ScreenShot
Created | 2023.11.25 18:08 | Machine | s1_win7_x6401 |
Filename | PLmp.exe | ||
Type | PE32+ executable (GUI) x86-64, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 43 detected (AIDetectMalware, PrivateLoader, Siggen22, Barys, unsafe, V0sm, Attribute, HighConfidence, malicious, high confidence, VMProtect, J suspicious, FileRepMalware, Qgil, ai score=80, ABRisk, LGKF, ScarletFlash, Glupteba, ApplicUnwnt@#dqvw8gfmjoas, score, PWSX, Artemis, Chgt, R014H09KO23, KZqwgLlcN8L, Static AI, Suspicious PE, susgen, confidence) | ||
md5 | d689713e2c880daf649ec894a0761274 | ||
sha256 | 3d827e587c7f6e0fd92a866370618bd014d45c725dea96379ce641c6f75cb862 | ||
ssdeep | 196608:zy6KNPftIQbD/RB9R+27xwOP7O1Cle4ppODra:z/+fmQbDJ/B7xwO61Cle4ner | ||
imphash | ee26deb5354c4489ff0dc7547168b2dc | ||
impfuzzy | 6:aZRHmR1A4GVzRgKLbXwNbsOhcB8VyH/JLGMZ/OiBJAEnERGDW:KAR1A4GZRgIwxvM8sZGMZGqAJcDW |
Network IP location
Signature (39cnts)
Level | Description |
---|---|
danger | File has been identified by 43 AntiVirus engines on VirusTotal as malicious |
danger | Disables Windows Security features |
danger | Drops 869 unknown file mime types indicative of ransomware writing encrypted files back to disk |
danger | Executed a process and injected code into it |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Attempts to identify installed AV products by installation directory |
watch | Communicates with host for which no DNS query was performed |
watch | Deletes a large number of files from the system indicative of ransomware |
watch | Deletes executed files from disk |
watch | Detects Avast Antivirus through the presence of a library |
watch | Detects VirtualBox through the presence of a file |
watch | Drops a binary and executes it |
watch | Potential code injection by writing to the memory of another process |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An executable file was downloaded by the process plmp.exe |
notice | Creates executable files on the filesystem |
notice | Creates hidden or system file |
notice | Drops an executable to the user AppData folder |
notice | Expresses interest in specific running processes |
notice | Foreign language identified in PE resource |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Looks up the external IP address |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | Searches running processes potentially to identify processes for sandbox evasion |
notice | Sends data using the HTTP POST Method |
notice | Steals private information from local Internet browsers |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | The executable is likely packed with VMProtect |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Collects information to fingerprint the system (MachineGuid |
info | Command line console output was observed |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
Rules (41cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | HermeticWiper_Zero | HermeticWiper | binaries (download) |
danger | NPKI_Zero | File included NPKI | binaries (download) |
danger | Win32_Trojan_Gen_1_0904B0_Zero | Win32 Trojan Emotet | binaries (download) |
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
warning | NSIS_Installer | Null Soft Installer | binaries (download) |
warning | Suspicious_Obfuscation_Script | Suspicious obfuscation script | binaries (download) |
watch | Admin_Tool_IN_Zero | Admin Tool Sysinternals | binaries (download) |
watch | Antivirus | Contains references to security software | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (download) |
watch | VMProtect_Zero | VMProtect packed file | binaries (download) |
watch | VMProtect_Zero | VMProtect packed file | binaries (upload) |
notice | anti_vm_detect | Possibly employs anti-virtualization techniques | binaries (download) |
notice | Javascript_Blob | use blob(Binary Large Objec) javascript | binaries (download) |
info | bmp_file_format | bmp file format | binaries (download) |
info | CAB_file_format | CAB archive file | binaries (download) |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | DllRegisterServer_Zero | execute regsvr32.exe | binaries (download) |
info | ftp_command | ftp command | binaries (download) |
info | icon_file_format | icon file format | binaries (download) |
info | Is_DotNET_EXE | (no description) | binaries (download) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE64 | (no description) | binaries (download) |
info | IsPE64 | (no description) | binaries (upload) |
info | JPEG_Format_Zero | JPEG Format | binaries (download) |
info | Microsoft_Office_File_Zero | Microsoft Office File | binaries (download) |
info | mzp_file_format | MZP(Delphi) file format | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | PNG_Format_Zero | PNG Format | binaries (download) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
info | zip_file_format | ZIP file format | binaries (download) |
Network (17cnts) ?
Suricata ids
SURICATA Applayer Mismatch protocol both directions
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com)
ET MALWARE Win32/BeamWinHTTP CnC Activity M2 (GET)
ET INFO Executable Download from dotted-quad Host
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
ET POLICY PE EXE or DLL Windows file download HTTP
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com)
ET MALWARE Win32/BeamWinHTTP CnC Activity M2 (GET)
ET INFO Executable Download from dotted-quad Host
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
ET POLICY PE EXE or DLL Windows file download HTTP
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0x140687000 InitializeCriticalSectionEx
USER32.dll
0x140687010 CharNextA
ADVAPI32.dll
0x140687020 RegCloseKey
SHELL32.dll
0x140687030 ShellExecuteA
ole32.dll
0x140687040 CoCreateInstance
KERNEL32.dll
0x140687050 GetVersion
USER32.dll
0x140687060 CharUpperBuffW
KERNEL32.dll
0x140687070 LocalAlloc
0x140687078 LocalFree
0x140687080 GetModuleFileNameW
0x140687088 ExitProcess
0x140687090 LoadLibraryA
0x140687098 GetModuleHandleA
0x1406870a0 GetProcAddress
EAT(Export Address Table) is none
KERNEL32.dll
0x140687000 InitializeCriticalSectionEx
USER32.dll
0x140687010 CharNextA
ADVAPI32.dll
0x140687020 RegCloseKey
SHELL32.dll
0x140687030 ShellExecuteA
ole32.dll
0x140687040 CoCreateInstance
KERNEL32.dll
0x140687050 GetVersion
USER32.dll
0x140687060 CharUpperBuffW
KERNEL32.dll
0x140687070 LocalAlloc
0x140687078 LocalFree
0x140687080 GetModuleFileNameW
0x140687088 ExitProcess
0x140687090 LoadLibraryA
0x140687098 GetModuleHandleA
0x1406870a0 GetProcAddress
EAT(Export Address Table) is none