Report - my.exe

UPX Malicious Library MZP Format PE File PE32
ScreenShot
Created 2023.08.08 18:40 Machine s1_win7_x6403
Filename my.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
8.4
ZERO API file : clean
VT API (file) 20 detected (AIDetectMalware, unsafe, malicious, confidence, high confidence, score, PWSX, Static AI, Suspicious PE, GrayWare, Wacapew, Detected, ZelphiF, kHW@aq846Eji, NF5ItXt1tkQ, susgen, Kryptik, FGKV)
md5 19122289de675e7d76857845c98da6db
sha256 8a77b510d0699fa9c6f656f1129e4dd9a1b3c28f0a90d54a28cdaf8a9a39924f
ssdeep 24576:mCLHDWEdlHCwLE1WSLkjdE4wTbSs/HNoc3XDT5pQL1U:mCmELbpkkGgAoc3zTJ
imphash 5c0e7521ed9cc753f058ffd780ae96f3
impfuzzy 192:f30Jk1sTs/FbuuaxSUvK9yHooqEho72POQRb:f3z1sIaq97YPOQ5
  Network IP location

Signature (21cnts)

Level Description
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
watch Appends a known CryptoMix ransomware file extension to files that have been encrypted
watch Attempts to access Bitcoin/ALTCoin wallets
watch Collects information about installed applications
watch Detects Virtual Machines through their custom firmware
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer
info Tries to locate where the browsers are installed

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://gstatic-node.io/ US CLOUDFLARENET 172.67.204.199 35379 mailcious
http://gstatic-node.io/c2sock US CLOUDFLARENET 172.67.204.199 35381 mailcious
http://gstatic-node.io/c2conf US CLOUDFLARENET 172.67.204.199 35380 mailcious
gstatic-node.io US CLOUDFLARENET 172.67.204.199 mailcious
172.67.204.199 US CLOUDFLARENET 172.67.204.199 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x491140 DeleteCriticalSection
 0x491144 LeaveCriticalSection
 0x491148 EnterCriticalSection
 0x49114c InitializeCriticalSection
 0x491150 VirtualFree
 0x491154 VirtualAlloc
 0x491158 LocalFree
 0x49115c LocalAlloc
 0x491160 GetVersion
 0x491164 GetCurrentThreadId
 0x491168 InterlockedDecrement
 0x49116c InterlockedIncrement
 0x491170 VirtualQuery
 0x491174 WideCharToMultiByte
 0x491178 MultiByteToWideChar
 0x49117c lstrlenA
 0x491180 lstrcpynA
 0x491184 LoadLibraryExA
 0x491188 GetThreadLocale
 0x49118c GetStartupInfoA
 0x491190 GetProcAddress
 0x491194 GetModuleHandleA
 0x491198 GetModuleFileNameA
 0x49119c GetLocaleInfoA
 0x4911a0 GetCommandLineA
 0x4911a4 FreeLibrary
 0x4911a8 FindFirstFileA
 0x4911ac FindClose
 0x4911b0 ExitProcess
 0x4911b4 WriteFile
 0x4911b8 UnhandledExceptionFilter
 0x4911bc RtlUnwind
 0x4911c0 RaiseException
 0x4911c4 GetStdHandle
user32.dll
 0x4911cc GetKeyboardType
 0x4911d0 LoadStringA
 0x4911d4 MessageBoxA
 0x4911d8 CharNextA
advapi32.dll
 0x4911e0 RegQueryValueExA
 0x4911e4 RegOpenKeyExA
 0x4911e8 RegCloseKey
oleaut32.dll
 0x4911f0 SysFreeString
 0x4911f4 SysReAllocStringLen
 0x4911f8 SysAllocStringLen
kernel32.dll
 0x491200 TlsSetValue
 0x491204 TlsGetValue
 0x491208 LocalAlloc
 0x49120c GetModuleHandleA
advapi32.dll
 0x491214 RegQueryValueExA
 0x491218 RegOpenKeyExA
 0x49121c RegCloseKey
kernel32.dll
 0x491224 lstrcpyA
 0x491228 WriteFile
 0x49122c WaitForSingleObject
 0x491230 VirtualQuery
 0x491234 VirtualAlloc
 0x491238 Sleep
 0x49123c SizeofResource
 0x491240 SetThreadLocale
 0x491244 SetFilePointer
 0x491248 SetEvent
 0x49124c SetErrorMode
 0x491250 SetEndOfFile
 0x491254 ResetEvent
 0x491258 ReadFile
 0x49125c MulDiv
 0x491260 LockResource
 0x491264 LoadResource
 0x491268 LoadLibraryA
 0x49126c LeaveCriticalSection
 0x491270 InitializeCriticalSection
 0x491274 GlobalUnlock
 0x491278 GlobalReAlloc
 0x49127c GlobalHandle
 0x491280 GlobalLock
 0x491284 GlobalFree
 0x491288 GlobalFindAtomA
 0x49128c GlobalDeleteAtom
 0x491290 GlobalAlloc
 0x491294 GlobalAddAtomA
 0x491298 GetVersionExA
 0x49129c GetVersion
 0x4912a0 GetTickCount
 0x4912a4 GetThreadLocale
 0x4912a8 GetTempPathA
 0x4912ac GetSystemInfo
 0x4912b0 GetStringTypeExA
 0x4912b4 GetStdHandle
 0x4912b8 GetProcAddress
 0x4912bc GetModuleHandleA
 0x4912c0 GetModuleFileNameA
 0x4912c4 GetLocaleInfoA
 0x4912c8 GetLocalTime
 0x4912cc GetLastError
 0x4912d0 GetFullPathNameA
 0x4912d4 GetFileSize
 0x4912d8 GetDiskFreeSpaceA
 0x4912dc GetDateFormatA
 0x4912e0 GetCurrentThreadId
 0x4912e4 GetCurrentProcessId
 0x4912e8 GetCPInfo
 0x4912ec GetACP
 0x4912f0 FreeResource
 0x4912f4 InterlockedExchange
 0x4912f8 FreeLibrary
 0x4912fc FormatMessageA
 0x491300 FindResourceA
 0x491304 FindFirstFileA
 0x491308 FindClose
 0x49130c FileTimeToLocalFileTime
 0x491310 FileTimeToDosDateTime
 0x491314 EnumCalendarInfoA
 0x491318 EnterCriticalSection
 0x49131c DeleteFileA
 0x491320 DeleteCriticalSection
 0x491324 CreateThread
 0x491328 CreateFileA
 0x49132c CreateEventA
 0x491330 CompareStringA
 0x491334 CloseHandle
version.dll
 0x49133c VerQueryValueA
 0x491340 GetFileVersionInfoSizeA
 0x491344 GetFileVersionInfoA
gdi32.dll
 0x49134c UnrealizeObject
 0x491350 StretchBlt
 0x491354 SetWindowOrgEx
 0x491358 SetWinMetaFileBits
 0x49135c SetViewportOrgEx
 0x491360 SetTextColor
 0x491364 SetStretchBltMode
 0x491368 SetROP2
 0x49136c SetPixel
 0x491370 SetMetaRgn
 0x491374 SetEnhMetaFileBits
 0x491378 SetDIBColorTable
 0x49137c SetBrushOrgEx
 0x491380 SetBkMode
 0x491384 SetBkColor
 0x491388 SelectPalette
 0x49138c SelectObject
 0x491390 SelectClipRgn
 0x491394 SaveDC
 0x491398 RestoreDC
 0x49139c Rectangle
 0x4913a0 RectVisible
 0x4913a4 RealizePalette
 0x4913a8 Polyline
 0x4913ac Polygon
 0x4913b0 PlayEnhMetaFile
 0x4913b4 PatBlt
 0x4913b8 MoveToEx
 0x4913bc MaskBlt
 0x4913c0 LineTo
 0x4913c4 IntersectClipRect
 0x4913c8 GetWindowOrgEx
 0x4913cc GetWinMetaFileBits
 0x4913d0 GetTextMetricsA
 0x4913d4 GetTextExtentPointA
 0x4913d8 GetTextExtentPoint32A
 0x4913dc GetSystemPaletteEntries
 0x4913e0 GetStockObject
 0x4913e4 GetPixel
 0x4913e8 GetPaletteEntries
 0x4913ec GetObjectA
 0x4913f0 GetEnhMetaFilePaletteEntries
 0x4913f4 GetEnhMetaFileHeader
 0x4913f8 GetEnhMetaFileBits
 0x4913fc GetDeviceCaps
 0x491400 GetDIBits
 0x491404 GetDIBColorTable
 0x491408 GetDCOrgEx
 0x49140c GetCurrentPositionEx
 0x491410 GetClipRgn
 0x491414 GetClipBox
 0x491418 GetBrushOrgEx
 0x49141c GetBitmapBits
 0x491420 GdiFlush
 0x491424 ExtTextOutA
 0x491428 ExcludeClipRect
 0x49142c DeleteObject
 0x491430 DeleteEnhMetaFile
 0x491434 DeleteDC
 0x491438 CreateSolidBrush
 0x49143c CreateRectRgn
 0x491440 CreatePenIndirect
 0x491444 CreatePalette
 0x491448 CreateHalftonePalette
 0x49144c CreateFontIndirectA
 0x491450 CreateDIBitmap
 0x491454 CreateDIBSection
 0x491458 CreateCompatibleDC
 0x49145c CreateCompatibleBitmap
 0x491460 CreateBrushIndirect
 0x491464 CreateBitmap
 0x491468 CopyEnhMetaFileA
 0x49146c BitBlt
user32.dll
 0x491474 CreateWindowExA
 0x491478 WindowFromPoint
 0x49147c WinHelpA
 0x491480 WaitMessage
 0x491484 UpdateWindow
 0x491488 UnregisterClassA
 0x49148c UnhookWindowsHookEx
 0x491490 TranslateMessage
 0x491494 TranslateMDISysAccel
 0x491498 TrackPopupMenu
 0x49149c SystemParametersInfoA
 0x4914a0 ShowWindow
 0x4914a4 ShowScrollBar
 0x4914a8 ShowOwnedPopups
 0x4914ac ShowCursor
 0x4914b0 ShowCaret
 0x4914b4 SetWindowsHookExA
 0x4914b8 SetWindowTextA
 0x4914bc SetWindowPos
 0x4914c0 SetWindowPlacement
 0x4914c4 SetWindowLongA
 0x4914c8 SetTimer
 0x4914cc SetScrollRange
 0x4914d0 SetScrollPos
 0x4914d4 SetScrollInfo
 0x4914d8 SetRect
 0x4914dc SetPropA
 0x4914e0 SetParent
 0x4914e4 SetMenuItemInfoA
 0x4914e8 SetMenu
 0x4914ec SetForegroundWindow
 0x4914f0 SetFocus
 0x4914f4 SetCursor
 0x4914f8 SetClipboardData
 0x4914fc SetClassLongA
 0x491500 SetCapture
 0x491504 SetActiveWindow
 0x491508 SendMessageA
 0x49150c ScrollWindow
 0x491510 ScreenToClient
 0x491514 RemovePropA
 0x491518 RemoveMenu
 0x49151c ReleaseDC
 0x491520 ReleaseCapture
 0x491524 RegisterWindowMessageA
 0x491528 RegisterClipboardFormatA
 0x49152c RegisterClassA
 0x491530 RedrawWindow
 0x491534 PtInRect
 0x491538 PostQuitMessage
 0x49153c PostMessageA
 0x491540 PeekMessageA
 0x491544 OpenClipboard
 0x491548 OffsetRect
 0x49154c OemToCharA
 0x491550 MessageBoxA
 0x491554 MessageBeep
 0x491558 MapWindowPoints
 0x49155c MapVirtualKeyA
 0x491560 LoadStringA
 0x491564 LoadKeyboardLayoutA
 0x491568 LoadIconA
 0x49156c LoadCursorA
 0x491570 LoadBitmapA
 0x491574 KillTimer
 0x491578 IsZoomed
 0x49157c IsWindowVisible
 0x491580 IsWindowEnabled
 0x491584 IsWindow
 0x491588 IsRectEmpty
 0x49158c IsIconic
 0x491590 IsDialogMessageA
 0x491594 IsChild
 0x491598 IsCharLowerA
 0x49159c InvalidateRect
 0x4915a0 IntersectRect
 0x4915a4 InsertMenuItemA
 0x4915a8 InsertMenuA
 0x4915ac InflateRect
 0x4915b0 HideCaret
 0x4915b4 GetWindowThreadProcessId
 0x4915b8 GetWindowTextA
 0x4915bc GetWindowRect
 0x4915c0 GetWindowPlacement
 0x4915c4 GetWindowLongA
 0x4915c8 GetWindowDC
 0x4915cc GetTopWindow
 0x4915d0 GetSystemMetrics
 0x4915d4 GetSystemMenu
 0x4915d8 GetSysColorBrush
 0x4915dc GetSysColor
 0x4915e0 GetSubMenu
 0x4915e4 GetScrollRange
 0x4915e8 GetScrollPos
 0x4915ec GetScrollInfo
 0x4915f0 GetPropA
 0x4915f4 GetParent
 0x4915f8 GetWindow
 0x4915fc GetMenuStringA
 0x491600 GetMenuState
 0x491604 GetMenuItemInfoA
 0x491608 GetMenuItemID
 0x49160c GetMenuItemCount
 0x491610 GetMenu
 0x491614 GetLastActivePopup
 0x491618 GetKeyboardState
 0x49161c GetKeyboardLayoutList
 0x491620 GetKeyboardLayout
 0x491624 GetKeyState
 0x491628 GetKeyNameTextA
 0x49162c GetIconInfo
 0x491630 GetForegroundWindow
 0x491634 GetFocus
 0x491638 GetDesktopWindow
 0x49163c GetDCEx
 0x491640 GetDC
 0x491644 GetCursorPos
 0x491648 GetCursor
 0x49164c GetClipboardData
 0x491650 GetClientRect
 0x491654 GetClassNameA
 0x491658 GetClassInfoA
 0x49165c GetCapture
 0x491660 GetActiveWindow
 0x491664 FrameRect
 0x491668 FindWindowA
 0x49166c FillRect
 0x491670 EqualRect
 0x491674 EnumWindows
 0x491678 EnumThreadWindows
 0x49167c EndPaint
 0x491680 EnableWindow
 0x491684 EnableScrollBar
 0x491688 EnableMenuItem
 0x49168c EmptyClipboard
 0x491690 DrawTextA
 0x491694 DrawStateA
 0x491698 DrawMenuBar
 0x49169c DrawIconEx
 0x4916a0 DrawIcon
 0x4916a4 DrawFrameControl
 0x4916a8 DrawFocusRect
 0x4916ac DrawEdge
 0x4916b0 DispatchMessageA
 0x4916b4 DestroyWindow
 0x4916b8 DestroyMenu
 0x4916bc DestroyIcon
 0x4916c0 DestroyCursor
 0x4916c4 DeleteMenu
 0x4916c8 DefWindowProcA
 0x4916cc DefMDIChildProcA
 0x4916d0 DefFrameProcA
 0x4916d4 CreatePopupMenu
 0x4916d8 CreateMenu
 0x4916dc CreateIcon
 0x4916e0 CloseClipboard
 0x4916e4 ClientToScreen
 0x4916e8 CheckMenuItem
 0x4916ec CallWindowProcA
 0x4916f0 CallNextHookEx
 0x4916f4 BeginPaint
 0x4916f8 CharNextA
 0x4916fc CharLowerBuffA
 0x491700 CharLowerA
 0x491704 CharUpperBuffA
 0x491708 CharToOemA
 0x49170c AdjustWindowRectEx
 0x491710 ActivateKeyboardLayout
kernel32.dll
 0x491718 Sleep
oleaut32.dll
 0x491720 SafeArrayPtrOfIndex
 0x491724 SafeArrayGetUBound
 0x491728 SafeArrayGetLBound
 0x49172c SafeArrayCreate
 0x491730 VariantChangeType
 0x491734 VariantCopy
 0x491738 VariantClear
 0x49173c VariantInit
comctl32.dll
 0x491744 ImageList_SetIconSize
 0x491748 ImageList_GetIconSize
 0x49174c ImageList_Write
 0x491750 ImageList_Read
 0x491754 ImageList_GetDragImage
 0x491758 ImageList_DragShowNolock
 0x49175c ImageList_SetDragCursorImage
 0x491760 ImageList_DragMove
 0x491764 ImageList_DragLeave
 0x491768 ImageList_DragEnter
 0x49176c ImageList_EndDrag
 0x491770 ImageList_BeginDrag
 0x491774 ImageList_Remove
 0x491778 ImageList_DrawEx
 0x49177c ImageList_Draw
 0x491780 ImageList_GetBkColor
 0x491784 ImageList_SetBkColor
 0x491788 ImageList_ReplaceIcon
 0x49178c ImageList_Add
 0x491790 ImageList_GetImageCount
 0x491794 ImageList_Destroy
 0x491798 ImageList_Create
 0x49179c InitCommonControls
shell32.dll
 0x4917a4 ShellExecuteExW
winmm.dll
 0x4917ac sndPlaySoundA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure