Report - k-AMqan907JetwLo8K.exe

Malicious Library UPX OS Processor Check PE File PE32
ScreenShot
Created 2023.09.01 09:09 Machine s1_win7_x6401
Filename k-AMqan907JetwLo8K.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
7
Behavior Score
6.2
ZERO API file : clean
VT API (file) 26 detected (AIDetectMalware, malicious, high confidence, unsafe, Save, ZexaF, qq0@aO5jmSni, Attribute, HighConfidence, Kryptik, HSYN, score, FileRepMalware, high, Synder, Generic@AI, RDML, deJPOnccaZ9lgean4UEXEA, Static AI, Malicious PE, confidence, 100%)
md5 bf1807ec443b76a12ad675f7cb6bf23a
sha256 f6fd042b83f85be44113bf9ed832bee5e7de2270b19704947a4da30f078998cd
ssdeep 3072:zxWXLSyBIbiyAeqwcBbGgabMMy1AxH/HLf/Ji49WCoMY5Z+:zxWzbhdBbGgabvy1AeemZ+
imphash 79949fb04969b0ad00a160f76c9427ef
impfuzzy 24:VrymDWYej2EMjOovS2cfW/J3IBtsQFQ8RyvuT4FlXKhxZA:mMCQcfcuts3ucFZK6
  Network IP location

Signature (16cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Harvests credentials from local FTP client softwares
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice One or more potentially interesting buffers were extracted
notice Queries for potentially installed applications
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
91.103.252.3 RU Hostglobal.plus Inc 91.103.252.3 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41201c LoadLibraryA
 0x412020 VirtualAlloc
 0x412024 LockResource
 0x412028 LoadResource
 0x41202c SizeofResource
 0x412030 FindResourceW
 0x412034 GetProcAddress
 0x412038 GetLastError
 0x41203c CreateMutexA
 0x412040 GetModuleHandleA
 0x412044 FreeConsole
 0x412048 VirtualProtect
 0x41204c lstrlenW
 0x412050 CreateThread
 0x412054 WaitForSingleObject
 0x412058 Sleep
 0x41205c GetModuleHandleW
 0x412060 EnumResourceTypesW
 0x412064 HeapFree
 0x412068 RtlUnwind
 0x41206c RaiseException
 0x412070 GetCommandLineA
 0x412074 HeapCreate
 0x412078 VirtualFree
 0x41207c DeleteCriticalSection
 0x412080 LeaveCriticalSection
 0x412084 EnterCriticalSection
 0x412088 HeapAlloc
 0x41208c HeapReAlloc
 0x412090 TlsGetValue
 0x412094 TlsAlloc
 0x412098 TlsSetValue
 0x41209c TlsFree
 0x4120a0 InterlockedIncrement
 0x4120a4 SetLastError
 0x4120a8 GetCurrentThreadId
 0x4120ac InterlockedDecrement
 0x4120b0 TerminateProcess
 0x4120b4 GetCurrentProcess
 0x4120b8 UnhandledExceptionFilter
 0x4120bc SetUnhandledExceptionFilter
 0x4120c0 IsDebuggerPresent
 0x4120c4 ExitProcess
 0x4120c8 WriteFile
 0x4120cc GetStdHandle
 0x4120d0 GetModuleFileNameA
 0x4120d4 FreeEnvironmentStringsA
 0x4120d8 GetEnvironmentStrings
 0x4120dc FreeEnvironmentStringsW
 0x4120e0 WideCharToMultiByte
 0x4120e4 GetEnvironmentStringsW
 0x4120e8 SetHandleCount
 0x4120ec GetFileType
 0x4120f0 GetStartupInfoA
 0x4120f4 QueryPerformanceCounter
 0x4120f8 GetTickCount
 0x4120fc GetCurrentProcessId
 0x412100 GetSystemTimeAsFileTime
 0x412104 GetCPInfo
 0x412108 GetACP
 0x41210c GetOEMCP
 0x412110 IsValidCodePage
 0x412114 InitializeCriticalSectionAndSpinCount
 0x412118 HeapSize
 0x41211c LCMapStringA
 0x412120 MultiByteToWideChar
 0x412124 LCMapStringW
 0x412128 GetStringTypeA
 0x41212c GetStringTypeW
 0x412130 GetLocaleInfoA
USER32.dll
 0x412138 FlashWindowEx
GDI32.dll
 0x412008 SetTextColor
 0x41200c CreateFontIndirectA
 0x412010 SelectObject
 0x412014 SetBkMode
ADVAPI32.dll
 0x412000 RegDeleteKeyA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure