Report - zil3.exe

Malicious Packer UPX PE File PE64
ScreenShot
Created 2023.12.14 19:16 Machine s1_win7_x6401
Filename zil3.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
4
Behavior Score
4.2
ZERO API file : malware
VT API (file) 34 detected (AIDetectMalware, malicious, high confidence, score, unsafe, Save, GenericKD, Attribute, HighConfidence, ShellcodeRunner, BackdoorX, Havoc, NEi201AYkVM, Redcap, meave, PSLoader, Detected, ai score=85, ScarletFlash, V46N5V, R002H0DLD23, Gencirc, Static AI, Malicious PE, confidence, 100%)
md5 129c9feef30f2b990141cff971e52a0e
sha256 e2762ea7c59520a1a989cb3d6798b00ffba323e82a5db2cd0f778573feddfa60
ssdeep 6144:4PIDLgMmW9acydhtTvQEHfcmA2S+LKnkpL2Rut2pKVuYiElHyAiv3ZGR6rSTY+x1:4PIPRacyr9fXuFkMIooIb/vRybxBpCO
imphash 7cb96f961423ed60b38a4407fba7d0a3
impfuzzy 24:QTF8078p8dYJgf3lDq+kYVm0MblR95XG6qXZ8k1komvlxcqKZy:wn8pvGfI+kYVFslTJG6qJ8k1k1vkqL
  Network IP location

Signature (7cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 34 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (4cnts)

Level Name Description Collection
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
113.52.134.114 HK Room 704, ChinaChen Leighton Plaza 113.52.134.114 malware

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x140027270 CryptAcquireContextW
 0x140027278 CryptCreateHash
 0x140027280 CryptDecrypt
 0x140027288 CryptDeriveKey
 0x140027290 CryptDestroyHash
 0x140027298 CryptDestroyKey
 0x1400272a0 CryptHashData
 0x1400272a8 CryptReleaseContext
KERNEL32.dll
 0x1400272b8 DeleteCriticalSection
 0x1400272c0 EnterCriticalSection
 0x1400272c8 FreeConsole
 0x1400272d0 GetCurrentProcess
 0x1400272d8 GetCurrentThread
 0x1400272e0 GetLastError
 0x1400272e8 GetModuleHandleA
 0x1400272f0 GetProcAddress
 0x1400272f8 GetStartupInfoA
 0x140027300 InitializeCriticalSection
 0x140027308 IsDBCSLeadByteEx
 0x140027310 LeaveCriticalSection
 0x140027318 MultiByteToWideChar
 0x140027320 QueueUserAPC
 0x140027328 SetUnhandledExceptionFilter
 0x140027330 Sleep
 0x140027338 TlsGetValue
 0x140027340 VirtualAlloc
 0x140027348 VirtualProtect
 0x140027350 VirtualQuery
 0x140027358 WideCharToMultiByte
 0x140027360 WriteProcessMemory
msvcrt.dll
 0x140027370 __C_specific_handler
 0x140027378 ___lc_codepage_func
 0x140027380 ___mb_cur_max_func
 0x140027388 __getmainargs
 0x140027390 __initenv
 0x140027398 __iob_func
 0x1400273a0 __lconv_init
 0x1400273a8 __set_app_type
 0x1400273b0 __setusermatherr
 0x1400273b8 _acmdln
 0x1400273c0 _amsg_exit
 0x1400273c8 _cexit
 0x1400273d0 _commode
 0x1400273d8 _errno
 0x1400273e0 _fmode
 0x1400273e8 _initterm
 0x1400273f0 _lock
 0x1400273f8 _onexit
 0x140027400 _unlock
 0x140027408 abort
 0x140027410 calloc
 0x140027418 exit
 0x140027420 fprintf
 0x140027428 fputc
 0x140027430 free
 0x140027438 fwrite
 0x140027440 localeconv
 0x140027448 malloc
 0x140027450 memcpy
 0x140027458 signal
 0x140027460 strerror
 0x140027468 strlen
 0x140027470 strncmp
 0x140027478 vfprintf
 0x140027480 wcslen

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure