ScreenShot
Created | 2023.10.10 10:19 | Machine | s1_win7_x6402 |
Filename | bQ2j.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 64 detected (AIDetectMalware, Remcos, Dacic, Artemis, Rescoms, Save, malicious, Kryptik, Genus, moderate confidence, score, kakzkh, RATX, Gencirc, DownLoader46, YXDJFZ, high, Emogen, Eldorado, Malware@#1go1ts7nra5ze, Detected, ZexaF, omGfa4nx3Vpi, ai score=83, unsafe, GdSda, FKuWrtG2iWT, yzloPsMaQAE, Static AI, Malicious PE, susgen, confidence, 100%) | ||
md5 | eb5c869423632f5d3fe31cbbe85bfdbc | ||
sha256 | 46578af72eee4fa34a150d0f9409041fcdad17a061e77f1017640ef7373a6da6 | ||
ssdeep | 3072:tOSI2I7txG68nYrugMZJMfsciIpuKNtrUQlAK3qSjYPS+IAXb3Ixi5eFrgurIlNb:YvG68YrvM80ypnjAedo3qiGUY2ChzI | ||
imphash | bc4f8e98d1041d53dd63bfb91ed10d0a | ||
impfuzzy | 6:omRgCHWvC365rBJAEoZ/OEGDzyRZr4/b4RUptIKVSZozAhQcY460qtZGvR:omRgYh+ABZG/Dzgr4kYSIAx72ZGJ |
Network IP location
Signature (25cnts)
Level | Description |
---|---|
danger | File has been identified by 64 AntiVirus engines on VirusTotal as malicious |
danger | Executed a process and injected code into it |
watch | Creates a windows hook that monitors keyboard input (keylogger) |
watch | Deletes executed files from disk |
watch | Harvests credentials from local email clients |
watch | Harvests information related to installed instant messenger clients |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | A process attempted to delay the analysis task. |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Connects to a Dynamic DNS Domain |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Queries for potentially installed applications |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | Searches running processes potentially to identify processes for sandbox evasion |
notice | Steals private information from local Internet browsers |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is compressed using UPX |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Queries for the computername |
Rules (13cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Packer_Zero | Malicious Packer | binaries (upload) |
watch | Network_Downloader | File Downloader | binaries (upload) |
notice | ScreenShot | Take ScreenShot | memory |
info | anti_dbg | Checks if being debugged | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
Network (5cnts) ?
Suricata ids
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
ET JA3 Hash - Remcos 3.x TLS Connection
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
ET JA3 Hash - Remcos 3.x TLS Connection
PE API
IAT(Import Address Table) Library
ADVAPI32.dll
0x489724 RegCloseKey
GDI32.dll
0x48972c BitBlt
gdiplus.dll
0x489734 GdipFree
KERNEL32.DLL
0x48973c LoadLibraryA
0x489740 ExitProcess
0x489744 GetProcAddress
0x489748 VirtualProtect
ole32.dll
0x489750 CoGetObject
SHELL32.dll
0x489758 ExtractIconA
SHLWAPI.dll
0x489760 StrToIntA
urlmon.dll
0x489768 URLDownloadToFileW
USER32.dll
0x489770 DrawIcon
WININET.dll
0x489778 InternetOpenW
WINMM.dll
0x489780 waveInOpen
WS2_32.dll
0x489788 socket
EAT(Export Address Table) is none
ADVAPI32.dll
0x489724 RegCloseKey
GDI32.dll
0x48972c BitBlt
gdiplus.dll
0x489734 GdipFree
KERNEL32.DLL
0x48973c LoadLibraryA
0x489740 ExitProcess
0x489744 GetProcAddress
0x489748 VirtualProtect
ole32.dll
0x489750 CoGetObject
SHELL32.dll
0x489758 ExtractIconA
SHLWAPI.dll
0x489760 StrToIntA
urlmon.dll
0x489768 URLDownloadToFileW
USER32.dll
0x489770 DrawIcon
WININET.dll
0x489778 InternetOpenW
WINMM.dll
0x489780 waveInOpen
WS2_32.dll
0x489788 socket
EAT(Export Address Table) is none