Report - autorun.exe

Malicious Library Malicious Packer UPX PE32 PE File OS Processor Check
ScreenShot
Created 2023.12.11 19:53 Machine s1_win7_x6403
Filename autorun.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
8
Behavior Score
2.8
ZERO API file : mailcious
VT API (file)
md5 5d5ec23ea161feec9ef9e619dfe2d2d4
sha256 91ebed23de3f93608b5ef767856ae4632c91b964f6e66a01eaa0bd5beb237452
ssdeep 6144:jdXkQuUQb8pzeCTPZAk81FNvOcpLTpBeRY8OsHRGs:jd0QHL/
imphash 1d4643eb641c675f46fd7eeac4073dc0
impfuzzy 24:WjKNDogMjOovg/J3JKnktsQFQ8RyvDkRT4QfalWM:PMCHhts3DgcQfaIM
  Network IP location

Signature (7cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Uses Windows APIs to generate a cryptographic key

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
85.209.176.216 GB Digital Energy Technologies Ltd. 85.209.176.216 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x415000 WaitForSingleObject
 0x415004 Sleep
 0x415008 CreateThread
 0x41500c lstrlenW
 0x415010 VirtualProtect
 0x415014 GetProcAddress
 0x415018 LoadLibraryA
 0x41501c VirtualAlloc
 0x415020 GetModuleHandleA
 0x415024 FreeConsole
 0x415028 RtlUnwind
 0x41502c RaiseException
 0x415030 GetCommandLineA
 0x415034 GetModuleHandleW
 0x415038 TlsGetValue
 0x41503c TlsAlloc
 0x415040 TlsSetValue
 0x415044 TlsFree
 0x415048 InterlockedIncrement
 0x41504c SetLastError
 0x415050 GetCurrentThreadId
 0x415054 GetLastError
 0x415058 InterlockedDecrement
 0x41505c HeapFree
 0x415060 HeapAlloc
 0x415064 TerminateProcess
 0x415068 GetCurrentProcess
 0x41506c UnhandledExceptionFilter
 0x415070 SetUnhandledExceptionFilter
 0x415074 IsDebuggerPresent
 0x415078 ExitProcess
 0x41507c WriteFile
 0x415080 GetStdHandle
 0x415084 GetModuleFileNameA
 0x415088 FreeEnvironmentStringsA
 0x41508c GetEnvironmentStrings
 0x415090 FreeEnvironmentStringsW
 0x415094 WideCharToMultiByte
 0x415098 GetEnvironmentStringsW
 0x41509c SetHandleCount
 0x4150a0 GetFileType
 0x4150a4 GetStartupInfoA
 0x4150a8 DeleteCriticalSection
 0x4150ac HeapCreate
 0x4150b0 VirtualFree
 0x4150b4 QueryPerformanceCounter
 0x4150b8 GetTickCount
 0x4150bc GetCurrentProcessId
 0x4150c0 GetSystemTimeAsFileTime
 0x4150c4 GetCPInfo
 0x4150c8 GetACP
 0x4150cc GetOEMCP
 0x4150d0 IsValidCodePage
 0x4150d4 LeaveCriticalSection
 0x4150d8 EnterCriticalSection
 0x4150dc HeapReAlloc
 0x4150e0 HeapSize
 0x4150e4 InitializeCriticalSectionAndSpinCount
 0x4150e8 LCMapStringA
 0x4150ec MultiByteToWideChar
 0x4150f0 LCMapStringW
 0x4150f4 GetStringTypeA
 0x4150f8 GetStringTypeW
 0x4150fc GetLocaleInfoA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure