Report - taskhostamd.exe

UPX MPRESS PE File PE32 JPEG Format
ScreenShot
Created 2023.07.20 07:47 Machine s1_win7_x6401
Filename taskhostamd.exe
Type MS-DOS executable, MZ for MS-DOS
AI Score
4
Behavior Score
13.4
ZERO API file : malware
VT API (file) 44 detected (Common, malicious, high confidence, GenericKD, Artemis, Vvqk, ZexaF, IpvaaigevvfO, GenCBL, score, eqbh, Gencirc, wwqiw, SpyBot, AMADEY, YXDGSZ, high, EncPk, Sabsik, Play, Detected, ai score=82, unsafe, Chgt, LwQhXC3HeoI, confidence, 100%)
md5 54cbe835ac726ec258b58566cab62aaa
sha256 73a8b0306a237247a9ae4187e6d3df691bfb5069a2cf3755597c48631a3f913d
ssdeep 98304:EXY8W8Wdatv7vsldD2ljL0Du5Gi20MwOmawp:2Y8Wkd7+DULUuYismz
imphash 36931dcefeb26f32aa1f4ff6c891684d
impfuzzy 6:nERGDfAptabxdLqRgKLbGeuL16n9hF6BIIo:EcDfAmGRgRZg9XCXo
  Network IP location

Signature (29cnts)

Level Description
danger File has been identified by 44 AntiVirus engines on VirusTotal as malicious
watch Attempts to identify installed AV products by installation directory
watch Checks for the presence of known windows from debuggers and forensic tools
watch Checks the version of Bios
watch Communicates with host for which no DNS query was performed
watch Creates an executable file in a user folder
watch Detects Virtual Machines through their custom firmware
watch Detects VirtualBox through the presence of a registry key
watch Detects VMWare through the in instruction feature
watch Drops a binary and executes it
watch Installs itself for autorun at Windows startup
watch Uses suspicious command line tools or Windows utilities
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks whether any human activity is being performed by constantly checking whether the foreground window changed
notice Creates a suspicious process
notice Expresses interest in specific running processes
notice Foreign language identified in PE resource
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (9cnts)

Level Name Description Collection
watch MPRESS_Zero MPRESS packed file binaries (download)
watch MPRESS_Zero MPRESS packed file binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info JPEG_Format_Zero JPEG Format binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://45.15.156.208/jd9dd3Vw/index.php?scr=1 RU CJSC Kolomna-Sviaz TV 45.15.156.208 clean
http://45.15.156.208/jd9dd3Vw/index.php RU CJSC Kolomna-Sviaz TV 45.15.156.208 clean
second.amadgood.com Unknown clean
45.15.156.208 RU CJSC Kolomna-Sviaz TV 45.15.156.208 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x98f0a0 GetModuleHandleA
 0x98f0a4 GetProcAddress
USER32.dll
 0x98f0ac GetSystemMetrics
GDI32.dll
 0x98f0b4 CreateCompatibleBitmap
ADVAPI32.dll
 0x98f0bc RegCloseKey
SHELL32.dll
 0x98f0c4 SHGetFolderPathA
WININET.dll
 0x98f0cc HttpOpenRequestA
gdiplus.dll
 0x98f0d4 GdipSaveImageToFile

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure