Report - 3535.exe

Malicious Library Malicious Packer UPX PE32 PE File OS Processor Check
ScreenShot
Created 2023.12.18 07:56 Machine s1_win7_x6403
Filename 3535.exe
Type PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
AI Score
7
Behavior Score
5.2
ZERO API file : mailcious
VT API (file)
md5 138b15b9fcd21533b3ca0193893053cf
sha256 4d58e1391edd093ad245f18ad52631bcd66649abc79cabc37aaf73dd37d9236e
ssdeep 3072:DOdyXTkHLacFNMataIbtJjRntvgzjOs+cIdRjiApjIJUzhDzG:DOdETkzNMUaIbDRnRcIRsJy5G
imphash efe29a6c50b79427ae937c4473543cdc
impfuzzy 24:dojKNDogHOovg/J3InKQFQ8RyvDklRT4nZmfWlzf:DuHQK3D+cnZmfW1f
  Network IP location

Signature (15cnts)

Level Description
watch Collects information about installed applications
watch Communicates with host for which no DNS query was performed
watch Harvests credentials from local FTP client softwares
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice One or more potentially interesting buffers were extracted
notice Queries for potentially installed applications
notice Steals private information from local Internet browsers
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
176.123.10.211 MD Alexhost Srl 176.123.10.211 mailcious
91.92.243.245 Unknown 91.92.243.245 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x410000 GetLastError
 0x410004 WaitForSingleObject
 0x410008 Sleep
 0x41000c CreateThread
 0x410010 lstrlenW
 0x410014 VirtualProtect
 0x410018 GetProcAddress
 0x41001c LoadLibraryA
 0x410020 VirtualAlloc
 0x410024 GetModuleHandleA
 0x410028 FreeConsole
 0x41002c RtlUnwind
 0x410030 GetCommandLineA
 0x410034 GetModuleHandleW
 0x410038 TlsGetValue
 0x41003c TlsAlloc
 0x410040 TlsSetValue
 0x410044 TlsFree
 0x410048 InterlockedIncrement
 0x41004c SetLastError
 0x410050 GetCurrentThreadId
 0x410054 InterlockedDecrement
 0x410058 SetUnhandledExceptionFilter
 0x41005c ExitProcess
 0x410060 WriteFile
 0x410064 GetStdHandle
 0x410068 GetModuleFileNameA
 0x41006c FreeEnvironmentStringsA
 0x410070 GetEnvironmentStrings
 0x410074 FreeEnvironmentStringsW
 0x410078 WideCharToMultiByte
 0x41007c GetEnvironmentStringsW
 0x410080 SetHandleCount
 0x410084 GetFileType
 0x410088 GetStartupInfoA
 0x41008c DeleteCriticalSection
 0x410090 HeapCreate
 0x410094 VirtualFree
 0x410098 HeapFree
 0x41009c QueryPerformanceCounter
 0x4100a0 GetTickCount
 0x4100a4 GetCurrentProcessId
 0x4100a8 GetSystemTimeAsFileTime
 0x4100ac RaiseException
 0x4100b0 TerminateProcess
 0x4100b4 GetCurrentProcess
 0x4100b8 UnhandledExceptionFilter
 0x4100bc IsDebuggerPresent
 0x4100c0 LeaveCriticalSection
 0x4100c4 EnterCriticalSection
 0x4100c8 GetCPInfo
 0x4100cc GetACP
 0x4100d0 GetOEMCP
 0x4100d4 IsValidCodePage
 0x4100d8 InitializeCriticalSectionAndSpinCount
 0x4100dc HeapAlloc
 0x4100e0 HeapReAlloc
 0x4100e4 GetLocaleInfoA
 0x4100e8 GetStringTypeA
 0x4100ec MultiByteToWideChar
 0x4100f0 GetStringTypeW
 0x4100f4 LCMapStringA
 0x4100f8 LCMapStringW
 0x4100fc HeapSize

EAT(Export Address Table) Library



Similarity measure (PE file only) - Checking for service failure