ScreenShot
Created | 2023.07.07 18:08 | Machine | s1_win7_x6401 |
Filename | AMDx46.exe | ||
Type | PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | |||
VT API (file) | 34 detected (Miner, Artemis, Save, malicious, confidence, 100%, Coinminer, Attribute, HighConfidence, high confidence, Kryptik, score, Detected, EPACK, Gen2, O60H15, R534006, unsafe, Chgt, OnrqKPld52N, Static AI, Suspicious PE, AGENMM) | ||
md5 | 759300ac41209528786f5445346ae591 | ||
sha256 | d7e538f2706c6de8ebc8756d302b444334e9286b9dd35f7687c83f71af543062 | ||
ssdeep | 49152:B3Cn74tmhuqOZ2iZDCIrw/wXoic1RmeV1vBC7DtXi8ln/:B3CqCBiZViRvVb4tXia | ||
imphash | df9a7bc1c6c6cd97d04c3762fdde6719 | ||
impfuzzy | 24:Dfjz+kQYJd1j9Mblif5XGTqqXZPFkomtcqcCZJF:DfH+kXHslEJGTqqJdk1uqcAF |
Network IP location
Signature (6cnts)
Level | Description |
---|---|
danger | File has been identified by 34 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Sends data using the HTTP POST Method |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
info | IsPE64 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Suricata ids
ET POLICY Cryptocurrency Miner Checkin
ET COINMINER Observed DNS Query to Cryptocurrency Mining Pool Domain (xmr .2miners .com)
ET MALWARE Win32/Pripyat Activity (POST)
ET COINMINER Observed DNS Query to Cryptocurrency Mining Pool Domain (xmr .2miners .com)
ET MALWARE Win32/Pripyat Activity (POST)
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x14020c244 CreateSemaphoreW
0x14020c24c DeleteCriticalSection
0x14020c254 EnterCriticalSection
0x14020c25c GetLastError
0x14020c264 GetModuleFileNameW
0x14020c26c GetStartupInfoW
0x14020c274 InitializeCriticalSection
0x14020c27c IsDBCSLeadByteEx
0x14020c284 LeaveCriticalSection
0x14020c28c MultiByteToWideChar
0x14020c294 ReleaseSemaphore
0x14020c29c SetLastError
0x14020c2a4 SetUnhandledExceptionFilter
0x14020c2ac Sleep
0x14020c2b4 TlsAlloc
0x14020c2bc TlsFree
0x14020c2c4 TlsGetValue
0x14020c2cc TlsSetValue
0x14020c2d4 VirtualProtect
0x14020c2dc VirtualQuery
0x14020c2e4 WaitForSingleObject
msvcrt.dll
0x14020c2f4 __C_specific_handler
0x14020c2fc ___lc_codepage_func
0x14020c304 ___mb_cur_max_func
0x14020c30c __iob_func
0x14020c314 __set_app_type
0x14020c31c __setusermatherr
0x14020c324 __wgetmainargs
0x14020c32c __winitenv
0x14020c334 _amsg_exit
0x14020c33c _assert
0x14020c344 _cexit
0x14020c34c _commode
0x14020c354 _errno
0x14020c35c _fmode
0x14020c364 _initterm
0x14020c36c _onexit
0x14020c374 _wcmdln
0x14020c37c _wcsicmp
0x14020c384 _wgetenv
0x14020c38c abort
0x14020c394 calloc
0x14020c39c exit
0x14020c3a4 fprintf
0x14020c3ac fputwc
0x14020c3b4 free
0x14020c3bc fwprintf
0x14020c3c4 fwrite
0x14020c3cc localeconv
0x14020c3d4 malloc
0x14020c3dc memcpy
0x14020c3e4 memset
0x14020c3ec realloc
0x14020c3f4 signal
0x14020c3fc strerror
0x14020c404 strlen
0x14020c40c strncmp
0x14020c414 vfprintf
0x14020c41c wcscat
0x14020c424 wcscpy
0x14020c42c wcslen
0x14020c434 wcsncmp
0x14020c43c wcsstr
EAT(Export Address Table) is none
KERNEL32.dll
0x14020c244 CreateSemaphoreW
0x14020c24c DeleteCriticalSection
0x14020c254 EnterCriticalSection
0x14020c25c GetLastError
0x14020c264 GetModuleFileNameW
0x14020c26c GetStartupInfoW
0x14020c274 InitializeCriticalSection
0x14020c27c IsDBCSLeadByteEx
0x14020c284 LeaveCriticalSection
0x14020c28c MultiByteToWideChar
0x14020c294 ReleaseSemaphore
0x14020c29c SetLastError
0x14020c2a4 SetUnhandledExceptionFilter
0x14020c2ac Sleep
0x14020c2b4 TlsAlloc
0x14020c2bc TlsFree
0x14020c2c4 TlsGetValue
0x14020c2cc TlsSetValue
0x14020c2d4 VirtualProtect
0x14020c2dc VirtualQuery
0x14020c2e4 WaitForSingleObject
msvcrt.dll
0x14020c2f4 __C_specific_handler
0x14020c2fc ___lc_codepage_func
0x14020c304 ___mb_cur_max_func
0x14020c30c __iob_func
0x14020c314 __set_app_type
0x14020c31c __setusermatherr
0x14020c324 __wgetmainargs
0x14020c32c __winitenv
0x14020c334 _amsg_exit
0x14020c33c _assert
0x14020c344 _cexit
0x14020c34c _commode
0x14020c354 _errno
0x14020c35c _fmode
0x14020c364 _initterm
0x14020c36c _onexit
0x14020c374 _wcmdln
0x14020c37c _wcsicmp
0x14020c384 _wgetenv
0x14020c38c abort
0x14020c394 calloc
0x14020c39c exit
0x14020c3a4 fprintf
0x14020c3ac fputwc
0x14020c3b4 free
0x14020c3bc fwprintf
0x14020c3c4 fwrite
0x14020c3cc localeconv
0x14020c3d4 malloc
0x14020c3dc memcpy
0x14020c3e4 memset
0x14020c3ec realloc
0x14020c3f4 signal
0x14020c3fc strerror
0x14020c404 strlen
0x14020c40c strncmp
0x14020c414 vfprintf
0x14020c41c wcscat
0x14020c424 wcscpy
0x14020c42c wcslen
0x14020c434 wcsncmp
0x14020c43c wcsstr
EAT(Export Address Table) is none