Report - 88999.exe

UPX Malicious Library PE File PE32
ScreenShot
Created 2023.06.07 07:43 Machine s1_win7_x6401
Filename 88999.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
8.0
ZERO API file : clean
VT API (file) 57 detected (AIDetectMalware, Doina, Farfli, Vbpn, malicious, ZexaF, tC0@amHpmRfj, ABRisk, ECGH, Malcode, high confidence, score, n1IpeG8SmSG, bzxds, ZEGOST, SM17, Infected, ai score=84, BigBadWolf, CWO@7jrzut, Detected, Artemis, BScope, unsafe, GdSda, Gencirc, susgen, CESZ, confidence, 100%)
md5 ee9f9565049005c3fc1dfd32db706ef8
sha256 41fe567d55eb7815d15fe5f3408a902f5743a42b2d6b58a6eac7455a06e52d28
ssdeep 3072:gIH9W+aUwWAKRpHFeyYMPg0GQx/KD9tlnZ9OrsL1z17toIhRXIB7NE4:gIHaXW3HFOMsZYM1znexE
imphash 58c5d357101428118c079002a7efbddf
impfuzzy 192:9HktqJUFDnCLYkZggioYN99uBcRcic7Oa:9HODCEkK9yERA
  Network IP location

Signature (15cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 57 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch Network activity contains more than one unique useragent
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Foreign language identified in PE resource
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (8cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (7cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://users.qzone.qq.com/fcg-bin/cgi_get_portrait.fcg?uins=12345678 CN China Unicom Guangdong IP network 58.250.136.113 clean
http://107.151.204.57:9985/NetSyst96.dll US VPSQUAN 107.151.204.57 clean
https://users.qzone.qq.com/fcg-bin/cgi_get_portrait.fcg?uins=12345678 CN China Unicom Guangdong IP network 58.250.136.113 clean
users.qzone.qq.com CN China Unicom Guangdong IP network 58.250.136.113 mailcious
103.97.178.89 HK IKGUL-26484 103.97.178.89 clean
107.151.204.57 US VPSQUAN 107.151.204.57 clean
58.250.136.113 CN China Unicom Guangdong IP network 58.250.136.113 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x444b50 DeleteFileA
 0x444b54 FindClose
 0x444b58 FindFirstFileA
 0x444b5c GetVolumeInformationA
 0x444b60 GetFullPathNameA
 0x444b64 GetStringTypeExA
 0x444b68 GetThreadLocale
 0x444b6c GetShortPathNameA
 0x444b70 GetFileAttributesA
 0x444b74 GetFileTime
 0x444b78 LocalFileTimeToFileTime
 0x444b7c SystemTimeToFileTime
 0x444b80 SetFileTime
 0x444b84 SetFileAttributesA
 0x444b88 FileTimeToSystemTime
 0x444b8c FileTimeToLocalFileTime
 0x444b90 RtlUnwind
 0x444b94 HeapReAlloc
 0x444b98 GetStartupInfoA
 0x444b9c GetCommandLineA
 0x444ba0 ExitProcess
 0x444ba4 TerminateProcess
 0x444ba8 CreateThread
 0x444bac ExitThread
 0x444bb0 RaiseException
 0x444bb4 HeapSize
 0x444bb8 GetACP
 0x444bbc GetTimeZoneInformation
 0x444bc0 GetSystemTime
 0x444bc4 GetLocalTime
 0x444bc8 GetEnvironmentVariableA
 0x444bcc MoveFileA
 0x444bd0 HeapDestroy
 0x444bd4 HeapCreate
 0x444bd8 IsBadWritePtr
 0x444bdc FatalAppExitA
 0x444be0 UnhandledExceptionFilter
 0x444be4 FreeEnvironmentStringsA
 0x444be8 FreeEnvironmentStringsW
 0x444bec GetEnvironmentStrings
 0x444bf0 GetEnvironmentStringsW
 0x444bf4 SetHandleCount
 0x444bf8 GetStdHandle
 0x444bfc GetFileType
 0x444c00 SetUnhandledExceptionFilter
 0x444c04 LCMapStringA
 0x444c08 LCMapStringW
 0x444c0c GetStringTypeA
 0x444c10 GetStringTypeW
 0x444c14 IsBadReadPtr
 0x444c18 IsBadCodePtr
 0x444c1c IsValidLocale
 0x444c20 IsValidCodePage
 0x444c24 GetLocaleInfoA
 0x444c28 EnumSystemLocalesA
 0x444c2c GetUserDefaultLCID
 0x444c30 SetConsoleCtrlHandler
 0x444c34 CompareStringA
 0x444c38 CompareStringW
 0x444c3c SetEnvironmentVariableA
 0x444c40 GetLocaleInfoW
 0x444c44 SetEndOfFile
 0x444c48 UnlockFile
 0x444c4c LockFile
 0x444c50 FlushFileBuffers
 0x444c54 SetFilePointer
 0x444c58 GetCurrentProcess
 0x444c5c DuplicateHandle
 0x444c60 SetErrorMode
 0x444c64 GetOEMCP
 0x444c68 GetCPInfo
 0x444c6c SizeofResource
 0x444c70 GetProcessVersion
 0x444c74 GetLastError
 0x444c78 MultiByteToWideChar
 0x444c7c WideCharToMultiByte
 0x444c80 InterlockedExchange
 0x444c84 InterlockedIncrement
 0x444c88 GetCurrentDirectoryA
 0x444c8c WritePrivateProfileStringA
 0x444c90 GetPrivateProfileStringA
 0x444c94 GetPrivateProfileIntA
 0x444c98 GlobalFlags
 0x444c9c lstrlenA
 0x444ca0 lstrcpynA
 0x444ca4 TlsGetValue
 0x444ca8 LocalReAlloc
 0x444cac TlsSetValue
 0x444cb0 EnterCriticalSection
 0x444cb4 GlobalReAlloc
 0x444cb8 LeaveCriticalSection
 0x444cbc TlsFree
 0x444cc0 GlobalHandle
 0x444cc4 DeleteCriticalSection
 0x444cc8 TlsAlloc
 0x444ccc InitializeCriticalSection
 0x444cd0 LocalFree
 0x444cd4 LocalAlloc
 0x444cd8 InterlockedDecrement
 0x444cdc MulDiv
 0x444ce0 SetLastError
 0x444ce4 GetVersion
 0x444ce8 lstrcatA
 0x444cec GlobalGetAtomNameA
 0x444cf0 GlobalAddAtomA
 0x444cf4 GlobalFindAtomA
 0x444cf8 lstrcpyA
 0x444cfc GetModuleHandleA
 0x444d00 GlobalUnlock
 0x444d04 GlobalFree
 0x444d08 LockResource
 0x444d0c FindResourceA
 0x444d10 LoadResource
 0x444d14 CreateEventA
 0x444d18 SuspendThread
 0x444d1c SetThreadPriority
 0x444d20 ResumeThread
 0x444d24 SetEvent
 0x444d28 WaitForSingleObject
 0x444d2c GetModuleFileNameA
 0x444d30 GlobalLock
 0x444d34 GlobalAlloc
 0x444d38 GlobalDeleteAtom
 0x444d3c lstrcmpA
 0x444d40 lstrcmpiA
 0x444d44 GetCurrentThread
 0x444d48 GetCurrentThreadId
 0x444d4c FreeLibrary
 0x444d50 HeapFree
 0x444d54 LoadLibraryA
 0x444d58 GetProcAddress
 0x444d5c VirtualFree
 0x444d60 VirtualProtect
 0x444d64 VirtualAlloc
 0x444d68 GetProcessHeap
 0x444d6c HeapAlloc
 0x444d70 GetFileSize
 0x444d74 ReadFile
 0x444d78 CreateFileA
 0x444d7c WriteFile
 0x444d80 CloseHandle
 0x444d84 GetVersionExA
 0x444d88 Sleep
USER32.dll
 0x444e64 EndDeferWindowPos
 0x444e68 CopyRect
 0x444e6c BeginDeferWindowPos
 0x444e70 DeferWindowPos
 0x444e74 EqualRect
 0x444e78 ScreenToClient
 0x444e7c AdjustWindowRectEx
 0x444e80 SetFocus
 0x444e84 GetSysColor
 0x444e88 MapWindowPoints
 0x444e8c SendDlgItemMessageA
 0x444e90 UpdateWindow
 0x444e94 CheckDlgButton
 0x444e98 CheckRadioButton
 0x444e9c GetDlgItemInt
 0x444ea0 GetDlgItemTextA
 0x444ea4 SetDlgItemInt
 0x444ea8 SetDlgItemTextA
 0x444eac IsDlgButtonChecked
 0x444eb0 ScrollWindowEx
 0x444eb4 IsDialogMessageA
 0x444eb8 SetWindowTextA
 0x444ebc MoveWindow
 0x444ec0 ShowWindow
 0x444ec4 ClientToScreen
 0x444ec8 GetDC
 0x444ecc ReleaseDC
 0x444ed0 GetWindowDC
 0x444ed4 BeginPaint
 0x444ed8 EndPaint
 0x444edc TabbedTextOutA
 0x444ee0 DrawTextA
 0x444ee4 GrayStringA
 0x444ee8 LoadCursorA
 0x444eec SetCapture
 0x444ef0 ReleaseCapture
 0x444ef4 WaitMessage
 0x444ef8 GetDesktopWindow
 0x444efc GetWindowThreadProcessId
 0x444f00 WindowFromPoint
 0x444f04 GetClassNameA
 0x444f08 PtInRect
 0x444f0c InsertMenuA
 0x444f10 DeleteMenu
 0x444f14 GetMenuStringA
 0x444f18 CharToOemA
 0x444f1c OemToCharA
 0x444f20 GetSysColorBrush
 0x444f24 LoadStringA
 0x444f28 GetDialogBaseUnits
 0x444f2c DestroyMenu
 0x444f30 SetRectEmpty
 0x444f34 LoadAcceleratorsA
 0x444f38 TranslateAcceleratorA
 0x444f3c LoadMenuA
 0x444f40 SetMenu
 0x444f44 ReuseDDElParam
 0x444f48 UnpackDDElParam
 0x444f4c InvalidateRect
 0x444f50 BringWindowToTop
 0x444f54 CharUpperA
 0x444f58 ScrollWindow
 0x444f5c GetScrollInfo
 0x444f60 SetScrollInfo
 0x444f64 ShowScrollBar
 0x444f68 GetScrollRange
 0x444f6c SetScrollRange
 0x444f70 GetScrollPos
 0x444f74 SetScrollPos
 0x444f78 GetTopWindow
 0x444f7c IsChild
 0x444f80 GetCapture
 0x444f84 WinHelpA
 0x444f88 wsprintfA
 0x444f8c GetClassInfoA
 0x444f90 RegisterClassA
 0x444f94 GetMenu
 0x444f98 GetMenuItemCount
 0x444f9c GetSubMenu
 0x444fa0 GetMenuItemID
 0x444fa4 TrackPopupMenu
 0x444fa8 SetWindowPlacement
 0x444fac GetWindowTextLengthA
 0x444fb0 GetWindowTextA
 0x444fb4 GetDlgCtrlID
 0x444fb8 CreateWindowExA
 0x444fbc GetClassLongA
 0x444fc0 SetPropA
 0x444fc4 UnhookWindowsHookEx
 0x444fc8 GetPropA
 0x444fcc CallWindowProcA
 0x444fd0 RemovePropA
 0x444fd4 DefWindowProcA
 0x444fd8 GetMessageTime
 0x444fdc GetMessagePos
 0x444fe0 GetForegroundWindow
 0x444fe4 SetForegroundWindow
 0x444fe8 GetWindow
 0x444fec SetWindowLongA
 0x444ff0 SetWindowPos
 0x444ff4 RegisterWindowMessageA
 0x444ff8 IntersectRect
 0x444ffc SystemParametersInfoA
 0x445000 GetWindowPlacement
 0x445004 GetWindowRect
 0x445008 EndDialog
 0x44500c SetActiveWindow
 0x445010 IsWindow
 0x445014 CreateDialogIndirectParamA
 0x445018 DestroyWindow
 0x44501c GetDlgItem
 0x445020 GetMenuCheckMarkDimensions
 0x445024 LoadBitmapA
 0x445028 GetMenuState
 0x44502c ModifyMenuA
 0x445030 SetMenuItemBitmaps
 0x445034 CheckMenuItem
 0x445038 EnableMenuItem
 0x44503c GetFocus
 0x445040 GetNextDlgTabItem
 0x445044 GetMessageA
 0x445048 TranslateMessage
 0x44504c DispatchMessageA
 0x445050 GetActiveWindow
 0x445054 GetKeyState
 0x445058 CallNextHookEx
 0x44505c ValidateRect
 0x445060 IsWindowVisible
 0x445064 PeekMessageA
 0x445068 GetCursorPos
 0x44506c SetWindowsHookExA
 0x445070 GetParent
 0x445074 GetLastActivePopup
 0x445078 IsWindowEnabled
 0x44507c GetWindowLongA
 0x445080 MessageBoxA
 0x445084 SetCursor
 0x445088 ShowOwnedPopups
 0x44508c PostQuitMessage
 0x445090 PostMessageA
 0x445094 LoadIconA
 0x445098 EnableWindow
 0x44509c GetClientRect
 0x4450a0 IsIconic
 0x4450a4 SendMessageA
 0x4450a8 DrawIcon
 0x4450ac GetSystemMetrics
 0x4450b0 OffsetRect
 0x4450b4 UnregisterClassA
GDI32.dll
 0x4449dc SetMapMode
 0x4449e0 SetViewportOrgEx
 0x4449e4 OffsetViewportOrgEx
 0x4449e8 SetViewportExtEx
 0x4449ec ScaleViewportExtEx
 0x4449f0 SetWindowOrgEx
 0x4449f4 OffsetWindowOrgEx
 0x4449f8 SetWindowExtEx
 0x4449fc ScaleWindowExtEx
 0x444a00 SelectClipRgn
 0x444a04 ExcludeClipRect
 0x444a08 IntersectClipRect
 0x444a0c OffsetClipRgn
 0x444a10 MoveToEx
 0x444a14 LineTo
 0x444a18 SetTextAlign
 0x444a1c SetTextJustification
 0x444a20 SetTextCharacterExtra
 0x444a24 SetMapperFlags
 0x444a28 GetCurrentPositionEx
 0x444a2c ArcTo
 0x444a30 SetArcDirection
 0x444a34 PolyDraw
 0x444a38 GetObjectA
 0x444a3c PolylineTo
 0x444a40 SetColorAdjustment
 0x444a44 SetStretchBltMode
 0x444a48 DeleteObject
 0x444a4c SetPolyFillMode
 0x444a50 CreateRectRgn
 0x444a54 SelectClipPath
 0x444a58 ExtSelectClipRgn
 0x444a5c PlayMetaFileRecord
 0x444a60 GetObjectType
 0x444a64 EnumMetaFile
 0x444a68 PlayMetaFile
 0x444a6c GetDeviceCaps
 0x444a70 GetViewportExtEx
 0x444a74 GetWindowExtEx
 0x444a78 CreatePen
 0x444a7c ExtCreatePen
 0x444a80 CreateSolidBrush
 0x444a84 CreateHatchBrush
 0x444a88 CreatePatternBrush
 0x444a8c CreateDIBPatternBrushPt
 0x444a90 PtVisible
 0x444a94 RectVisible
 0x444a98 TextOutA
 0x444a9c ExtTextOutA
 0x444aa0 Escape
 0x444aa4 GetTextExtentPoint32A
 0x444aa8 GetTextMetricsA
 0x444aac CreateFontIndirectA
 0x444ab0 PolyBezierTo
 0x444ab4 SetROP2
 0x444ab8 SetBkColor
 0x444abc SetTextColor
 0x444ac0 GetClipBox
 0x444ac4 SetBkMode
 0x444ac8 SelectPalette
 0x444acc GetStockObject
 0x444ad0 SelectObject
 0x444ad4 RestoreDC
 0x444ad8 SaveDC
 0x444adc StartDocA
 0x444ae0 GetClipRgn
 0x444ae4 CreateBitmap
 0x444ae8 GetDCOrgEx
 0x444aec DeleteDC
comdlg32.dll
 0x445190 GetFileTitleA
WINSPOOL.DRV
 0x445158 OpenPrinterA
 0x44515c DocumentPropertiesA
 0x445160 ClosePrinter
ADVAPI32.dll
 0x44495c RegDeleteKeyA
 0x444960 RegDeleteValueA
 0x444964 RegSetValueExA
 0x444968 RegQueryValueExA
 0x44496c RegOpenKeyExA
 0x444970 RegCreateKeyExA
 0x444974 RegCloseKey
 0x444978 RegOpenKeyA
SHELL32.dll
 0x444e28 SHGetFileInfoA
 0x444e2c DragQueryFileA
 0x444e30 DragAcceptFiles
 0x444e34 DragFinish
COMCTL32.dll
 0x4449ac None
imagehlp.dll
 0x4451c0 MakeSureDirectoryPathExists

EAT(Export Address Table) Library

0x4010f0 heiyuxhj


Similarity measure (PE file only) - Checking for service failure