ScreenShot
Created | 2023.08.02 10:16 | Machine | s1_win7_x6403 |
Filename | fffffff.exe1 | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 25 detected (AIDetectMalware, malicious, high confidence, unsafe, Save, score, ccmw, EncPk, Static AI, Malicious PE, Wacapew, Detected, ZexaF, Gu0@aeWpXDci, BScope, Dridex, MachineLearning, Anomalous, 100%, Generic@AI, RDML, 6zgeAFwHW4a5Z6Nvl7, susgen, confidence) | ||
md5 | 12e493f7a5f1d8487239d477631457b9 | ||
sha256 | 0c21cc2b9bf1e49a8b2eada21a695170c89a52fe209b13c6b136cb189fd62abb | ||
ssdeep | 12288:q1DmCRaGA1J9NlMn1zn+AWkCDb8we0Yz2yCHBhaaB8O:IKCYTza1zNWkAQZ0M2yCj | ||
imphash | 5afa9a8b314006f35dd01e2aac6bc7ca | ||
impfuzzy | 12:BPEUGsjv0QXn3H/m1jxB7HySnAGw7sUj7/qRKeARleny:NEUGsT0QX3H/cjxBpnEjWSlN |
Network IP location
Signature (10cnts)
Level | Description |
---|---|
warning | File has been identified by 25 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
watch | Disables proxy possibly for traffic interception |
watch | Looks for the Windows Idle Time to determine the uptime |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Checks amount of memory in system |
info | Queries for the computername |
Rules (4cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (11cnts) ?
Suricata ids
ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
PE API
IAT(Import Address Table) Library
USER32.dll
0x420064 GetLastInputInfo
0x420068 CreateWindowExA
0x42006c InvalidateRgn
0x420070 DispatchMessageA
0x420074 RegisterClassA
0x420078 AppendMenuA
0x42007c GetMessageA
0x420080 GetUpdateRgn
0x420084 DefWindowProcA
SETUPAPI.dll
0x42004c SetupDiGetClassDevsA
0x420050 SetupDiEnumDeviceInfo
0x420054 SetupDiGetDeviceRegistryPropertyA
SHLWAPI.dll
0x42005c UrlCanonicalizeA
msvcrt.dll
0x42008c memset
OLEAUT32.dll
0x420040 GetErrorInfo
0x420044 GetRecordInfoFromGuids
KERNEL32.dll
0x42000c LoadLibraryW
0x420010 GetModuleHandleW
0x420014 GetSystemTimeAsFileTime
0x420018 CreateEventA
0x42001c TerminateProcess
0x420020 SetStdHandle
0x420024 WaitForSingleObject
0x420028 MoveFileW
0x42002c LeaveCriticalSection
0x420030 IsProcessorFeaturePresent
0x420034 InitializeCriticalSectionAndSpinCount
0x420038 WTSGetActiveConsoleSessionId
ADVAPI32.dll
0x420000 AccessCheck
0x420004 GetKernelObjectSecurity
EAT(Export Address Table) is none
USER32.dll
0x420064 GetLastInputInfo
0x420068 CreateWindowExA
0x42006c InvalidateRgn
0x420070 DispatchMessageA
0x420074 RegisterClassA
0x420078 AppendMenuA
0x42007c GetMessageA
0x420080 GetUpdateRgn
0x420084 DefWindowProcA
SETUPAPI.dll
0x42004c SetupDiGetClassDevsA
0x420050 SetupDiEnumDeviceInfo
0x420054 SetupDiGetDeviceRegistryPropertyA
SHLWAPI.dll
0x42005c UrlCanonicalizeA
msvcrt.dll
0x42008c memset
OLEAUT32.dll
0x420040 GetErrorInfo
0x420044 GetRecordInfoFromGuids
KERNEL32.dll
0x42000c LoadLibraryW
0x420010 GetModuleHandleW
0x420014 GetSystemTimeAsFileTime
0x420018 CreateEventA
0x42001c TerminateProcess
0x420020 SetStdHandle
0x420024 WaitForSingleObject
0x420028 MoveFileW
0x42002c LeaveCriticalSection
0x420030 IsProcessorFeaturePresent
0x420034 InitializeCriticalSectionAndSpinCount
0x420038 WTSGetActiveConsoleSessionId
ADVAPI32.dll
0x420000 AccessCheck
0x420004 GetKernelObjectSecurity
EAT(Export Address Table) is none