Report - ekk5.exe

Malicious Packer PE File PE64
ScreenShot
Created 2023.12.14 19:01 Machine s1_win7_x6401
Filename ekk5.exe
Type PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
AI Score
4
Behavior Score
4.0
ZERO API file : malware
VT API (file) 24 detected (AIDetectMalware, malicious, high confidence, score, unsafe, Havoc, V8mu, Attribute, HighConfidence, FmKscZQWeQD, Shellcoderunner, Detected, Wacatac, ScarletFlash, Chgt, Static AI, Suspicious PE, PossibleThreat, confidence, 100%)
md5 8d2033a5f012e0a7273aec14218639ec
sha256 e5678edaa33ccb76eb24df35029b65d60c36908113067f66023c3fc548970036
ssdeep 24576:2tFiVP1PH+UqAb2nV5XgEhfhJhhKh1hhhhSehhFhhhUhgzA:2tFiVP1PH+qcOZzA
imphash bc3dde5bfd8628ae140056ffcca67115
impfuzzy 48:wn8pvzfMP+kp6kSslTJG6qTU3zk61vm/Gwbqgss60OI:wn8p7fMPrp6kSYTJGhojkM+bqgsJa
  Network IP location

Signature (7cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
warning File has been identified by 24 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (3cnts)

Level Name Description Collection
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
113.52.134.114 HK Room 704, ChinaChen Leighton Plaza 113.52.134.114 malware

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x1400f9464 CryptAcquireContextW
 0x1400f946c CryptCreateHash
 0x1400f9474 CryptDecrypt
 0x1400f947c CryptDeriveKey
 0x1400f9484 CryptDestroyHash
 0x1400f948c CryptDestroyKey
 0x1400f9494 CryptHashData
 0x1400f949c CryptReleaseContext
KERNEL32.dll
 0x1400f94ac CloseHandle
 0x1400f94b4 CreateSemaphoreW
 0x1400f94bc DeleteCriticalSection
 0x1400f94c4 EnterCriticalSection
 0x1400f94cc FreeConsole
 0x1400f94d4 GetCurrentProcess
 0x1400f94dc GetCurrentThreadId
 0x1400f94e4 GetLastError
 0x1400f94ec GetModuleHandleA
 0x1400f94f4 GetModuleHandleW
 0x1400f94fc GetProcAddress
 0x1400f9504 GetStartupInfoA
 0x1400f950c InitializeCriticalSection
 0x1400f9514 IsDBCSLeadByteEx
 0x1400f951c LeaveCriticalSection
 0x1400f9524 LoadLibraryW
 0x1400f952c MultiByteToWideChar
 0x1400f9534 RaiseException
 0x1400f953c ReleaseSemaphore
 0x1400f9544 RtlCaptureContext
 0x1400f954c RtlLookupFunctionEntry
 0x1400f9554 RtlUnwindEx
 0x1400f955c RtlVirtualUnwind
 0x1400f9564 SetLastError
 0x1400f956c SetUnhandledExceptionFilter
 0x1400f9574 Sleep
 0x1400f957c TlsAlloc
 0x1400f9584 TlsFree
 0x1400f958c TlsGetValue
 0x1400f9594 TlsSetValue
 0x1400f959c VirtualProtect
 0x1400f95a4 VirtualQuery
 0x1400f95ac WaitForSingleObject
 0x1400f95b4 WideCharToMultiByte
msvcrt.dll
 0x1400f95c4 __C_specific_handler
 0x1400f95cc ___lc_codepage_func
 0x1400f95d4 ___mb_cur_max_func
 0x1400f95dc __getmainargs
 0x1400f95e4 __initenv
 0x1400f95ec __iob_func
 0x1400f95f4 __lconv_init
 0x1400f95fc __set_app_type
 0x1400f9604 __setusermatherr
 0x1400f960c _acmdln
 0x1400f9614 _amsg_exit
 0x1400f961c _cexit
 0x1400f9624 _commode
 0x1400f962c _errno
 0x1400f9634 _filelengthi64
 0x1400f963c _fileno
 0x1400f9644 _fmode
 0x1400f964c _fstat64
 0x1400f9654 _initterm
 0x1400f965c _lock
 0x1400f9664 _lseeki64
 0x1400f966c _onexit
 0x1400f9674 _strnicmp
 0x1400f967c _unlock
 0x1400f9684 _wfopen
 0x1400f968c abort
 0x1400f9694 calloc
 0x1400f969c exit
 0x1400f96a4 fclose
 0x1400f96ac fflush
 0x1400f96b4 fgetpos
 0x1400f96bc fopen
 0x1400f96c4 fprintf
 0x1400f96cc fputc
 0x1400f96d4 fputs
 0x1400f96dc fread
 0x1400f96e4 free
 0x1400f96ec fsetpos
 0x1400f96f4 fwrite
 0x1400f96fc getc
 0x1400f9704 getwc
 0x1400f970c isspace
 0x1400f9714 iswctype
 0x1400f971c localeconv
 0x1400f9724 malloc
 0x1400f972c memchr
 0x1400f9734 memcmp
 0x1400f973c memcpy
 0x1400f9744 memmove
 0x1400f974c memset
 0x1400f9754 putc
 0x1400f975c putwc
 0x1400f9764 realloc
 0x1400f976c setlocale
 0x1400f9774 setvbuf
 0x1400f977c signal
 0x1400f9784 strcmp
 0x1400f978c strcoll
 0x1400f9794 strerror
 0x1400f979c strftime
 0x1400f97a4 strlen
 0x1400f97ac strncmp
 0x1400f97b4 strxfrm
 0x1400f97bc towlower
 0x1400f97c4 towupper
 0x1400f97cc ungetc
 0x1400f97d4 ungetwc
 0x1400f97dc vfprintf
 0x1400f97e4 wcscoll
 0x1400f97ec wcsftime
 0x1400f97f4 wcslen
 0x1400f97fc wcsxfrm
 0x1400f9804 _write
 0x1400f980c _read
 0x1400f9814 _fileno
 0x1400f981c _fdopen
 0x1400f9824 _close
ntdll.dll
 0x1400f9834 NtAllocateVirtualMemory
 0x1400f983c NtClose
 0x1400f9844 NtCreateThreadEx
 0x1400f984c NtWaitForSingleObject
 0x1400f9854 NtWriteVirtualMemory

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure