Report - 159.exe

UPX Malicious Library ScreenShot AntiDebug AntiVM OS Processor Check PE File PE32
ScreenShot
Created 2023.08.10 16:40 Machine s1_win7_x6403
Filename 159.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
9.8
ZERO API file : clean
VT API (file) 46 detected (AIDetectMalware, Pcumi, malicious, high confidence, 9KW@I92pcumi, Kryptik, V4k9, Eldorado, Attribute, HighConfidence, HUBU, score, MalwareX, Generic@AI, RDML, hDhT9JyIaiCMUc0rw3NWGw, Nekark, jfhbf, Siggen20, Locky, GenericRXWF, Outbreak, Vigorf, Detected, ai score=84, BScope, Chgt, Static AI, Suspicious PE, susgen, confidence, 100%)
md5 fbc04c52eb18b7db7206ef8cd0bbc1ab
sha256 6b0494bef1b645ecf957f9f2b81c3aa985a9ebaaf29a2ecfb4d8aea023fcac13
ssdeep 12288:T0QZ/qYtu5LNSC5/lfiIDnqNlSuFZrtzm+Rbak+lAitGbNf4R0j2OJkZC5wqaMEa:wQzwRfiSniRLa5ahJQRIzJCywqaXdyl
imphash 283efa8b8b510b11551f297f9dcd33d1
impfuzzy 24:7kf0HTOovTS1jtGGzplJeDc+pl3eDoLotOsFURZHu93vFZSudTxGMck:AsHSOS1jtGGz2c+ppXhyFZSux
  Network IP location

Signature (20cnts)

Level Description
danger File has been identified by 46 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Communicates with host for which no DNS query was performed
watch Detects Avast Antivirus through the presence of a library
watch One or more of the buffers contains an embedded PE file
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Executes one or more WMI queries
notice Executes one or more WMI queries which can be used to identify virtual machines
notice One or more potentially interesting buffers were extracted
notice Yara rule detected in process memory
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info This executable has a PDB path

Rules (14cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
45.81.39.169 Unknown 45.81.39.169 clean

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x4981e4 GetPhysicalCursorPos
COMCTL32.dll
 0x498000 ImageList_SetDragCursorImage
KERNEL32.dll
 0x498030 WriteConsoleW
 0x498034 GetCommandLineA
 0x498038 GetModuleFileNameA
 0x49803c CopyFileA
 0x498040 QueryPerformanceCounter
 0x498044 GetCurrentProcessId
 0x498048 GetCurrentThreadId
 0x49804c GetSystemTimeAsFileTime
 0x498050 InitializeSListHead
 0x498054 IsDebuggerPresent
 0x498058 UnhandledExceptionFilter
 0x49805c SetUnhandledExceptionFilter
 0x498060 GetStartupInfoW
 0x498064 IsProcessorFeaturePresent
 0x498068 GetModuleHandleW
 0x49806c GetCurrentProcess
 0x498070 TerminateProcess
 0x498074 CloseHandle
 0x498078 RaiseException
 0x49807c RtlUnwind
 0x498080 InterlockedPushEntrySList
 0x498084 InterlockedFlushSList
 0x498088 GetLastError
 0x49808c SetLastError
 0x498090 EncodePointer
 0x498094 EnterCriticalSection
 0x498098 LeaveCriticalSection
 0x49809c DeleteCriticalSection
 0x4980a0 InitializeCriticalSectionAndSpinCount
 0x4980a4 TlsAlloc
 0x4980a8 TlsGetValue
 0x4980ac TlsSetValue
 0x4980b0 TlsFree
 0x4980b4 FreeLibrary
 0x4980b8 GetProcAddress
 0x4980bc LoadLibraryExW
 0x4980c0 GetStdHandle
 0x4980c4 WriteFile
 0x4980c8 GetModuleFileNameW
 0x4980cc ExitProcess
 0x4980d0 GetModuleHandleExW
 0x4980d4 DecodePointer
 0x4980d8 GetCommandLineW
 0x4980dc GetCurrentThread
 0x4980e0 OutputDebugStringW
 0x4980e4 HeapAlloc
 0x4980e8 HeapFree
 0x4980ec FindClose
 0x4980f0 FindFirstFileExW
 0x4980f4 FindNextFileW
 0x4980f8 IsValidCodePage
 0x4980fc GetACP
 0x498100 GetOEMCP
 0x498104 GetCPInfo
 0x498108 MultiByteToWideChar
 0x49810c WideCharToMultiByte
 0x498110 GetEnvironmentStringsW
 0x498114 FreeEnvironmentStringsW
 0x498118 SetEnvironmentVariableW
 0x49811c SetStdHandle
 0x498120 GetFileType
 0x498124 GetStringTypeW
 0x498128 GetLocaleInfoW
 0x49812c IsValidLocale
 0x498130 GetUserDefaultLCID
 0x498134 EnumSystemLocalesW
 0x498138 GetDateFormatW
 0x49813c GetTimeFormatW
 0x498140 CompareStringW
 0x498144 LCMapStringW
 0x498148 GetProcessHeap
 0x49814c SetConsoleCtrlHandler
 0x498150 HeapSize
 0x498154 HeapReAlloc
 0x498158 FlushFileBuffers
 0x49815c GetConsoleOutputCP
 0x498160 GetConsoleMode
 0x498164 GetFileSizeEx
 0x498168 SetFilePointerEx
 0x49816c ReadFile
 0x498170 ReadConsoleW
 0x498174 CreateFileW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure