Report - 38h4tp20bm85.exe

LokiBot UPX Malicious Library PWS AntiDebug AntiVM OS Processor Check PE File PE32
ScreenShot
Created 2023.08.11 08:54 Machine s1_win7_x6403
Filename 38h4tp20bm85.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
4
Behavior Score
13.2
ZERO API file : clean
VT API (file)
md5 d525784068f44c8c06b97756f67bca48
sha256 f8125e4ec3ac9a91641133259d6096405cbb989fa716b533874bd248519be3b9
ssdeep 24576:ydBXwq3wYbKJxMZGmjBB/n0dSmsmIfKNzeAE/Nh/P0tqSQ:+XJbKJxM8MY0msmIfKtenn/PKqZ
imphash c8cb7a778b504c2b41383b432dbd8883
impfuzzy 48:D1rIoWJcpH+PdD9vrxQSXtXqScGt/zba634uFZdLw:DNIoWJcpH+P51rxHXtXqScGt/PaiC
  Network IP location

Signature (29cnts)

Level Description
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Appends a known CryptoMix ransomware file extension to files that have been encrypted
watch Attempts to access Bitcoin/ALTCoin wallets
watch Attempts to create or modify system certificates
watch Executes one or more WMI queries
watch Harvests credentials from local email clients
watch Harvests credentials from local FTP client softwares
watch Looks for the Windows Idle Time to determine the uptime
watch One or more of the buffers contains an embedded PE file
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Executes one or more WMI queries which can be used to identify virtual machines
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Resolves a suspicious Top Level Domain (TLD)
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info This executable has a PDB path

Rules (16cnts)

Level Name Description Collection
danger Win32_PWS_Loki_m_Zero Win32 PWS Loki memory
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice Generic_PWS_Memory_Zero PWS Memory memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info WMI_VM_Detect Detection of Virtual Appliances through the use of WMI for use of evasion. memory

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://apps.identrust.com/roots/dstrootcax3.p7c US Akamai International B.V. 23.67.53.18 clean
luminance-films.ru US CLOUDFLARENET 104.21.42.155 clean
172.67.206.148 US CLOUDFLARENET 172.67.206.148 clean
121.254.136.27 KR LG DACOM Corporation 121.254.136.27 clean

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x51f318 SetWindowDisplayAffinity
GDI32.dll
 0x51f030 RestoreDC
ADVAPI32.dll
 0x51f000 EqualPrefixSid
KERNEL32.dll
 0x51f060 CreateFileW
 0x51f064 CompareStringEx
 0x51f068 RaiseException
 0x51f06c InitializeSRWLock
 0x51f070 ReleaseSRWLockExclusive
 0x51f074 AcquireSRWLockExclusive
 0x51f078 EnterCriticalSection
 0x51f07c LeaveCriticalSection
 0x51f080 InitializeCriticalSectionEx
 0x51f084 TryEnterCriticalSection
 0x51f088 DeleteCriticalSection
 0x51f08c GetCurrentThreadId
 0x51f090 InitializeConditionVariable
 0x51f094 WakeConditionVariable
 0x51f098 WakeAllConditionVariable
 0x51f09c SleepConditionVariableCS
 0x51f0a0 SleepConditionVariableSRW
 0x51f0a4 FormatMessageA
 0x51f0a8 WideCharToMultiByte
 0x51f0ac MultiByteToWideChar
 0x51f0b0 GetStringTypeW
 0x51f0b4 InitOnceBeginInitialize
 0x51f0b8 InitOnceComplete
 0x51f0bc GetLastError
 0x51f0c0 FreeLibraryWhenCallbackReturns
 0x51f0c4 CreateThreadpoolWork
 0x51f0c8 SubmitThreadpoolWork
 0x51f0cc CloseThreadpoolWork
 0x51f0d0 GetModuleHandleExW
 0x51f0d4 RtlCaptureStackBackTrace
 0x51f0d8 IsProcessorFeaturePresent
 0x51f0dc QueryPerformanceCounter
 0x51f0e0 QueryPerformanceFrequency
 0x51f0e4 SetFileInformationByHandle
 0x51f0e8 FlsAlloc
 0x51f0ec FlsGetValue
 0x51f0f0 FlsSetValue
 0x51f0f4 FlsFree
 0x51f0f8 InitOnceExecuteOnce
 0x51f0fc CreateEventExW
 0x51f100 CreateSemaphoreExW
 0x51f104 FlushProcessWriteBuffers
 0x51f108 GetCurrentProcessorNumber
 0x51f10c GetSystemTimeAsFileTime
 0x51f110 GetTickCount64
 0x51f114 CreateThreadpoolTimer
 0x51f118 SetThreadpoolTimer
 0x51f11c WaitForThreadpoolTimerCallbacks
 0x51f120 CloseThreadpoolTimer
 0x51f124 CreateThreadpoolWait
 0x51f128 SetThreadpoolWait
 0x51f12c CloseThreadpoolWait
 0x51f130 GetModuleHandleW
 0x51f134 GetProcAddress
 0x51f138 GetFileInformationByHandleEx
 0x51f13c CreateSymbolicLinkW
 0x51f140 CloseHandle
 0x51f144 WaitForSingleObjectEx
 0x51f148 Sleep
 0x51f14c SwitchToThread
 0x51f150 GetExitCodeThread
 0x51f154 GetNativeSystemInfo
 0x51f158 LocalFree
 0x51f15c EncodePointer
 0x51f160 DecodePointer
 0x51f164 LCMapStringEx
 0x51f168 GetLocaleInfoEx
 0x51f16c WriteConsoleW
 0x51f170 GetCPInfo
 0x51f174 InitializeCriticalSectionAndSpinCount
 0x51f178 SetEvent
 0x51f17c ResetEvent
 0x51f180 CreateEventW
 0x51f184 GetCurrentProcessId
 0x51f188 InitializeSListHead
 0x51f18c IsDebuggerPresent
 0x51f190 UnhandledExceptionFilter
 0x51f194 SetUnhandledExceptionFilter
 0x51f198 GetStartupInfoW
 0x51f19c GetCurrentProcess
 0x51f1a0 TerminateProcess
 0x51f1a4 HeapSize
 0x51f1a8 RtlUnwind
 0x51f1ac InterlockedPushEntrySList
 0x51f1b0 InterlockedFlushSList
 0x51f1b4 SetLastError
 0x51f1b8 TlsAlloc
 0x51f1bc TlsGetValue
 0x51f1c0 TlsSetValue
 0x51f1c4 TlsFree
 0x51f1c8 FreeLibrary
 0x51f1cc LoadLibraryExW
 0x51f1d0 CreateThread
 0x51f1d4 ExitThread
 0x51f1d8 ResumeThread
 0x51f1dc FreeLibraryAndExitThread
 0x51f1e0 GetStdHandle
 0x51f1e4 WriteFile
 0x51f1e8 GetModuleFileNameW
 0x51f1ec ExitProcess
 0x51f1f0 GetCommandLineA
 0x51f1f4 GetCommandLineW
 0x51f1f8 GetCurrentThread
 0x51f1fc HeapFree
 0x51f200 SetConsoleCtrlHandler
 0x51f204 GetDateFormatW
 0x51f208 GetTimeFormatW
 0x51f20c CompareStringW
 0x51f210 LCMapStringW
 0x51f214 GetLocaleInfoW
 0x51f218 IsValidLocale
 0x51f21c GetUserDefaultLCID
 0x51f220 EnumSystemLocalesW
 0x51f224 HeapAlloc
 0x51f228 GetFileType
 0x51f22c GetFileSizeEx
 0x51f230 SetFilePointerEx
 0x51f234 FlushFileBuffers
 0x51f238 GetConsoleOutputCP
 0x51f23c GetConsoleMode
 0x51f240 ReadFile
 0x51f244 ReadConsoleW
 0x51f248 HeapReAlloc
 0x51f24c GetTimeZoneInformation
 0x51f250 OutputDebugStringW
 0x51f254 FindClose
 0x51f258 FindFirstFileExW
 0x51f25c FindNextFileW
 0x51f260 IsValidCodePage
 0x51f264 GetACP
 0x51f268 GetOEMCP
 0x51f26c GetEnvironmentStringsW
 0x51f270 FreeEnvironmentStringsW
 0x51f274 SetEnvironmentVariableW
 0x51f278 SetStdHandle
 0x51f27c GetProcessHeap

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure