Report - ama.exe

Amadey UPX PE32 PE File
ScreenShot
Created 2023.11.16 07:56 Machine s1_win7_x6403
Filename ama.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
7.8
ZERO API file : malware
VT API (file)
md5 a61aac13f8a4841915791fb57aa2e275
sha256 f50db870d11db91217a014fe2672069c51ae1e6c32547e09c99fef64c0a501fb
ssdeep 98304:YF85vlOC7s2wQPc8V94nWFQO0R6dheB4/ncnREmThJ45aTyFXBuirxD02g9rX:COvPgZeORpR67e4/ncRZTQXBFrWd
imphash 9ed5ffd9aebf2f772057cbc7c4430e2b
impfuzzy 6:AqFRgKLbGeuL16n9fXpjtlJoZ/OiBJAEnERGDW:7RgRZg9fNTOZGqAJcDW
  Network IP location

Signature (20cnts)

Level Description
watch Attempts to identify installed AV products by installation directory
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice A process attempted to delay the analysis task.
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Looks up the Dropbox cloud service
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Command line console output was observed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (6cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.172.128.100/u6vhSc3PPq/index.php RU OOO Nadym Svyaz Service 185.172.128.100 37993 mailcious
www.dropbox.com US DROPBOX 162.125.84.18 mailcious
208.91.197.132 VG CONFLUENCE-NETWORK-INC 208.91.197.132 mailcious
185.172.128.100 RU OOO Nadym Svyaz Service 185.172.128.100 mailcious
162.125.84.18 US DROPBOX 162.125.84.18 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x88a000 GetVersionExW
ADVAPI32.dll
 0x88a008 RegCloseKey
SHELL32.dll
 0x88a010 SHGetFolderPathA
WININET.dll
 0x88a018 HttpOpenRequestA
WS2_32.dll
 0x88a020 closesocket
KERNEL32.dll
 0x88a028 GetSystemTimeAsFileTime
KERNEL32.dll
 0x88a030 HeapAlloc
 0x88a034 HeapFree
 0x88a038 ExitProcess
 0x88a03c LoadLibraryA
 0x88a040 GetModuleHandleA
 0x88a044 GetProcAddress

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure