Report - gate.exe

Generic Malware UPX Malicious Library OS Processor Check PE64 PE File
ScreenShot
Created 2023.06.17 18:09 Machine s1_win7_x6403
Filename gate.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
8.6
ZERO API file : malware
VT API (file) 46 detected (Tedy, V4vp, malicious, confidence, 100%, Genus, ABRisk, CQBU, Attribute, HighConfidence, high confidence, VMProtect, J suspicious, score, xyawhv, AdwareX, Zmhl, qvmuq, SMOKELOADER, YXDFOZ, Wacatac, ApplicUnwnt@#we81f4h1prkv, Malgent, Detected, Artemis, ai score=80, CoinMiner, unsafe, Chgt, CLOUD)
md5 4be5a605c895baa84294466875582764
sha256 4508befe4b8012035c52c7aaccbe89b9f75919bdcc86feb8fe79ae01fdea8179
ssdeep 98304:xZdthJwriyq9ouD/IJlr2TYPL0wTrVjVy1V20PC4MJkv3CZcjCnC68HrAGxLLT+M:jTAiy5uD/IJlrE21PyV28C4WE3CcWgHp
imphash 846876fcfaab8d0675698c01a809ad4d
impfuzzy 96:/mX3QbcGtpxWtv746AJ11tLCWc/cgs5rWFx1AXJ+Zcp+qjOugt7Pr2a:oGYtv7QJzzjZ+OFa
  Network IP location

Signature (18cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
danger Disables Windows Security features
watch Attempts to create or modify system certificates
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Creates hidden or system file
notice Expresses interest in specific running processes
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Looks up the external IP address
notice Performs some HTTP requests
notice Searches running processes potentially to identify processes for sandbox evasion
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info Collects information to fingerprint the system (MachineGuid
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (11cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://85.208.136.10/api/firegate.php DE CMCS 85.208.136.10 32663 mailcious
http://85.208.136.10/api/tracemap.php DE CMCS 85.208.136.10 32662 mailcious
https://api.myip.com/ US CLOUDFLARENET 172.67.75.163 clean
https://vk.com/doc746114504_647280747?hash=cvDFKP5q0CQEjBCbeoeHvPNrWE0xbMxZEmrkIeNKcET&dl=G42DMMJRGQ2TANA:1661413520:uZNj68vRUvQaydRD8wpAK8zluN0I7otw5AHbA1ZlN9T&api=1&no_preview=1 RU VKontakte Ltd 93.186.225.194 mailcious
ipinfo.io US GOOGLE 34.117.59.81 clean
vk.com RU VKontakte Ltd 87.240.132.72 mailcious
api.myip.com US CLOUDFLARENET 104.26.9.59 clean
93.186.225.194 RU VKontakte Ltd 93.186.225.194 mailcious
85.208.136.10 DE CMCS 85.208.136.10 mailcious
172.67.75.163 US CLOUDFLARENET 172.67.75.163 clean
34.117.59.81 US GOOGLE 34.117.59.81 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140696000 InitializeCriticalSectionEx
 0x140696008 lstrlenA
 0x140696010 lstrcatA
 0x140696018 GetModuleHandleA
 0x140696020 SetCurrentDirectoryA
 0x140696028 Sleep
 0x140696030 GetModuleHandleExA
 0x140696038 GetFileAttributesA
 0x140696040 GetBinaryTypeA
 0x140696048 QueryFullProcessImageNameA
 0x140696050 GetSystemDirectoryA
 0x140696058 GlobalAlloc
 0x140696060 lstrcpyA
 0x140696068 SetFileAttributesA
 0x140696070 VerSetConditionMask
 0x140696078 WideCharToMultiByte
 0x140696080 VerifyVersionInfoW
 0x140696088 GetSystemTimeAsFileTime
 0x140696090 HeapFree
 0x140696098 HeapAlloc
 0x1406960a0 GetProcAddress
 0x1406960a8 lstrcpynA
 0x1406960b0 GetProcessHeap
 0x1406960b8 AreFileApisANSI
 0x1406960c0 TryEnterCriticalSection
 0x1406960c8 HeapCreate
 0x1406960d0 EnterCriticalSection
 0x1406960d8 GetFullPathNameW
 0x1406960e0 GetDiskFreeSpaceW
 0x1406960e8 OutputDebugStringA
 0x1406960f0 LockFile
 0x1406960f8 LeaveCriticalSection
 0x140696100 InitializeCriticalSection
 0x140696108 GetFullPathNameA
 0x140696110 SetEndOfFile
 0x140696118 FindClose
 0x140696120 GetTempPathW
 0x140696128 CreateMutexW
 0x140696130 WaitForSingleObject
 0x140696138 GetFileAttributesW
 0x140696140 GetCurrentThreadId
 0x140696148 UnmapViewOfFile
 0x140696150 HeapValidate
 0x140696158 HeapSize
 0x140696160 MultiByteToWideChar
 0x140696168 GetTempPathA
 0x140696170 FormatMessageW
 0x140696178 GetDiskFreeSpaceA
 0x140696180 GetFileAttributesExW
 0x140696188 OutputDebugStringW
 0x140696190 FlushViewOfFile
 0x140696198 LoadLibraryA
 0x1406961a0 WaitForSingleObjectEx
 0x1406961a8 DeleteFileA
 0x1406961b0 DeleteFileW
 0x1406961b8 HeapReAlloc
 0x1406961c0 GetSystemInfo
 0x1406961c8 LoadLibraryW
 0x1406961d0 HeapCompact
 0x1406961d8 HeapDestroy
 0x1406961e0 UnlockFile
 0x1406961e8 LocalFree
 0x1406961f0 LockFileEx
 0x1406961f8 GetFileSize
 0x140696200 DeleteCriticalSection
 0x140696208 GetCurrentProcessId
 0x140696210 SystemTimeToFileTime
 0x140696218 FreeLibrary
 0x140696220 GetSystemTime
 0x140696228 FormatMessageA
 0x140696230 CreateFileMappingW
 0x140696238 MapViewOfFile
 0x140696240 QueryPerformanceCounter
 0x140696248 GetTickCount
 0x140696250 FlushFileBuffers
 0x140696258 WriteConsoleW
 0x140696260 CloseHandle
 0x140696268 CreateFileA
 0x140696270 GetLastError
 0x140696278 CreateFileW
 0x140696280 SetFilePointer
 0x140696288 WriteFile
 0x140696290 UnlockFileEx
 0x140696298 ReadFile
 0x1406962a0 SetEnvironmentVariableW
 0x1406962a8 FreeEnvironmentStringsW
 0x1406962b0 GetEnvironmentStringsW
 0x1406962b8 GetCommandLineW
 0x1406962c0 GetCommandLineA
 0x1406962c8 GetOEMCP
 0x1406962d0 RtlCaptureContext
 0x1406962d8 RtlLookupFunctionEntry
 0x1406962e0 RtlVirtualUnwind
 0x1406962e8 UnhandledExceptionFilter
 0x1406962f0 SetUnhandledExceptionFilter
 0x1406962f8 GetCurrentProcess
 0x140696300 TerminateProcess
 0x140696308 IsProcessorFeaturePresent
 0x140696310 InitializeSListHead
 0x140696318 InitializeCriticalSectionAndSpinCount
 0x140696320 SetEvent
 0x140696328 ResetEvent
 0x140696330 CreateEventW
 0x140696338 GetModuleHandleW
 0x140696340 IsDebuggerPresent
 0x140696348 GetStartupInfoW
 0x140696350 CreateDirectoryW
 0x140696358 FindFirstFileExW
 0x140696360 FindNextFileW
 0x140696368 SetFilePointerEx
 0x140696370 GetFileInformationByHandleEx
 0x140696378 QueryPerformanceFrequency
 0x140696380 LCMapStringEx
 0x140696388 EncodePointer
 0x140696390 DecodePointer
 0x140696398 GetCPInfo
 0x1406963a0 GetStringTypeW
 0x1406963a8 SetLastError
 0x1406963b0 GetCurrentThread
 0x1406963b8 GetThreadTimes
 0x1406963c0 RtlUnwindEx
 0x1406963c8 InterlockedPushEntrySList
 0x1406963d0 RtlPcToFileHeader
 0x1406963d8 RaiseException
 0x1406963e0 TlsAlloc
 0x1406963e8 TlsGetValue
 0x1406963f0 TlsSetValue
 0x1406963f8 TlsFree
 0x140696400 LoadLibraryExW
 0x140696408 GetFileType
 0x140696410 ExitProcess
 0x140696418 GetModuleHandleExW
 0x140696420 CreateThread
 0x140696428 ExitThread
 0x140696430 FreeLibraryAndExitThread
 0x140696438 GetModuleFileNameW
 0x140696440 GetStdHandle
 0x140696448 GetConsoleMode
 0x140696450 ReadConsoleW
 0x140696458 GetConsoleOutputCP
 0x140696460 SetStdHandle
 0x140696468 CompareStringW
 0x140696470 LCMapStringW
 0x140696478 GetLocaleInfoW
 0x140696480 IsValidLocale
 0x140696488 GetUserDefaultLCID
 0x140696490 EnumSystemLocalesW
 0x140696498 GetFileSizeEx
 0x1406964a0 GetTimeZoneInformation
 0x1406964a8 IsValidCodePage
 0x1406964b0 GetACP
 0x1406964b8 RtlUnwind
USER32.dll
 0x1406964c8 CharNextA
ADVAPI32.dll
 0x1406964d8 RegCloseKey
 0x1406964e0 RegCreateKeyExA
 0x1406964e8 RegSetValueExA
 0x1406964f0 OpenProcessToken
 0x1406964f8 RegOpenKeyExA
 0x140696500 GetTokenInformation
 0x140696508 CryptReleaseContext
SHELL32.dll
 0x140696518 ShellExecuteA
ole32.dll
 0x140696528 CoCreateInstance
 0x140696530 CoInitializeEx
 0x140696538 CoUninitialize
KERNEL32.dll
 0x140696548 GetSystemTimeAsFileTime
 0x140696550 GetModuleHandleA
 0x140696558 CreateEventA
 0x140696560 GetModuleFileNameW
 0x140696568 TerminateProcess
 0x140696570 GetCurrentProcess
 0x140696578 CreateToolhelp32Snapshot
 0x140696580 Thread32First
 0x140696588 GetCurrentProcessId
 0x140696590 GetCurrentThreadId
 0x140696598 OpenThread
 0x1406965a0 Thread32Next
 0x1406965a8 CloseHandle
 0x1406965b0 SuspendThread
 0x1406965b8 ResumeThread
 0x1406965c0 WriteProcessMemory
 0x1406965c8 GetSystemInfo
 0x1406965d0 VirtualAlloc
 0x1406965d8 VirtualProtect
 0x1406965e0 VirtualFree
 0x1406965e8 GetProcessAffinityMask
 0x1406965f0 SetProcessAffinityMask
 0x1406965f8 GetCurrentThread
 0x140696600 SetThreadAffinityMask
 0x140696608 Sleep
 0x140696610 LoadLibraryA
 0x140696618 FreeLibrary
 0x140696620 GetTickCount
 0x140696628 SystemTimeToFileTime
 0x140696630 FileTimeToSystemTime
 0x140696638 GlobalFree
 0x140696640 LocalAlloc
 0x140696648 LocalFree
 0x140696650 GetProcAddress
 0x140696658 ExitProcess
 0x140696660 EnterCriticalSection
 0x140696668 LeaveCriticalSection
 0x140696670 InitializeCriticalSection
 0x140696678 DeleteCriticalSection
 0x140696680 GetModuleHandleW
 0x140696688 LoadResource
 0x140696690 MultiByteToWideChar
 0x140696698 FindResourceExW
 0x1406966a0 FindResourceExA
 0x1406966a8 WideCharToMultiByte
 0x1406966b0 GetThreadLocale
 0x1406966b8 GetUserDefaultLCID
 0x1406966c0 GetSystemDefaultLCID
 0x1406966c8 EnumResourceNamesA
 0x1406966d0 EnumResourceNamesW
 0x1406966d8 EnumResourceLanguagesA
 0x1406966e0 EnumResourceLanguagesW
 0x1406966e8 EnumResourceTypesA
 0x1406966f0 EnumResourceTypesW
 0x1406966f8 CreateFileW
 0x140696700 LoadLibraryW
 0x140696708 GetLastError
 0x140696710 FlushFileBuffers
 0x140696718 WriteConsoleW
 0x140696720 SetStdHandle
 0x140696728 HeapReAlloc
 0x140696730 FlsSetValue
 0x140696738 GetCommandLineA
 0x140696740 RaiseException
 0x140696748 RtlPcToFileHeader
 0x140696750 HeapFree
 0x140696758 GetCPInfo
 0x140696760 GetACP
 0x140696768 GetOEMCP
 0x140696770 IsValidCodePage
 0x140696778 EncodePointer
 0x140696780 FlsGetValue
 0x140696788 FlsFree
 0x140696790 SetLastError
 0x140696798 FlsAlloc
 0x1406967a0 UnhandledExceptionFilter
 0x1406967a8 SetUnhandledExceptionFilter
 0x1406967b0 IsDebuggerPresent
 0x1406967b8 RtlVirtualUnwind
 0x1406967c0 RtlLookupFunctionEntry
 0x1406967c8 RtlCaptureContext
 0x1406967d0 DecodePointer
 0x1406967d8 HeapAlloc
 0x1406967e0 RtlUnwindEx
 0x1406967e8 LCMapStringW
 0x1406967f0 GetStringTypeW
 0x1406967f8 SetHandleCount
 0x140696800 GetStdHandle
 0x140696808 InitializeCriticalSectionAndSpinCount
 0x140696810 GetFileType
 0x140696818 GetStartupInfoW
 0x140696820 GetModuleFileNameA
 0x140696828 FreeEnvironmentStringsW
 0x140696830 GetEnvironmentStringsW
 0x140696838 HeapSetInformation
 0x140696840 GetVersion
 0x140696848 HeapCreate
 0x140696850 HeapDestroy
 0x140696858 QueryPerformanceCounter
 0x140696860 HeapSize
 0x140696868 WriteFile
 0x140696870 SetFilePointer
 0x140696878 GetConsoleCP
 0x140696880 GetConsoleMode
USER32.dll
 0x140696890 CharUpperBuffW
KERNEL32.dll
 0x1406968a0 LocalAlloc
 0x1406968a8 LocalFree
 0x1406968b0 GetModuleFileNameW
 0x1406968b8 ExitProcess
 0x1406968c0 LoadLibraryA
 0x1406968c8 GetModuleHandleA
 0x1406968d0 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure