Report - 2cfa8e8aaadb6372a5cad4814785bb581fe0cf0487a5ec67aa0b39f99a575623

Generic Malware Malicious Library UPX Malicious Packer PE File PE32
ScreenShot
Created 2023.09.06 16:05 Machine s1_win7_x6401
Filename 2cfa8e8aaadb6372a5cad4814785bb581fe0cf0487a5ec67aa0b39f99a575623
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
4.4
ZERO API file : clean
VT API (file) 65 detected (VBKryjetorTAAE, Wanna, toNz, WannaCryptor, Ransomware, WannaCry, IRG1, unsafe, Wannacrypt, malicious, confidence, 100%, Eldorado, high confidence, CVE-2017-0147, score, eovgam, WNCryLdr, Gencirc, Rbot, WCRY, RansomWannaCry, high, WanaCry, Scatter, se30058, jet@714um4, R200572, ai score=100, CVE-2020-1701, CVE20170147, EternalBlue, CLASSIC, GenAsa, VW7HnU9046M, Static AI, Suspicious PE)
md5 a51fb67b5c13bb54aeb6126c2cadc61b
sha256 2cfa8e8aaadb6372a5cad4814785bb581fe0cf0487a5ec67aa0b39f99a575623
ssdeep 24576:wbLgdeQhfdmMSirYbcMNgef0QeQ4kRiwDnz9cEA5yYSZxN0P:wnjQqMSPbcBVQeRkRiwt/Zx+P
imphash 9ecee117164e0b870a53dd187cdd7174
impfuzzy 24:Wjsh8hnSDklJcp2LTTdEpZwu8eBaBGT1LFWzOxcOwjy876eZ+RP5H0vB+GvrcCGR:NYncp2Lly8SnI76eZ+RPp05+GoCGR
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 65 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice A process created a hidden window
notice Creates a service
notice Creates executable files on the filesystem
notice Creates hidden or system file
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (12cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
147.222.227.93 US GUNET 147.222.227.93 clean
122.117.253.66 TW Data Communication Business Group 122.117.253.66 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40a030 WaitForSingleObject
 0x40a034 InterlockedIncrement
 0x40a038 GetCurrentThreadId
 0x40a03c GetCurrentThread
 0x40a040 ReadFile
 0x40a044 GetFileSize
 0x40a048 CreateFileA
 0x40a04c MoveFileExA
 0x40a050 SizeofResource
 0x40a054 TerminateThread
 0x40a058 LoadResource
 0x40a05c FindResourceA
 0x40a060 GetProcAddress
 0x40a064 GetModuleHandleW
 0x40a068 ExitProcess
 0x40a06c GetModuleFileNameA
 0x40a070 LocalFree
 0x40a074 LocalAlloc
 0x40a078 CloseHandle
 0x40a07c InterlockedDecrement
 0x40a080 EnterCriticalSection
 0x40a084 LeaveCriticalSection
 0x40a088 InitializeCriticalSection
 0x40a08c GlobalAlloc
 0x40a090 GlobalFree
 0x40a094 QueryPerformanceFrequency
 0x40a098 QueryPerformanceCounter
 0x40a09c GetTickCount
 0x40a0a0 LockResource
 0x40a0a4 Sleep
 0x40a0a8 GetStartupInfoA
 0x40a0ac GetModuleHandleA
ADVAPI32.dll
 0x40a000 StartServiceCtrlDispatcherA
 0x40a004 RegisterServiceCtrlHandlerA
 0x40a008 ChangeServiceConfig2A
 0x40a00c SetServiceStatus
 0x40a010 OpenSCManagerA
 0x40a014 CreateServiceA
 0x40a018 CloseServiceHandle
 0x40a01c StartServiceA
 0x40a020 CryptGenRandom
 0x40a024 CryptAcquireContextA
 0x40a028 OpenServiceA
WS2_32.dll
 0x40a144 closesocket
 0x40a148 recv
 0x40a14c send
 0x40a150 htonl
 0x40a154 ntohl
 0x40a158 WSAStartup
 0x40a15c inet_ntoa
 0x40a160 ioctlsocket
 0x40a164 select
 0x40a168 htons
 0x40a16c socket
 0x40a170 connect
 0x40a174 inet_addr
MSVCP60.dll
 0x40a0b4 ??1_Lockit@std@@QAE@XZ
 0x40a0b8 ??0_Lockit@std@@QAE@XZ
iphlpapi.dll
 0x40a17c GetAdaptersInfo
 0x40a180 GetPerAdapterInfo
WININET.dll
 0x40a134 InternetOpenA
 0x40a138 InternetOpenUrlA
 0x40a13c InternetCloseHandle
MSVCRT.dll
 0x40a0c0 __set_app_type
 0x40a0c4 _stricmp
 0x40a0c8 __p__fmode
 0x40a0cc __p__commode
 0x40a0d0 _except_handler3
 0x40a0d4 __setusermatherr
 0x40a0d8 _initterm
 0x40a0dc __getmainargs
 0x40a0e0 _acmdln
 0x40a0e4 _adjust_fdiv
 0x40a0e8 _controlfp
 0x40a0ec exit
 0x40a0f0 _XcptFilter
 0x40a0f4 _exit
 0x40a0f8 _onexit
 0x40a0fc __dllonexit
 0x40a100 free
 0x40a104 ??2@YAPAXI@Z
 0x40a108 _ftol
 0x40a10c sprintf
 0x40a110 _endthreadex
 0x40a114 strncpy
 0x40a118 rand
 0x40a11c _beginthreadex
 0x40a120 __CxxFrameHandler
 0x40a124 srand
 0x40a128 time
 0x40a12c __p___argc

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure