Report - Services.exe

Malicious Library UPX PE File PE32 PE64
ScreenShot
Created 2023.09.30 12:58 Machine s1_win7_x6403
Filename Services.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
10.8
ZERO API file : malware
VT API (file) 37 detected (AIDetectMalware, GenericKD, Artemis, RedLineStealer, Vmp6, VMProtect, ZexaF, @J0@aKjs31jO, ABRisk, NYOS, Attribute, HighConfidence, malicious, high confidence, AU suspicious, DropperX, Siggen21, PRIVATELOADER, YXDI3Z, high, score, Static AI, Suspicious PE, Znyonm, Detected, BScope, TrojanPSW, Coins, ai score=81, unsafe, Generic@AI, RDML, OleDoKY, 5poeqwjOhiYanA, PossibleThreat)
md5 b9a096baebdf8e44368e9724da8e56dd
sha256 2157d146a890d32c5ba49f31fa1840e5b0d56e4dd0bbf5f8b14cc4e482a47bef
ssdeep 98304:OJhDwVgp97vYIP8nq5g88RzpufFdx37e5vQCxt2xWwESu:OYVgLs1qlYp0Ff37exTjJ
imphash a30456d356096db6c5256124ce90b11d
impfuzzy 6:/oPBT8ba1bK1eFML1Kf/JLGMZ/OiBJAEnERGDW:gPBT3ZGMZGqAJcDW
  Network IP location

Signature (26cnts)

Level Description
danger File has been identified by 37 AntiVirus engines on VirusTotal as malicious
watch Attempts to create or modify system certificates
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch Network communications indicative of possible code injection originated from the process services.exe
watch Uses Sysinternals tools in order to add additional command line functionality
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An executable file was downloaded by the process services.exe
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Looks up the external IP address
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (8cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (28cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://193.42.32.118/api/firecom.php Unknown 193.42.32.118 36700 mailcious
http://171.22.28.226/download/WWW14_64.exe DE CMCS 171.22.28.226 clean
http://193.42.32.118/api/tracemap.php Unknown 193.42.32.118 36180 mailcious
http://www.maxmind.com/geoip/v2.1/city/me US CLOUDFLARENET 104.18.145.235 clean
https://sso.passport.yandex.ru/push?uuid=ad269c5f-9769-4a8d-84e7-2d5be64d35f7&retpath=https%3A%2F%2Fdzen.ru%2F%3Fyredirect%3Dtrue RU YANDEX LLC 213.180.204.24 clean
https://dzen.ru/?yredirect=true RU Invest Mobile LLC 62.217.160.2 clean
https://api.db-ip.com/v2/p31e4d59ee6ad1a0b5cc80695a873e43a8fbca06/self US CLOUDFLARENET 172.67.75.166 clean
https://db-ip.com/ US CLOUDFLARENET 104.26.5.15 clean
db-ip.com US CLOUDFLARENET 104.26.4.15 clean
ipinfo.io US GOOGLE 34.117.59.81 clean
twitter.com US TWITTER 104.244.42.193 clean
telegram.org GB Telegram Messenger Inc 149.154.167.99 clean
www.maxmind.com US CLOUDFLARENET 104.18.146.235 clean
yandex.ru RU YANDEX LLC 77.88.55.88 clean
api.db-ip.com US CLOUDFLARENET 172.67.75.166 clean
dzen.ru RU Invest Mobile LLC 62.217.160.2 clean
sso.passport.yandex.ru RU YANDEX LLC 213.180.204.24 clean
149.154.167.99 GB Telegram Messenger Inc 149.154.167.99 mailcious
193.42.32.118 Unknown 193.42.32.118 mailcious
172.67.75.166 US CLOUDFLARENET 172.67.75.166 clean
62.217.160.2 RU Invest Mobile LLC 62.217.160.2 clean
104.18.146.235 US CLOUDFLARENET 104.18.146.235 clean
213.180.204.24 RU YANDEX LLC 213.180.204.24 clean
171.22.28.226 DE CMCS 171.22.28.226 malware
34.117.59.81 US GOOGLE 34.117.59.81 clean
104.26.5.15 US CLOUDFLARENET 104.26.5.15 clean
5.255.255.70 RU YANDEX LLC 5.255.255.70 clean
104.244.42.129 US TWITTER 104.244.42.129 suspicious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x61f000 CreateProcessA
ADVAPI32.dll
 0x61f008 CreateServiceA
SHELL32.dll
 0x61f010 SHGetSpecialFolderPathA
SETUPAPI.dll
 0x61f018 SetupDiGetClassDevsA
KERNEL32.dll
 0x61f020 LocalAlloc
 0x61f024 LocalFree
 0x61f028 GetModuleFileNameW
 0x61f02c ExitProcess
 0x61f030 LoadLibraryA
 0x61f034 GetModuleHandleA
 0x61f038 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure