Report - 1500381323.exe

PE File PE32
ScreenShot
Created 2023.06.30 17:50 Machine s1_win7_x6401
Filename 1500381323.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
5
Behavior Score
4.2
ZERO API file : malware
VT API (file) 46 detected (BroPass, malicious, high confidence, GenericKD, Artemis, Unsafe, Bebra, ZexaF, IMX@aWwIczi, Eldorado, Attribute, HighConfidence, BebraStealer, score, junbmh, FalseSign, Ydkl, DownLoader45, PRIVATELOADER, YXDA4Z, GenericRXUY, AGEN, Convagent, Sabsik, Detected, BScope, ai score=80, PasswordStealer, HtG7rdSXBaB, rRnQbIQZOJ4, Static AI, Suspicious PE, Fragtor, Genetic)
md5 9ddd093cef3f15d6fd8d5d0ec9e0e014
sha256 8f0fed1d3f086a7f6d26db844963193e1eb5ee0dd53cbd8de2fdc13f95e65479
ssdeep 49152:JTcxIbnTlbPSHifkG/Sc9fAyXhMacjKxqn9qzM8NbUAH16O1Dfr0Wh6b+BzIIWQ:JiEnBmHekGz9fAyhMoOh8NbUAHB1Dfr/
imphash 0e504ec9659601103bf3eb149ebb6cf2
impfuzzy 96:lQB0/X7+bSrNmeTMqHs47xQ/VXiX1PriJGeRlM54qge/UFshp:lQKf7gSrRTMo+VSFJeDMgesWj
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Command line console output was observed

Rules (2cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://65.21.213.208:3000/ Unknown 65.21.213.208 26337 mailcious
65.21.213.208 Unknown 65.21.213.208 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

crypt.dll
 0x680404 BCryptDecrypt
 0x680408 BCryptGenerateSymmetricKey
 0x68040c BCryptOpenAlgorithmProvider
 0x680410 BCryptSetProperty
CRYPT32.dll
 0x680418 CryptUnprotectData
KERNEL32.dll
 0x680420 AddAtomA
 0x680424 AddVectoredExceptionHandler
 0x680428 AreFileApisANSI
 0x68042c CloseHandle
 0x680430 CreateEventA
 0x680434 CreateFileA
 0x680438 CreateFileMappingA
 0x68043c CreateFileMappingW
 0x680440 CreateFileW
 0x680444 CreateMutexA
 0x680448 CreateMutexW
 0x68044c CreateProcessA
 0x680450 CreateSemaphoreA
 0x680454 DeleteAtom
 0x680458 DeleteCriticalSection
 0x68045c DeleteFileA
 0x680460 DeleteFileW
 0x680464 DuplicateHandle
 0x680468 EnterCriticalSection
 0x68046c FindAtomA
 0x680470 FlushFileBuffers
 0x680474 FlushViewOfFile
 0x680478 FormatMessageA
 0x68047c FormatMessageW
 0x680480 FreeLibrary
 0x680484 GetAtomNameA
 0x680488 GetCurrentProcess
 0x68048c GetCurrentProcessId
 0x680490 GetCurrentThread
 0x680494 GetCurrentThreadId
 0x680498 GetDiskFreeSpaceA
 0x68049c GetDiskFreeSpaceW
 0x6804a0 GetFileAttributesA
 0x6804a4 GetFileAttributesExW
 0x6804a8 GetFileAttributesW
 0x6804ac GetFileSize
 0x6804b0 GetFullPathNameA
 0x6804b4 GetFullPathNameW
 0x6804b8 GetHandleInformation
 0x6804bc GetLastError
 0x6804c0 GetModuleHandleW
 0x6804c4 GetProcAddress
 0x6804c8 GetProcessAffinityMask
 0x6804cc GetProcessHeap
 0x6804d0 GetStartupInfoA
 0x6804d4 GetSystemInfo
 0x6804d8 GetSystemTime
 0x6804dc GetSystemTimeAsFileTime
 0x6804e0 GetTempPathA
 0x6804e4 GetTempPathW
 0x6804e8 GetThreadContext
 0x6804ec GetThreadPriority
 0x6804f0 GetTickCount
 0x6804f4 GetVersionExA
 0x6804f8 GetVersionExW
 0x6804fc HeapAlloc
 0x680500 HeapCompact
 0x680504 HeapCreate
 0x680508 HeapDestroy
 0x68050c HeapFree
 0x680510 HeapReAlloc
 0x680514 HeapSize
 0x680518 HeapValidate
 0x68051c InitializeCriticalSection
 0x680520 IsDBCSLeadByteEx
 0x680524 IsDebuggerPresent
 0x680528 LeaveCriticalSection
 0x68052c LoadLibraryA
 0x680530 LoadLibraryW
 0x680534 LocalFree
 0x680538 LockFile
 0x68053c LockFileEx
 0x680540 MapViewOfFile
 0x680544 MultiByteToWideChar
 0x680548 OpenProcess
 0x68054c OutputDebugStringA
 0x680550 OutputDebugStringW
 0x680554 QueryPerformanceCounter
 0x680558 QueryPerformanceFrequency
 0x68055c RaiseException
 0x680560 ReadFile
 0x680564 ReleaseMutex
 0x680568 ReleaseSemaphore
 0x68056c RemoveVectoredExceptionHandler
 0x680570 ResetEvent
 0x680574 ResumeThread
 0x680578 SetEndOfFile
 0x68057c SetEvent
 0x680580 SetFilePointer
 0x680584 SetLastError
 0x680588 SetProcessAffinityMask
 0x68058c SetThreadContext
 0x680590 SetThreadPriority
 0x680594 SetUnhandledExceptionFilter
 0x680598 Sleep
 0x68059c SuspendThread
 0x6805a0 SystemTimeToFileTime
 0x6805a4 TlsAlloc
 0x6805a8 TlsGetValue
 0x6805ac TlsSetValue
 0x6805b0 TryEnterCriticalSection
 0x6805b4 UnlockFile
 0x6805b8 UnlockFileEx
 0x6805bc UnmapViewOfFile
 0x6805c0 VirtualProtect
 0x6805c4 VirtualQuery
 0x6805c8 WaitForMultipleObjects
 0x6805cc WaitForSingleObject
 0x6805d0 WaitForSingleObjectEx
 0x6805d4 WideCharToMultiByte
 0x6805d8 WriteFile
 0x6805dc lstrcatW
msvcrt.dll
 0x6805e4 __getmainargs
 0x6805e8 __initenv
 0x6805ec __lconv_init
 0x6805f0 __mb_cur_max
 0x6805f4 __p__acmdln
 0x6805f8 __p__commode
 0x6805fc __p__fmode
 0x680600 __set_app_type
 0x680604 __setusermatherr
 0x680608 _amsg_exit
 0x68060c _assert
 0x680610 _beginthreadex
 0x680614 _cexit
 0x680618 _close
 0x68061c _endthreadex
 0x680620 _errno
 0x680624 _fdopen
 0x680628 _filelengthi64
 0x68062c _fileno
 0x680630 _fileno
 0x680634 _fstat64
 0x680638 _initterm
 0x68063c _iob
 0x680640 _lseeki64
 0x680644 _mbsicmp
 0x680648 _onexit
 0x68064c _read
 0x680650 _memccpy
 0x680654 _setjmp3
 0x680658 _strdup
 0x68065c _strnicmp
 0x680660 _ultoa
 0x680664 _wfopen
 0x680668 _wgetenv_s
 0x68066c _write
 0x680670 abort
 0x680674 atoi
 0x680678 calloc
 0x68067c exit
 0x680680 fclose
 0x680684 fflush
 0x680688 fgetpos
 0x68068c fopen
 0x680690 fprintf
 0x680694 fputc
 0x680698 fputs
 0x68069c fputwc
 0x6806a0 fread
 0x6806a4 free
 0x6806a8 fsetpos
 0x6806ac fwrite
 0x6806b0 fwprintf
 0x6806b4 getc
 0x6806b8 getwc
 0x6806bc isalnum
 0x6806c0 isspace
 0x6806c4 iswctype
 0x6806c8 localtime
 0x6806cc localeconv
 0x6806d0 longjmp
 0x6806d4 malloc
 0x6806d8 memchr
 0x6806dc memcmp
 0x6806e0 memcpy
 0x6806e4 memmove
 0x6806e8 memset
 0x6806ec printf
 0x6806f0 putc
 0x6806f4 putwc
 0x6806f8 realloc
 0x6806fc setlocale
 0x680700 setvbuf
 0x680704 signal
 0x680708 strchr
 0x68070c strcmp
 0x680710 strcoll
 0x680714 strcspn
 0x680718 strerror
 0x68071c strftime
 0x680720 strlen
 0x680724 strncmp
 0x680728 strrchr
 0x68072c strxfrm
 0x680730 system
 0x680734 towlower
 0x680738 towupper
 0x68073c ungetc
 0x680740 ungetwc
 0x680744 vfprintf
 0x680748 wcscoll
 0x68074c wcsftime
 0x680750 wcslen
 0x680754 wcstombs
 0x680758 wcsxfrm
WINHTTP.dll
 0x680760 WinHttpAddRequestHeaders
 0x680764 WinHttpCloseHandle
 0x680768 WinHttpConnect
 0x68076c WinHttpOpen
 0x680770 WinHttpOpenRequest
 0x680774 WinHttpQueryDataAvailable
 0x680778 WinHttpQueryHeaders
 0x68077c WinHttpReadData
 0x680780 WinHttpReceiveResponse
 0x680784 WinHttpSendRequest
 0x680788 WinHttpSetOption

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure