Report - aafg31.exe

Malicious Library UPX PE File PE64
ScreenShot
Created 2023.09.04 09:40 Machine s1_win7_x6403
Filename aafg31.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
4
Behavior Score
1.8
ZERO API file : clean
VT API (file) 33 detected (Common, Fabookie, malicious, high confidence, DownLoader45, GenericKD, GenericRXAA, Kryptik, V87v, GenKryptik, Attribute, HighConfidence, GLXL, AMADEY, YXDICZ, Sabsik, Casdet, unsafe, Chgt, EmnL0dJ0FNC, ai score=89, confidence, 100%)
md5 103b3199c5a7b92b74ce14f14a3965d4
sha256 2777cb1ff9e857722dbf3987bd5c8263486ecf02c9a409bc772b071e0ba01ba9
ssdeep 6144:XA01NdMuvxQWQSzoYaE5kiLNdRxQ7cUBmCUiJbc77ZvfuYuEdGxTC2mWf7xLUnwa:Xdz5QWJzNLNIShtdGxTC2i5JL
imphash f2fcd0efb031ebebeaa83cd4cd21090b
impfuzzy 192:A06JI1kRAhpl3Ufg2Hx4B0EMXmLVsJGJERdiby:LXhv3Ufg2Hx4GjXmL8GAdiby
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 33 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
z.nnnaajjjgc.com US HK Kwaifong Group Limited 156.236.72.121 malware
156.236.72.121 US HK Kwaifong Group Limited 156.236.72.121 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x100063000 GetTraceEnableFlags
 0x100063008 GetTraceLoggerHandle
 0x100063010 GetTraceEnableLevel
 0x100063018 RegisterTraceGuidsW
 0x100063020 TraceEvent
 0x100063028 RegCloseKey
 0x100063030 RegQueryInfoKeyW
 0x100063038 RegEnumKeyExW
 0x100063040 RegOpenKeyExW
 0x100063048 RegSetValueExW
 0x100063050 RegCreateKeyExW
 0x100063058 RegDeleteValueW
 0x100063060 UnregisterTraceGuids
 0x100063068 OpenProcessToken
 0x100063070 OpenThreadToken
 0x100063078 GetSidLengthRequired
 0x100063080 InitializeSid
 0x100063088 GetTokenInformation
 0x100063090 IsValidSid
 0x100063098 GetSidSubAuthority
 0x1000630a0 GetLengthSid
 0x1000630a8 CopySid
 0x1000630b0 EqualSid
 0x1000630b8 RegOpenKeyW
 0x1000630c0 RegCreateKeyW
 0x1000630c8 InitializeSecurityDescriptor
 0x1000630d0 SetSecurityDescriptorDacl
 0x1000630d8 AllocateAndInitializeSid
 0x1000630e0 SetEntriesInAclW
 0x1000630e8 FreeSid
KERNEL32.dll
 0x1000630f8 LoadLibraryExW
 0x100063100 CreateMutexW
 0x100063108 HeapSetInformation
 0x100063110 RegisterApplicationRestart
 0x100063118 GetSystemDirectoryW
 0x100063120 SetCurrentDirectoryW
 0x100063128 ReleaseMutex
 0x100063130 GetCurrentThread
 0x100063138 CompareStringW
 0x100063140 FormatMessageW
 0x100063148 lstrcmpiW
 0x100063150 CreateThread
 0x100063158 ResumeThread
 0x100063160 MulDiv
 0x100063168 WaitForMultipleObjects
 0x100063170 Sleep
 0x100063178 LocalAlloc
 0x100063180 OpenProcess
 0x100063188 GetUserDefaultUILanguage
 0x100063190 LoadLibraryExA
 0x100063198 DelayLoadFailureHook
 0x1000631a0 GetSystemInfo
 0x1000631a8 TerminateThread
 0x1000631b0 GetExitCodeThread
 0x1000631b8 ResetEvent
 0x1000631c0 GetQueuedCompletionStatus
 0x1000631c8 SetEvent
 0x1000631d0 WaitForSingleObject
 0x1000631d8 PostQueuedCompletionStatus
 0x1000631e0 CloseHandle
 0x1000631e8 CreateIoCompletionPort
 0x1000631f0 GetLastError
 0x1000631f8 CreateEventW
 0x100063200 LocalFree
 0x100063208 ProcessIdToSessionId
 0x100063210 GetBinaryTypeW
 0x100063218 GetFileMUIPath
 0x100063220 FindResourceW
 0x100063228 LoadResource
 0x100063230 LockResource
 0x100063238 SizeofResource
 0x100063240 RaiseException
 0x100063248 GetCurrentThreadId
 0x100063250 LeaveCriticalSection
 0x100063258 EnterCriticalSection
 0x100063260 SetLastError
 0x100063268 GetSystemWindowsDirectoryW
 0x100063270 OpenEventW
 0x100063278 FileTimeToSystemTime
 0x100063280 SystemTimeToFileTime
 0x100063288 GetSystemTime
 0x100063290 GetUserDefaultLCID
 0x100063298 InitializeCriticalSectionAndSpinCount
 0x1000632a0 GetNativeSystemInfo
 0x1000632a8 LoadLibraryA
 0x1000632b0 RegSetValueExA
 0x1000632b8 RegQueryValueExA
 0x1000632c0 RegQueryValueExW
 0x1000632c8 FindResourceA
 0x1000632d0 OutputDebugStringA
 0x1000632d8 RtlCaptureContext
 0x1000632e0 RtlLookupFunctionEntry
 0x1000632e8 RtlVirtualUnwind
 0x1000632f0 UnhandledExceptionFilter
 0x1000632f8 TerminateProcess
 0x100063300 GetSystemTimeAsFileTime
 0x100063308 GetTickCount
 0x100063310 QueryPerformanceCounter
 0x100063318 SetUnhandledExceptionFilter
 0x100063320 GetStartupInfoW
 0x100063328 InterlockedPushEntrySList
 0x100063330 VirtualAlloc
 0x100063338 InterlockedPopEntrySList
 0x100063340 VirtualFree
 0x100063348 lstrlenA
 0x100063350 WideCharToMultiByte
 0x100063358 GetProcessHeap
 0x100063360 HeapSize
 0x100063368 HeapReAlloc
 0x100063370 HeapFree
 0x100063378 HeapAlloc
 0x100063380 HeapDestroy
 0x100063388 GetVersionExA
 0x100063390 ExpandEnvironmentStringsW
 0x100063398 FindResourceExW
 0x1000633a0 InitializeCriticalSection
 0x1000633a8 DeleteCriticalSection
 0x1000633b0 MultiByteToWideChar
 0x1000633b8 GetCurrentProcessId
 0x1000633c0 lstrlenW
 0x1000633c8 GetModuleFileNameW
 0x1000633d0 LoadLibraryW
 0x1000633d8 FlushInstructionCache
 0x1000633e0 GetModuleHandleW
 0x1000633e8 GetVersionExW
 0x1000633f0 GetProcAddress
 0x1000633f8 GetCurrentProcess
 0x100063400 FreeLibrary
GDI32.dll
 0x100063410 CreateDIBSection
 0x100063418 GetDeviceCaps
 0x100063420 CreateFontIndirectW
 0x100063428 DeleteDC
 0x100063430 CreateCompatibleDC
 0x100063438 GetStockObject
 0x100063440 GetTextExtentPoint32W
 0x100063448 SelectObject
 0x100063450 GetObjectW
 0x100063458 SetTextColor
 0x100063460 SetBkMode
 0x100063468 DeleteObject
 0x100063470 GetTextMetricsW
USER32.dll
 0x100063480 GetWindowLongW
 0x100063488 GetMenu
 0x100063490 AdjustWindowRectEx
 0x100063498 MoveWindow
 0x1000634a0 GetDC
 0x1000634a8 ReleaseDC
 0x1000634b0 SetFocus
 0x1000634b8 IsWindowEnabled
 0x1000634c0 IsWindowVisible
 0x1000634c8 CreateWindowExW
 0x1000634d0 GetClassInfoExW
 0x1000634d8 RegisterClassExW
 0x1000634e0 SetWindowLongPtrW
 0x1000634e8 GetWindowLongPtrW
 0x1000634f0 CallWindowProcW
 0x1000634f8 GetSubMenu
 0x100063500 LoadMenuW
 0x100063508 GetParent
 0x100063510 ClientToScreen
 0x100063518 CheckMenuRadioItem
 0x100063520 TrackPopupMenuEx
 0x100063528 DestroyMenu
 0x100063530 SetTimer
 0x100063538 SetWindowPos
 0x100063540 KillTimer
 0x100063548 SetWindowTextW
 0x100063550 EnableMenuItem
 0x100063558 GetSysColorBrush
 0x100063560 GetSysColor
 0x100063568 SendMessageW
 0x100063570 UnregisterClassA
 0x100063578 GetKeyState
 0x100063580 CharLowerBuffW
 0x100063588 GetClassNameW
 0x100063590 GetWindowThreadProcessId
 0x100063598 DestroyWindow
 0x1000635a0 SetActiveWindow
 0x1000635a8 LoadStringW
 0x1000635b0 InvalidateRect
 0x1000635b8 PostMessageW
 0x1000635c0 IsWindow
 0x1000635c8 CharNextW
 0x1000635d0 LoadAcceleratorsW
 0x1000635d8 GetMessageW
 0x1000635e0 TranslateAcceleratorW
 0x1000635e8 TranslateMessage
 0x1000635f0 DispatchMessageW
 0x1000635f8 BringWindowToTop
 0x100063600 EnableWindow
 0x100063608 IsDlgButtonChecked
 0x100063610 CheckDlgButton
 0x100063618 GetDlgItem
 0x100063620 GetSystemMetrics
 0x100063628 GetClientRect
 0x100063630 EnumChildWindows
 0x100063638 GetShellWindow
 0x100063640 SetWindowLongW
 0x100063648 DeleteMenu
 0x100063650 GetProcessDefaultLayout
 0x100063658 MonitorFromPoint
 0x100063660 GetWindowRect
 0x100063668 GetMonitorInfoW
 0x100063670 MonitorFromRect
 0x100063678 SetCursor
 0x100063680 ShowWindow
 0x100063688 GetFocus
 0x100063690 GetWindowPlacement
 0x100063698 IsIconic
 0x1000636a0 IsZoomed
 0x1000636a8 LockWindowUpdate
 0x1000636b0 PostQuitMessage
 0x1000636b8 LoadCursorW
 0x1000636c0 SystemParametersInfoW
 0x1000636c8 DestroyIcon
 0x1000636d0 TrackMouseEvent
 0x1000636d8 DefWindowProcW
msvcrt.dll
 0x1000636e8 malloc
 0x1000636f0 wcscpy_s
 0x1000636f8 wcscat_s
 0x100063700 _purecall
 0x100063708 memcpy_s
 0x100063710 memmove_s
 0x100063718 __RTDynamicCast
 0x100063720 _wcsicmp
 0x100063728 _wcsnicmp
 0x100063730 _itow
 0x100063738 _wtoi
 0x100063740 iswspace
 0x100063748 _wsplitpath_s
 0x100063750 wcsncat_s
 0x100063758 _beginthreadex
 0x100063760 wcsncpy_s
 0x100063768 ??0exception@@QEAA@AEBV0@@Z
 0x100063770 ?what@exception@@UEBAPEBDXZ
 0x100063778 ??1exception@@UEAA@XZ
 0x100063780 ??0exception@@QEAA@AEBQEBD@Z
 0x100063788 ??0exception@@QEAA@XZ
 0x100063790 wcsstr
 0x100063798 memcpy
 0x1000637a0 swprintf_s
 0x1000637a8 exit
 0x1000637b0 wcschr
 0x1000637b8 _itoa
 0x1000637c0 memset
 0x1000637c8 __C_specific_handler
 0x1000637d0 calloc
 0x1000637d8 ??0exception@@QEAA@AEBQEBDH@Z
 0x1000637e0 _CxxThrowException
 0x1000637e8 _callnewh
 0x1000637f0 __CxxFrameHandler3
 0x1000637f8 __wgetmainargs
 0x100063800 _onexit
 0x100063808 _lock
 0x100063810 __dllonexit
 0x100063818 _unlock
 0x100063820 _errno
 0x100063828 _resetstkoflw
 0x100063830 ??1type_info@@UEAA@XZ
 0x100063838 ?terminate@@YAXXZ
 0x100063840 __set_app_type
 0x100063848 _fmode
 0x100063850 _commode
 0x100063858 __setusermatherr
 0x100063860 _amsg_exit
 0x100063868 _ultow_s
 0x100063870 wcsrchr
 0x100063878 iswdigit
 0x100063880 _vscwprintf
 0x100063888 vswprintf_s
 0x100063890 _strlwr_s
 0x100063898 _itoa_s
 0x1000638a0 _ultoa_s
 0x1000638a8 _i64toa_s
 0x1000638b0 _ui64toa_s
 0x1000638b8 _gcvt_s
 0x1000638c0 wcsnlen
 0x1000638c8 _get_errno
 0x1000638d0 _set_errno
 0x1000638d8 _msize
 0x1000638e0 strncmp
 0x1000638e8 wcsncmp
 0x1000638f0 _wcstoui64
 0x1000638f8 _wcstoi64
 0x100063900 wcstod
 0x100063908 _HUGE
 0x100063910 _fpclass
 0x100063918 swscanf
 0x100063920 memmove
 0x100063928 _vsnwprintf
 0x100063930 wcspbrk
 0x100063938 _wcslwr
 0x100063940 _initterm
 0x100063948 _wcmdln
 0x100063950 _cexit
 0x100063958 free
 0x100063960 realloc
 0x100063968 _exit
 0x100063970 _XcptFilter
 0x100063978 _ltow
 0x100063980 memcmp
COMCTL32.dll
 0x100063990 ImageList_LoadImageW
 0x100063998 PropertySheetW
 0x1000639a0 ImageList_Add
 0x1000639a8 ImageList_Draw
 0x1000639b0 ImageList_Create
 0x1000639b8 ImageList_GetImageCount
 0x1000639c0 ImageList_Destroy
 0x1000639c8 ImageList_GetIconSize
 0x1000639d0 None
 0x1000639d8 None
 0x1000639e0 InitCommonControlsEx
 0x1000639e8 None
ole32.dll
 0x1000639f8 CoGetClassObject
 0x100063a00 StringFromCLSID
 0x100063a08 CreateStreamOnHGlobal
 0x100063a10 PropVariantClear
 0x100063a18 OleGetClipboard
 0x100063a20 CoRevertToSelf
 0x100063a28 CoImpersonateClient
 0x100063a30 OleUninitialize
 0x100063a38 CoRevokeClassObject
 0x100063a40 CoResumeClassObjects
 0x100063a48 CoRegisterClassObject
 0x100063a50 CoInitializeSecurity
 0x100063a58 OleInitialize
 0x100063a60 CoTaskMemAlloc
 0x100063a68 CoTaskMemRealloc
 0x100063a70 CoTaskMemFree
 0x100063a78 CoInitialize
 0x100063a80 CoUninitialize
 0x100063a88 CoCreateInstance
OLEAUT32.dll
 0x100063a98 VariantClear
 0x100063aa0 SysAllocStringByteLen
 0x100063aa8 SysStringByteLen
 0x100063ab0 SysAllocString
 0x100063ab8 SysFreeString
 0x100063ac0 SysAllocStringLen
 0x100063ac8 LoadRegTypeLib
 0x100063ad0 LoadTypeLib
 0x100063ad8 DispCallFunc
 0x100063ae0 VarUI4FromStr
 0x100063ae8 VariantInit
 0x100063af0 SafeArrayGetLBound
 0x100063af8 SafeArrayGetUBound
 0x100063b00 SafeArrayDestroy
 0x100063b08 SafeArrayRedim
 0x100063b10 SafeArrayCreate
 0x100063b18 SafeArrayUnlock
 0x100063b20 SafeArrayLock
 0x100063b28 VarBstrCat
 0x100063b30 SysStringLen
 0x100063b38 VariantCopyInd
 0x100063b40 VariantCopy
 0x100063b48 GetErrorInfo
 0x100063b50 VarBstrCmp
SHELL32.dll
 0x100063b60 SHGetPropertyStoreForWindow
 0x100063b68 ShellExecuteW
SHLWAPI.dll
 0x100063b78 None
 0x100063b80 UrlEscapeW
 0x100063b88 UrlUnescapeW
 0x100063b90 SHStrDupW
RPCRT4.dll
 0x100063ba0 UuidCreateNil
 0x100063ba8 RpcStringFreeA
 0x100063bb0 UuidToStringA
 0x100063bb8 UuidCreate
 0x100063bc0 UuidIsNil
 0x100063bc8 UuidFromStringA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure