Report - fotod445.exe

Gen1 Emotet RedLine Infostealer RedLine stealer Malicious Library UPX .NET framework(MSIL) Confuser .NET Escalate priviledges ScreenShot persistence AntiDebug AntiVM PE File PE32 OS Processor Check CAB .NET EXE
ScreenShot
Created 2023.09.13 07:52 Machine s1_win7_x6403
Filename fotod445.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
5
Behavior Score
18.0
ZERO API file : malware
VT API (file)
md5 3b1efcafca28654e7ee16923ce5a56d2
sha256 6b3ac18fa5d0a3a4ecfe6800c8d6449c166516d60f3661bf72a4ecd24fcfbd3b
ssdeep 24576:RWEkfGnbsaS9LvezNTmdV4z3T+nz0Yl/JL:Vkubsh9DK4VGSnoYl/JL
imphash 29c8b785823d6c11cf3aae5ebbb5f0e6
impfuzzy 24:QzEYBu5zbZETKAWJjFHcpVWZQDsl9dtW3u9EbJh9WG9OovbO3kFZMv5GMA+EZS:+ER5JOWDHcpVe/ptW7DJo30FZGP
  Network IP location

Signature (41cnts)

Level Description
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Code injection by writing an executable or DLL to the memory of another process
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Detects Avast Antivirus through the presence of a library
watch Executes one or more WMI queries
watch Harvests credentials from local email clients
watch Harvests credentials from local FTP client softwares
watch Installs itself for autorun at Windows startup
watch Manipulates memory of a non-child process indicative of process injection
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries which can be used to identify virtual machines
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice Terminates another process
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (29cnts)

Level Name Description Collection
danger MALWARE_Win_VT_RedLine Detects RedLine infostealer binaries (download)
danger RedLine_Stealer_b_Zero RedLine stealer binaries (download)
danger Win32_Trojan_Emotet_RL_Gen_Zero Win32 Trojan Emotet binaries (download)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
watch ConfuserEx_Zero Confuser .NET binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
watch Win32_Trojan_PWS_Net_1_Zero Win32 Trojan PWS .NET Azorult binaries (download)
notice Escalate_priviledges Escalate priviledges memory
notice Persistence Install itself for autorun at Windows startup memory
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info CAB_file_format CAB archive file binaries (download)
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Is_DotNET_EXE (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://5.42.92.211/loghub/master RU CJSC Kolomna-Sviaz TV 5.42.92.211 36282 mailcious
77.91.124.82 RU Foton Telecom CJSC 77.91.124.82 mailcious
5.42.92.211 RU CJSC Kolomna-Sviaz TV 5.42.92.211 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x42b188 GetForegroundWindow
 0x42b18c CreatePopupMenu
 0x42b190 FlashWindowEx
ole32.dll
 0x42b198 CoGetApartmentType
 0x42b19c CoGetObjectContext
KERNEL32.dll
 0x42b000 CreateFileW
 0x42b004 HeapSize
 0x42b008 ReadConsoleW
 0x42b00c SetStdHandle
 0x42b010 GetProcessHeap
 0x42b014 GetLastError
 0x42b018 RaiseException
 0x42b01c GetCurrentThreadId
 0x42b020 IsProcessorFeaturePresent
 0x42b024 FreeLibraryWhenCallbackReturns
 0x42b028 CreateThreadpoolWork
 0x42b02c SubmitThreadpoolWork
 0x42b030 CloseThreadpoolWork
 0x42b034 GetModuleHandleExW
 0x42b038 MultiByteToWideChar
 0x42b03c InitializeConditionVariable
 0x42b040 WakeConditionVariable
 0x42b044 WakeAllConditionVariable
 0x42b048 SleepConditionVariableSRW
 0x42b04c InitOnceComplete
 0x42b050 InitOnceBeginInitialize
 0x42b054 GetStringTypeW
 0x42b058 InitializeSRWLock
 0x42b05c ReleaseSRWLockExclusive
 0x42b060 AcquireSRWLockExclusive
 0x42b064 TryAcquireSRWLockExclusive
 0x42b068 WideCharToMultiByte
 0x42b06c CloseHandle
 0x42b070 WaitForSingleObjectEx
 0x42b074 GetExitCodeThread
 0x42b078 QueryPerformanceCounter
 0x42b07c EnterCriticalSection
 0x42b080 LeaveCriticalSection
 0x42b084 InitializeCriticalSectionEx
 0x42b088 DeleteCriticalSection
 0x42b08c EncodePointer
 0x42b090 DecodePointer
 0x42b094 LCMapStringEx
 0x42b098 GetSystemTimeAsFileTime
 0x42b09c GetModuleHandleW
 0x42b0a0 GetProcAddress
 0x42b0a4 WriteConsoleW
 0x42b0a8 GetCPInfo
 0x42b0ac InitializeCriticalSectionAndSpinCount
 0x42b0b0 SetEvent
 0x42b0b4 ResetEvent
 0x42b0b8 CreateEventW
 0x42b0bc UnhandledExceptionFilter
 0x42b0c0 SetUnhandledExceptionFilter
 0x42b0c4 GetCurrentProcess
 0x42b0c8 TerminateProcess
 0x42b0cc IsDebuggerPresent
 0x42b0d0 GetStartupInfoW
 0x42b0d4 GetCurrentProcessId
 0x42b0d8 InitializeSListHead
 0x42b0dc SetEnvironmentVariableW
 0x42b0e0 RtlUnwind
 0x42b0e4 SetLastError
 0x42b0e8 TlsAlloc
 0x42b0ec TlsGetValue
 0x42b0f0 TlsSetValue
 0x42b0f4 TlsFree
 0x42b0f8 FreeLibrary
 0x42b0fc LoadLibraryExW
 0x42b100 CreateThread
 0x42b104 ExitThread
 0x42b108 FreeLibraryAndExitThread
 0x42b10c ExitProcess
 0x42b110 GetModuleFileNameW
 0x42b114 GetStdHandle
 0x42b118 WriteFile
 0x42b11c GetCommandLineA
 0x42b120 GetCommandLineW
 0x42b124 HeapAlloc
 0x42b128 HeapFree
 0x42b12c CompareStringW
 0x42b130 LCMapStringW
 0x42b134 GetLocaleInfoW
 0x42b138 IsValidLocale
 0x42b13c GetUserDefaultLCID
 0x42b140 EnumSystemLocalesW
 0x42b144 GetFileType
 0x42b148 GetFileSizeEx
 0x42b14c SetFilePointerEx
 0x42b150 FlushFileBuffers
 0x42b154 GetConsoleOutputCP
 0x42b158 GetConsoleMode
 0x42b15c ReadFile
 0x42b160 HeapReAlloc
 0x42b164 FindClose
 0x42b168 FindFirstFileExW
 0x42b16c FindNextFileW
 0x42b170 IsValidCodePage
 0x42b174 GetACP
 0x42b178 GetOEMCP
 0x42b17c GetEnvironmentStringsW
 0x42b180 FreeEnvironmentStringsW

EAT(Export Address Table) Library

0x405420 _jbxjgbguyw3@4


Similarity measure (PE file only) - Checking for service failure