Report - 32123212.exe

Generic Malware UPX Obsidium protector Malicious Library Malicious Packer Antivirus OS Processor Check PE File PE32
ScreenShot
Created 2023.07.31 17:32 Machine s1_win7_x6403
Filename 32123212.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
5
Behavior Score
7.0
ZERO API file : clean
VT API (file) 16 detected (malicious, moderate confidence, Fragtor, ZexaCO, eQW@aKwhob, Attribute, HighConfidence, BitMin, ai score=86, Genetic, confidence)
md5 9bd1cc9b027a4420d6e4f780c50af93c
sha256 e65881aa7f6c33636776089b3584dbf8a1c1e7d04de4ed286bb0d5a50aa769f5
ssdeep 49152:a5eNQ7HYLiM2DV9Dy+B5edHCxnaEBgKwNVQ:A1VMyDF5xna
imphash b41abaa038d8b27317c2ba6ce503cfa5
impfuzzy 96:NW5W6tiqeV5RnN/bYxyXHOW3b8OhYfPOT3n4I9gXiX18HJGCN7qTAEHO:NW5W6tivV5F+Wp/MWgSFJCNmTAEHO
  Network IP location

Signature (19cnts)

Level Description
watch Attempts to create or modify system certificates
watch File has been identified by 16 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Executes one or more WMI queries
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Moves the original executable to a new location
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info Uses Windows APIs to generate a cryptographic key

Rules (10cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch Obsidium_Zero Obsidium protector file binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://github.com/abjula/server/raw/main/2.rar US MICROSOFT-CORP-MSN-AS-BLOCK 20.200.245.247 clean
https://raw.githubusercontent.com/abjula/server/main/2.rar US FASTLY 185.199.108.133 clean
github.com US MICROSOFT-CORP-MSN-AS-BLOCK 20.200.245.247 mailcious
raw.githubusercontent.com US FASTLY 185.199.108.133 malware
185.199.108.133 US FASTLY 185.199.108.133 mailcious
20.200.245.247 US MICROSOFT-CORP-MSN-AS-BLOCK 20.200.245.247 malware

Suricata ids

PE API

IAT(Import Address Table) Library

crypt32.dll
 0x606474 CertAddCertificateContextToStore
 0x606478 CertCloseStore
 0x60647c CertDuplicateCertificateChain
 0x606480 CertDuplicateCertificateContext
 0x606484 CertDuplicateStore
 0x606488 CertEnumCertificatesInStore
 0x60648c CertFreeCertificateChain
 0x606490 CertFreeCertificateContext
 0x606494 CertGetCertificateChain
 0x606498 CertOpenStore
 0x60649c CertVerifyCertificateChainPolicy
kernel32.dll
 0x6064a4 AcquireSRWLockExclusive
 0x6064a8 AcquireSRWLockShared
 0x6064ac AddVectoredExceptionHandler
 0x6064b0 CancelIo
 0x6064b4 CloseHandle
 0x6064b8 CompareStringOrdinal
 0x6064bc CreateEventW
 0x6064c0 CreateFileMappingA
 0x6064c4 CreateFileW
 0x6064c8 CreateIoCompletionPort
 0x6064cc CreateMutexA
 0x6064d0 CreateNamedPipeW
 0x6064d4 CreateProcessW
 0x6064d8 CreateThread
 0x6064dc CreateToolhelp32Snapshot
 0x6064e0 DuplicateHandle
 0x6064e4 ExitProcess
 0x6064e8 FormatMessageW
 0x6064ec FreeEnvironmentStringsW
 0x6064f0 FreeLibrary
 0x6064f4 GetConsoleMode
 0x6064f8 GetCurrentDirectoryW
 0x6064fc GetCurrentProcess
 0x606500 GetCurrentProcessId
 0x606504 GetCurrentThread
 0x606508 GetEnvironmentStringsW
 0x60650c GetEnvironmentVariableW
 0x606510 GetExitCodeProcess
 0x606514 GetFileAttributesW
 0x606518 GetFileInformationByHandle
 0x60651c GetFileInformationByHandleEx
 0x606520 GetFinalPathNameByHandleW
 0x606524 GetFullPathNameW
 0x606528 GetLastError
 0x60652c GetModuleFileNameW
 0x606530 GetModuleHandleA
 0x606534 GetModuleHandleW
 0x606538 GetOverlappedResult
 0x60653c GetProcAddress
 0x606540 GetProcessHeap
 0x606544 GetQueuedCompletionStatusEx
 0x606548 GetStdHandle
 0x60654c GetSystemDirectoryW
 0x606550 GetSystemInfo
 0x606554 GetTempPathW
 0x606558 GetWindowsDirectoryW
 0x60655c GlobalAlloc
 0x606560 GlobalFree
 0x606564 GlobalLock
 0x606568 GlobalSize
 0x60656c GlobalUnlock
 0x606570 HeapAlloc
 0x606574 HeapFree
 0x606578 HeapReAlloc
 0x60657c InitOnceBeginInitialize
 0x606580 InitOnceComplete
 0x606584 LoadLibraryA
 0x606588 MapViewOfFile
 0x60658c Module32FirstW
 0x606590 Module32NextW
 0x606594 MoveFileExW
 0x606598 MultiByteToWideChar
 0x60659c PostQueuedCompletionStatus
 0x6065a0 QueryPerformanceCounter
 0x6065a4 QueryPerformanceFrequency
 0x6065a8 ReadFile
 0x6065ac ReadFileEx
 0x6065b0 ReleaseMutex
 0x6065b4 ReleaseSRWLockExclusive
 0x6065b8 ReleaseSRWLockShared
 0x6065bc SetFileCompletionNotificationModes
 0x6065c0 SetHandleInformation
 0x6065c4 SetLastError
 0x6065c8 SetThreadStackGuarantee
 0x6065cc SetUnhandledExceptionFilter
 0x6065d0 Sleep
 0x6065d4 SleepEx
 0x6065d8 SwitchToThread
 0x6065dc TlsAlloc
 0x6065e0 TlsFree
 0x6065e4 TlsGetValue
 0x6065e8 TlsSetValue
 0x6065ec TryAcquireSRWLockExclusive
 0x6065f0 UnmapViewOfFile
 0x6065f4 WaitForMultipleObjects
 0x6065f8 WaitForSingleObject
 0x6065fc WaitForSingleObjectEx
 0x606600 WriteConsoleW
 0x606604 WriteFileEx
secur32.dll
 0x60660c AcceptSecurityContext
 0x606610 AcquireCredentialsHandleA
 0x606614 ApplyControlToken
 0x606618 DecryptMessage
 0x60661c DeleteSecurityContext
 0x606620 EncryptMessage
 0x606624 FreeContextBuffer
 0x606628 FreeCredentialsHandle
 0x60662c InitializeSecurityContextW
 0x606630 QueryContextAttributesW
user32.dll
 0x606638 CloseClipboard
 0x60663c EmptyClipboard
 0x606640 GetClipboardData
 0x606644 OpenClipboard
 0x606648 SetClipboardData
ws2_32.dll
 0x606650 WSACleanup
 0x606654 WSAGetLastError
 0x606658 WSAIoctl
 0x60665c WSASend
 0x606660 WSASocketW
 0x606664 WSAStartup
 0x606668 ind
 0x60666c closesocket
 0x606670 connect
 0x606674 freeaddrinfo
 0x606678 getaddrinfo
 0x60667c getpeername
 0x606680 getsockname
 0x606684 getsockopt
 0x606688 ioctlsocket
 0x60668c recv
 0x606690 send
 0x606694 setsockopt
 0x606698 shutdown
ADVAPI32.dll
 0x6066a0 GetTokenInformation
 0x6066a4 OpenProcessToken
 0x6066a8 RegCloseKey
 0x6066ac RegOpenKeyExW
 0x6066b0 RegQueryValueExW
 0x6066b4 SystemFunction036
crypt.dll
 0x6066bc BCryptGenRandom
KERNEL32.dll
 0x6066c4 CreateEventA
 0x6066c8 CreateSemaphoreA
 0x6066cc DeleteCriticalSection
 0x6066d0 EnterCriticalSection
 0x6066d4 GetCurrentThreadId
 0x6066d8 GetHandleInformation
 0x6066dc GetProcessAffinityMask
 0x6066e0 GetSystemTimeAsFileTime
 0x6066e4 GetThreadContext
 0x6066e8 GetThreadPriority
 0x6066ec GetTickCount64
 0x6066f0 InitializeCriticalSection
 0x6066f4 IsDebuggerPresent
 0x6066f8 IsProcessorFeaturePresent
 0x6066fc LeaveCriticalSection
 0x606700 LoadLibraryW
 0x606704 OpenProcess
 0x606708 OutputDebugStringA
 0x60670c RaiseException
 0x606710 ReleaseSemaphore
 0x606714 RemoveVectoredExceptionHandler
 0x606718 ResetEvent
 0x60671c ResumeThread
 0x606720 SetEvent
 0x606724 SetProcessAffinityMask
 0x606728 SetThreadContext
 0x60672c SetThreadPriority
 0x606730 SuspendThread
 0x606734 TerminateProcess
 0x606738 TryEnterCriticalSection
 0x60673c VirtualProtect
 0x606740 VirtualQuery
msvcrt.dll
 0x606748 __getmainargs
 0x60674c __initenv
 0x606750 __p__commode
 0x606754 __p__fmode
 0x606758 __set_app_type
 0x60675c __setusermatherr
 0x606760 _amsg_exit
 0x606764 _beginthreadex
 0x606768 _cexit
 0x60676c _commode
 0x606770 _endthreadex
 0x606774 _errno
 0x606778 _fmode
 0x60677c _fpreset
 0x606780 _initterm
 0x606784 _iob
 0x606788 _onexit
 0x60678c _setjmp3
 0x606790 _strdup
 0x606794 _ultoa
 0x606798 _write
 0x60679c abort
 0x6067a0 calloc
 0x6067a4 exit
 0x6067a8 fprintf
 0x6067ac free
 0x6067b0 fwrite
 0x6067b4 longjmp
 0x6067b8 malloc
 0x6067bc memcpy
 0x6067c0 memmove
 0x6067c4 memset
 0x6067c8 memcmp
 0x6067cc pow
 0x6067d0 printf
 0x6067d4 realloc
 0x6067d8 signal
 0x6067dc strlen
 0x6067e0 strncmp
 0x6067e4 vfprintf
ntdll.dll
 0x6067ec NtCancelIoFileEx
 0x6067f0 NtCreateFile
 0x6067f4 NtDeviceIoControlFile
 0x6067f8 NtReadFile
 0x6067fc NtWriteFile
 0x606800 RtlCaptureContext
 0x606804 RtlNtStatusToDosError

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure