Report - 1.exe

UPX Malicious Library PE File PE32 OS Processor Check
ScreenShot
Created 2023.09.18 07:39 Machine s1_win7_x6403
Filename 1.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
5
Behavior Score
5.4
ZERO API file : clean
VT API (file)
md5 ee629be336cb1394d8902ad966703722
sha256 f6ca072660301d01562b087fcdf04b8697a15ea706264d079726f09067c253a5
ssdeep 12288:SpHKaeR8yuI9K/bsrbzcCXy15hC3wnFvt/HjDcBtldlqPEXE2:FaeR8yuI9K/ArbzcCXy15hC3wnFvt/HS
imphash a051afa6afb2fed9c604c2121e6529dd
impfuzzy 24:CyDWJ4LjjCRS1jtpbJeDc+pl39TyoEOovbO3URZHu93vB3GM4L6:/CS1jtp6c+pp9yc3vBv
  Network IP location

Signature (15cnts)

Level Description
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Harvests credentials from local FTP client softwares
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice One or more potentially interesting buffers were extracted
notice Queries for potentially installed applications
notice Steals private information from local Internet browsers
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
176.123.9.85 MD Alexhost Srl 176.123.9.85 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41100c Sleep
 0x411010 CreateThread
 0x411014 VirtualAlloc
 0x411018 VirtualProtect
 0x41101c GetModuleHandleA
 0x411020 GetModuleHandleW
 0x411024 GetProcAddress
 0x411028 LoadResource
 0x41102c CreateMutexA
 0x411030 SizeofResource
 0x411034 FindResourceW
 0x411038 LoadLibraryA
 0x41103c LocalAlloc
 0x411040 lstrlenW
 0x411044 EnumTimeFormatsW
 0x411048 FreeConsole
 0x41104c WriteConsoleW
 0x411050 WaitForSingleObject
 0x411054 LockResource
 0x411058 GetLastError
 0x41105c QueryPerformanceCounter
 0x411060 GetCurrentProcessId
 0x411064 GetCurrentThreadId
 0x411068 GetSystemTimeAsFileTime
 0x41106c InitializeSListHead
 0x411070 IsDebuggerPresent
 0x411074 UnhandledExceptionFilter
 0x411078 SetUnhandledExceptionFilter
 0x41107c GetStartupInfoW
 0x411080 IsProcessorFeaturePresent
 0x411084 GetCurrentProcess
 0x411088 TerminateProcess
 0x41108c RtlUnwind
 0x411090 SetLastError
 0x411094 EncodePointer
 0x411098 EnterCriticalSection
 0x41109c LeaveCriticalSection
 0x4110a0 DeleteCriticalSection
 0x4110a4 InitializeCriticalSectionAndSpinCount
 0x4110a8 TlsAlloc
 0x4110ac TlsGetValue
 0x4110b0 TlsSetValue
 0x4110b4 TlsFree
 0x4110b8 FreeLibrary
 0x4110bc LoadLibraryExW
 0x4110c0 RaiseException
 0x4110c4 GetStdHandle
 0x4110c8 WriteFile
 0x4110cc GetModuleFileNameW
 0x4110d0 ExitProcess
 0x4110d4 GetModuleHandleExW
 0x4110d8 GetCommandLineA
 0x4110dc GetCommandLineW
 0x4110e0 HeapAlloc
 0x4110e4 HeapFree
 0x4110e8 FindClose
 0x4110ec FindFirstFileExW
 0x4110f0 FindNextFileW
 0x4110f4 IsValidCodePage
 0x4110f8 GetACP
 0x4110fc GetOEMCP
 0x411100 GetCPInfo
 0x411104 MultiByteToWideChar
 0x411108 WideCharToMultiByte
 0x41110c GetEnvironmentStringsW
 0x411110 FreeEnvironmentStringsW
 0x411114 SetEnvironmentVariableW
 0x411118 SetStdHandle
 0x41111c GetFileType
 0x411120 GetStringTypeW
 0x411124 CompareStringW
 0x411128 LCMapStringW
 0x41112c GetProcessHeap
 0x411130 HeapSize
 0x411134 HeapReAlloc
 0x411138 FlushFileBuffers
 0x41113c GetConsoleOutputCP
 0x411140 GetConsoleMode
 0x411144 SetFilePointerEx
 0x411148 CreateFileW
 0x41114c CloseHandle
 0x411150 DecodePointer
COMDLG32.dll
 0x411000 GetOpenFileNameA
 0x411004 GetSaveFileNameA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure