Report - ummaa.exe

Amadey Malicious Library UPX Malicious Packer PE File PE32 OS Processor Check PE64
ScreenShot
Created 2023.09.02 18:30 Machine s1_win7_x6403
Filename ummaa.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
8
Behavior Score
9.6
ZERO API file : malware
VT API (file) 53 detected (AIDetectMalware, Malicious, score, TjnDroppr, Dapato, S28495190, GenericRXTU, Save, Razy, ZexaF, KqW@aKmNgYbi, Lazy, Eldorado, Attribute, HighConfidence, high confidence, Mqil, PRIVATELOADER, YXDIBZ, high, Static AI, Malicious PE, Amadey, 102OIFV, Detected, R497632, BScope, Nitol, ai score=80, unsafe, Genetic, DcRat, BNER4NzZWDL, Tnega, Tiny, confidence, 100%)
md5 58bc43389c3e720c0af4ff563d5ed7ce
sha256 4d7a22a1f7d76310b2c8420cb2f02ef4633cb689e4b8eaaab165731b9341163f
ssdeep 12288:ZR1BzB+BS5RMmF6We5AQtL8Luq2qL5e+iNqajC2UrhOhmfnRl:ZR1BzBGS5RMmF6We5AQKLJ2qjIqa1Ur5
imphash a9c887a4f18a3fede2cc29ceea138ed3
impfuzzy 6:HMJqX0umyRwXJxSBS0H5sD4sIWDLb4iPEcn:sJqpRSY58PLPXn
  Network IP location

Signature (22cnts)

Level Description
danger File has been identified by 53 AntiVirus engines on VirusTotal as malicious
watch Attempts to identify installed AV products by installation directory
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch Uses suspicious command line tools or Windows utilities
notice A process attempted to delay the analysis task.
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An executable file was downloaded by the process oneetx.exe
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername

Rules (9cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch UPX_Zero UPX packed file binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://45.9.74.80/softtool.exe Unknown 45.9.74.80 clean
http://45.9.74.80/alldata.exe Unknown 45.9.74.80 clean
http://45.9.74.80/0bjdn2Z/index.php Unknown 45.9.74.80 26790 mailcious
http://5.42.65.80/4t.exe RU CJSC Kolomna-Sviaz TV 5.42.65.80 malware
45.9.74.80 Unknown 45.9.74.80 malware
5.42.65.80 RU CJSC Kolomna-Sviaz TV 5.42.65.80 malware

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x493ec0 malloc
 0x493ec4 memset
 0x493ec8 strcmp
 0x493ecc strcpy
 0x493ed0 getenv
 0x493ed4 sprintf
 0x493ed8 fopen
 0x493edc fwrite
 0x493ee0 fclose
 0x493ee4 __argc
 0x493ee8 __argv
 0x493eec _environ
 0x493ef0 _XcptFilter
 0x493ef4 __set_app_type
 0x493ef8 _controlfp
 0x493efc __getmainargs
 0x493f00 exit
shell32.dll
 0x493f08 ShellExecuteA
kernel32.dll
 0x493f10 SetUnhandledExceptionFilter

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure