Report - x-admins.exe

UPX PE File PE32
ScreenShot
Created 2023.08.02 17:04 Machine s1_win7_x6403
Filename x-admins.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
AI Score
9
Behavior Score
4.2
ZERO API file : malware
VT API (file) 21 detected (AIDetectMalware, Artemis, Attribute, HighConfidence, malicious, moderate confidence, score, high, Static AI, Malicious PE, auxn, PossibleThreat, MUPX, Gen@24tbus, Phonzy, R325756, Generic@AI, RDML, AF2cKbJeSE3sCytm9DaVGA, susgen, confidence)
md5 1bdfa5d4db8f961fb85677c4d8bb64f4
sha256 2e54ec22a0d7931509bb5905acf51ac1f223d5bca7a46b9f9038291d7c80c6c9
ssdeep 6144:ndkzF43SM5dCsenQjq2Zs4ogcAWUwxPk47oLFldV1jJrBBxRdE3ajPXoSI84KF:n6zF4vCT4q2Z7NBWrl7EzdH9BL5PXoSz
imphash 604d14eda74ecb05dc3fd3f2233fd004
impfuzzy 6:omRgsyICeGaWvOYZBJAEoZ/OEGDzyRZr4BJTbBnaOAMyyTcf546PIIsLdJl0yn:omRgUoABZG/Dzgr4BJZLAITRIIIsLHlH
  Network IP location

Signature (8cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
watch Attempts to create or modify system certificates
watch Creates a windows hook that monitors keyboard input (keylogger)
watch Installs an hook procedure to monitor for mouse events
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX

Rules (3cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://apps.identrust.com/roots/dstrootcax3.p7c US Akamai International B.V. 23.67.53.27 clean
nodejs--veyynveyynov.repl.co US GOOGLE 35.186.245.55 malware
121.254.136.27 KR LG DACOM Corporation 121.254.136.27 clean
35.186.245.55 US GOOGLE 35.186.245.55 phishing

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x4d7644 RegCloseKey
COMCTL32.dll
 0x4d764c None
COMDLG32.dll
 0x4d7654 GetSaveFileNameA
GDI32.dll
 0x4d765c BitBlt
KERNEL32.DLL
 0x4d7664 LoadLibraryA
 0x4d7668 ExitProcess
 0x4d766c GetProcAddress
 0x4d7670 VirtualProtect
ole32.dll
 0x4d7678 CoGetObject
OLEAUT32.dll
 0x4d7680 SysStringLen
PSAPI.DLL
 0x4d7688 GetModuleBaseNameA
SHELL32.dll
 0x4d7690 DragFinish
USER32.dll
 0x4d7698 GetDC
VERSION.dll
 0x4d76a0 VerQueryValueA
WININET.dll
 0x4d76a8 InternetOpenA
WINMM.dll
 0x4d76b0 mixerOpen
WSOCK32.dll
 0x4d76b8 WSAStartup

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure