Report - AMSI.exe

Gen1 Emotet Generic Malware Malicious Library UPX Downloader Malicious Packer Admin Tool (Sysinternals etc ...) OS Processor Check PE File PE32 DLL .NET DLL DllRegisterServer dll
ScreenShot
Created 2023.08.28 01:53 Machine s1_win7_x6402
Filename AMSI.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
2
Behavior Score
2.2
ZERO API file : clean
VT API (file) 13 detected (AIDetectMalware, Malicious, score, Artemis, unsafe, Swrort, Python, Detected)
md5 a48cb4ce6676d6c36cc5a40434cd629d
sha256 731cd163caaa25f6c3f0a04796fcd0239295cdf768da99c608c6a917b3dc0b60
ssdeep 98304:DFUc2GZJ8MmNmaKZcaIZiiAWmWVglqWjfMX/y5oVqLn/oApyCPA4bp2FzZT0jufm:AGZJ8Mm46JHmNkWu/ySQxyqbpSzZTfuf
imphash acbc8f761f4e19d096f011fd86326533
impfuzzy 24:SAzDoCjfOiFj6bplS4vK5TXPEA3O5Oov/tDi3eu9h/J3IYxIFejMzHOT4DwuOqX:m3p8qEESO8YtDmRDIucDoqX
  Network IP location

Signature (5cnts)

Level Description
watch Creates a windows hook that monitors keyboard input (keylogger)
watch File has been identified by 13 AntiVirus engines on VirusTotal as malicious
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
info Checks amount of memory in system

Rules (19cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_1_Zero Win32 Trojan Emotet binaries (download)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Network_Downloader File Downloader binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (download)
info Is_DotNET_DLL (no description) binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x414180 MessageBoxA
KERNEL32.dll
 0x414000 RemoveDirectoryA
 0x414004 TlsSetValue
 0x414008 GetVersionExA
 0x41400c GetProcAddress
 0x414010 LoadLibraryA
 0x414014 GetModuleFileNameA
 0x414018 GetModuleFileNameW
 0x41401c GetExitCodeProcess
 0x414020 WaitForSingleObject
 0x414024 CreateProcessW
 0x414028 GetCommandLineW
 0x41402c GetStartupInfoW
 0x414030 GetTempPathA
 0x414034 GetLastError
 0x414038 LoadLibraryExA
 0x41403c Sleep
 0x414040 CreateDirectoryA
 0x414044 SetStdHandle
 0x414048 EnterCriticalSection
 0x41404c InitializeCriticalSectionAndSpinCount
 0x414050 LeaveCriticalSection
 0x414054 GetFileType
 0x414058 DecodePointer
 0x41405c EncodePointer
 0x414060 SetConsoleCtrlHandler
 0x414064 HeapFree
 0x414068 GetModuleHandleW
 0x41406c ExitProcess
 0x414070 FindClose
 0x414074 FileTimeToSystemTime
 0x414078 FileTimeToLocalFileTime
 0x41407c GetDriveTypeA
 0x414080 FindFirstFileExA
 0x414084 HeapAlloc
 0x414088 DeleteFileA
 0x41408c FindNextFileA
 0x414090 GetCommandLineA
 0x414094 HeapSetInformation
 0x414098 TerminateProcess
 0x41409c GetCurrentProcess
 0x4140a0 UnhandledExceptionFilter
 0x4140a4 SetUnhandledExceptionFilter
 0x4140a8 IsDebuggerPresent
 0x4140ac IsProcessorFeaturePresent
 0x4140b0 RtlUnwind
 0x4140b4 SetHandleCount
 0x4140b8 GetStdHandle
 0x4140bc DeleteCriticalSection
 0x4140c0 TlsAlloc
 0x4140c4 TlsGetValue
 0x4140c8 SetEnvironmentVariableW
 0x4140cc TlsFree
 0x4140d0 InterlockedIncrement
 0x4140d4 SetLastError
 0x4140d8 GetCurrentThreadId
 0x4140dc InterlockedDecrement
 0x4140e0 HeapCreate
 0x4140e4 WideCharToMultiByte
 0x4140e8 LoadLibraryW
 0x4140ec WriteFile
 0x4140f0 GetFullPathNameA
 0x4140f4 CloseHandle
 0x4140f8 GetFileInformationByHandle
 0x4140fc PeekNamedPipe
 0x414100 CreateFileA
 0x414104 GetCurrentDirectoryW
 0x414108 GetFileAttributesA
 0x41410c MultiByteToWideChar
 0x414110 ReadFile
 0x414114 SetFilePointer
 0x414118 GetConsoleCP
 0x41411c GetConsoleMode
 0x414120 FreeEnvironmentStringsW
 0x414124 GetEnvironmentStringsW
 0x414128 QueryPerformanceCounter
 0x41412c GetTickCount
 0x414130 GetCurrentProcessId
 0x414134 GetSystemTimeAsFileTime
 0x414138 HeapReAlloc
 0x41413c FlushFileBuffers
 0x414140 GetCPInfo
 0x414144 GetACP
 0x414148 GetOEMCP
 0x41414c IsValidCodePage
 0x414150 CompareStringW
 0x414154 SetEnvironmentVariableA
 0x414158 HeapSize
 0x41415c GetDriveTypeW
 0x414160 SetEndOfFile
 0x414164 GetProcessHeap
 0x414168 GetTimeZoneInformation
 0x41416c LCMapStringW
 0x414170 WriteConsoleW
 0x414174 GetStringTypeW
 0x414178 CreateFileW
WS2_32.dll
 0x414188 ntohl

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure