Report - Services.exe

UPX VMProtect PE File PE32
ScreenShot
Created 2023.11.07 07:46 Machine s1_win7_x6401
Filename Services.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
5.6
ZERO API file : clean
VT API (file)
md5 d9ce98a0b0029d26876ac86409bac27e
sha256 c6185a23c51b8ac77e6c1bdf2cd4a8d39b02af8b8027d4162cf9766d19cf87c8
ssdeep 98304:T/kRk50qK5N7jdM2gOpqufwX9h+3dcWUWZJziS1hZUZyeYOth3fOCQb9GK1/49s:bokO9jdMxOUUwWdiWmS+JuZGKJ49
imphash 5de3d424cd6789b476f93abd644dde5a
impfuzzy 6:/oPBT8ba1bK1eFML1KFjtlJoZ/OiBJAEnERGDW:gPBTBTOZGqAJcDW
  Network IP location

Signature (15cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Network communications indicative of possible code injection originated from the process services.exe
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Looks up the external IP address
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is likely packed with VMProtect
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
watch VMProtect_Zero VMProtect packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (33cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://91.92.243.151/api/tracemap.php Unknown 91.92.243.151 37889 mailcious
http://94.142.138.131/api/tracemap.php RU Ihor Hosting LLC 94.142.138.131 28311 mailcious
http://apps.identrust.com/roots/dstrootcax3.p7c US CCCH-3 23.43.165.66 clean
http://www.maxmind.com/geoip/v2.1/city/me US CLOUDFLARENET 104.18.145.235 clean
http://94.142.138.131/api/firecom.php RU Ihor Hosting LLC 94.142.138.131 36179 mailcious
https://sso.passport.yandex.ru/push?uuid=17ee63be-a01d-4351-b836-3f7809d3449d&retpath=https%3A%2F%2Fdzen.ru%2F%3Fyredirect%3Dtrue RU YANDEX LLC 213.180.204.24 clean
https://dzen.ru/?yredirect=true RU Invest Mobile LLC 62.217.160.2 clean
https://api.db-ip.com/v2/p31e4d59ee6ad1a0b5cc80695a873e43a8fbca06/self US CLOUDFLARENET 172.67.75.166 clean
https://db-ip.com/ US CLOUDFLARENET 104.26.5.15 clean
db-ip.com US CLOUDFLARENET 172.67.75.166 clean
www.maxmind.com US CLOUDFLARENET 104.18.146.235 clean
ipinfo.io US GOOGLE 34.117.59.81 clean
twitter.com US TWITTER 104.244.42.1 clean
telegram.org GB Telegram Messenger Inc 149.154.167.99 clean
yandex.ru RU YANDEX LLC 5.255.255.70 clean
api.db-ip.com US CLOUDFLARENET 104.26.4.15 clean
dzen.ru RU Invest Mobile LLC 62.217.160.2 clean
ironhost.io US CLOUDFLARENET 104.21.57.237 clean
sso.passport.yandex.ru RU YANDEX LLC 213.180.204.24 clean
149.154.167.99 GB Telegram Messenger Inc 149.154.167.99 mailcious
213.180.204.24 RU YANDEX LLC 213.180.204.24 clean
172.67.75.166 US CLOUDFLARENET 172.67.75.166 clean
172.67.193.129 US CLOUDFLARENET 172.67.193.129 clean
104.18.146.235 US CLOUDFLARENET 104.18.146.235 clean
94.142.138.131 RU Ihor Hosting LLC 94.142.138.131 mailcious
121.254.136.18 KR LG DACOM Corporation 121.254.136.18 clean
62.217.160.2 RU Invest Mobile LLC 62.217.160.2 clean
91.92.243.151 Unknown 91.92.243.151 mailcious
34.117.59.81 US GOOGLE 34.117.59.81 clean
104.244.42.1 US TWITTER 104.244.42.1 suspicious
104.26.5.15 US CLOUDFLARENET 104.26.5.15 clean
5.255.255.70 RU YANDEX LLC 5.255.255.70 clean
125.253.92.50 AU FireNet Pty Ltd 125.253.92.50 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x6e1000 CreateProcessA
ADVAPI32.dll
 0x6e1008 CreateServiceA
SHELL32.dll
 0x6e1010 SHGetSpecialFolderPathA
SETUPAPI.dll
 0x6e1018 SetupDiGetClassDevsA
KERNEL32.dll
 0x6e1020 GetSystemTimeAsFileTime
KERNEL32.dll
 0x6e1028 HeapAlloc
 0x6e102c HeapFree
 0x6e1030 ExitProcess
 0x6e1034 LoadLibraryA
 0x6e1038 GetModuleHandleA
 0x6e103c GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure