Report - crypted.exe

UPX Malicious Library Malicious Packer AntiDebug AntiVM OS Processor Check PE File PE32
ScreenShot
Created 2023.07.12 17:35 Machine s1_win7_x6403
Filename crypted.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
11
Behavior Score
10.8
ZERO API file : mailcious
VT API (file) 30 detected (AIDetectMalware, unsafe, Save, malicious, confidence, ZexaF, hvW@au3y0fc, Kryptik, Eldorado, Attribute, HighConfidence, high confidence, ETBS, score, PWSX, Generic ML PUA, high, RedLine, RDCA, LJ2WHR, Detected, Artemis, BScope, TrojanPSW, Lska3PRcODO, Static AI, Malicious PE, ESYR)
md5 aa06cd111cb6800e04353ec34723044b
sha256 e919ae428cb8359cae0d30ceeb9f1c9b7470bb9bf75ba70d65d87c175b5d4a18
ssdeep 6144:4xquEWzU74wCPALLYdTBlIAOlBj+UHFiHLIxnQfy/odA2jzFwvdI:I0WzU74nzIrBjnAmnQigAOwO
imphash c35499a3c274c45eacc6e8d485573f91
impfuzzy 24:7H9q0Su985ikbZETKAWJjGHcpVWZLDsl94GtC7bJh9LLOovbO3gv9FZYGMAkES:M5BOWoHcpVeMcGteDJ63y9FZG
  Network IP location

Signature (24cnts)

Level Description
danger Executed a process and injected code into it
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious
watch Allocates execute permission to another process indicative of possible code injection
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Harvests credentials from local FTP client softwares
watch Manipulates memory of a non-child process indicative of process injection
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice One or more potentially interesting buffers were extracted
notice Queries for potentially installed applications
notice Steals private information from local Internet browsers
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (14cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
45.15.156.21 RU CJSC Kolomna-Sviaz TV 45.15.156.21 clean

Suricata ids

PE API

IAT(Import Address Table) Library

SHELL32.dll
 0x429184 SHSetLocalizedName
 0x429188 None
GDI32.dll
 0x429000 GetArcDirection
ole32.dll
 0x429190 CoGetApartmentType
 0x429194 CoGetObjectContext
KERNEL32.dll
 0x429008 HeapSize
 0x42900c CreateFileW
 0x429010 GetProcessHeap
 0x429014 SetStdHandle
 0x429018 SetEnvironmentVariableW
 0x42901c GetModuleHandleA
 0x429020 GetModuleHandleW
 0x429024 RaiseException
 0x429028 GetCurrentThreadId
 0x42902c IsProcessorFeaturePresent
 0x429030 GetLastError
 0x429034 FreeLibraryWhenCallbackReturns
 0x429038 CreateThreadpoolWork
 0x42903c SubmitThreadpoolWork
 0x429040 CloseThreadpoolWork
 0x429044 GetModuleHandleExW
 0x429048 MultiByteToWideChar
 0x42904c InitializeConditionVariable
 0x429050 WakeConditionVariable
 0x429054 WakeAllConditionVariable
 0x429058 SleepConditionVariableSRW
 0x42905c InitOnceComplete
 0x429060 InitOnceBeginInitialize
 0x429064 GetStringTypeW
 0x429068 InitializeSRWLock
 0x42906c ReleaseSRWLockExclusive
 0x429070 AcquireSRWLockExclusive
 0x429074 TryAcquireSRWLockExclusive
 0x429078 WideCharToMultiByte
 0x42907c CloseHandle
 0x429080 WaitForSingleObjectEx
 0x429084 QueryPerformanceCounter
 0x429088 EnterCriticalSection
 0x42908c LeaveCriticalSection
 0x429090 InitializeCriticalSectionEx
 0x429094 DeleteCriticalSection
 0x429098 EncodePointer
 0x42909c DecodePointer
 0x4290a0 LCMapStringEx
 0x4290a4 GetSystemTimeAsFileTime
 0x4290a8 GetProcAddress
 0x4290ac WriteConsoleW
 0x4290b0 GetCPInfo
 0x4290b4 InitializeCriticalSectionAndSpinCount
 0x4290b8 SetEvent
 0x4290bc ResetEvent
 0x4290c0 CreateEventW
 0x4290c4 GetCurrentProcessId
 0x4290c8 InitializeSListHead
 0x4290cc IsDebuggerPresent
 0x4290d0 UnhandledExceptionFilter
 0x4290d4 SetUnhandledExceptionFilter
 0x4290d8 GetStartupInfoW
 0x4290dc GetCurrentProcess
 0x4290e0 TerminateProcess
 0x4290e4 FreeEnvironmentStringsW
 0x4290e8 RtlUnwind
 0x4290ec SetLastError
 0x4290f0 TlsAlloc
 0x4290f4 TlsGetValue
 0x4290f8 TlsSetValue
 0x4290fc TlsFree
 0x429100 FreeLibrary
 0x429104 LoadLibraryExW
 0x429108 GetStdHandle
 0x42910c WriteFile
 0x429110 GetModuleFileNameW
 0x429114 ExitProcess
 0x429118 GetCommandLineA
 0x42911c GetCommandLineW
 0x429120 HeapAlloc
 0x429124 HeapFree
 0x429128 GetFileType
 0x42912c CompareStringW
 0x429130 LCMapStringW
 0x429134 GetLocaleInfoW
 0x429138 IsValidLocale
 0x42913c GetUserDefaultLCID
 0x429140 EnumSystemLocalesW
 0x429144 FlushFileBuffers
 0x429148 GetConsoleOutputCP
 0x42914c GetConsoleMode
 0x429150 ReadFile
 0x429154 GetFileSizeEx
 0x429158 SetFilePointerEx
 0x42915c ReadConsoleW
 0x429160 HeapReAlloc
 0x429164 FindClose
 0x429168 FindFirstFileExW
 0x42916c FindNextFileW
 0x429170 IsValidCodePage
 0x429174 GetACP
 0x429178 GetOEMCP
 0x42917c GetEnvironmentStringsW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure