41f04c GetProcAddress
 0x41f050 GetCPInfo
 0x41f054 UnhandledExceptionFilter
 0x41f058 SetUnhandledExceptionFilter
 0x41f05c GetCurrentProcess
 0x41f060 TerminateProcess
 0x41f064 IsProcessorFeaturePresent
 0x41f068 GetCurrentProcessId
 0x41f06c InitializeSListHead
 0x41f070 IsDebuggerPresent
 0x41f074 GetStartupInfoW
 0x41f078 CreateFileW
 0x41f07c RaiseException
 0x41f080 RtlUnwind
 0x41f084 GetLastError
 0x41f088 SetLastError
 0x41f08c InitializeCriticalSectionAndSpinCount
 0x41f090 TlsAlloc
 0x41f094 TlsGetValue
 0x41f098 TlsSetValue
 0x41f09c TlsFree
 0x41f0a0 FreeLibrary
 0x41f0a4 LoadLibraryExW
 0x41f0a8 CreateThread
 0x41f0ac ExitThread
 0x41f0b0 FreeLibraryAndExitThread
 0x41f0b4 GetModuleHandleExW
 0x41f0b8 GetStdHandle
 0x41f0bc WriteFile
 0x41f0c0 GetModuleFileNameW
 0x41f0c4 ExitProcess
 0x41f0c8 GetCommandLineA
 0x41f0cc GetCommandLineW
 0x41f0d0 HeapAlloc
 0x41f0d4 HeapFree
 0x41f0d8 CompareStringW
 0x41f0dc LCMapStringW
 0x41f0e0 GetLocaleInfoW
 0x41f0e4 IsValidLocale
 0x41f0e8 GetUserDefaultLCID
 0x41f0ec EnumSystemLocalesW
 0x41f0f0 GetFileType
 0x41f0f4 GetFileSizeEx
 0x41f0f8 SetFilePointerEx
 0x41f0fc FlushFileBuffers
 0x41f100 GetConsoleOutputCP
 0x41f104 GetConsoleMode
 0x41f108 ReadFile
 0x41f10c HeapReAlloc
 0x41f110 FindClose
 0x41f114 FindFirstFileExW
 0x41f118 FindNextFileW
 0x41f11c IsValidCodePage
 0x41f120 GetACP
 0x41f124 GetOEMCP
 0x41f128 GetEnvironmentStringsW
 0x41f12c FreeEnvironmentStringsW
 0x41f130 SetEnvironmentVariableW
 0x41f134 SetStdHandle
 0x41f138 GetProcessHeap
 0x41f13c ReadConsoleW
 0x41f140 HeapSize
 0x41f144 WriteConsoleW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure