ScreenShot
Created | 2024.01.06 10:43 | Machine | s1_win7_x6401 |
Filename | 288c47bbc187111b439df19ff4df68f076.exe | ||
Type | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 51 detected (AIDetectMalware, ShortLoader, MSILZilla, GenericRXPI, Save, Ransomware, Mokes, malicious, confidence, 100%, Attribute, HighConfidence, high confidence, kgmlsg, DropperX, AntiVM, CLASSIC, AGEN, MulDropNET, SMOKELOADER, YXEADZ, ILAgent, Krypt, Detected, Kryptik, Eldorado, score, ZemsilF, @p0@aW8XMFj, ai score=80, unsafe, GdSda, Ekjl, Static AI, Malicious PE, susgen, GenKryptik, FFMZ) | ||
md5 | 9dc46160b805b73634f4bd8507f11494 | ||
sha256 | 94df05071cad9595820a5132137d060b0d2d3cd122e5cad35a014d80a6bde02a | ||
ssdeep | 196608:mpootpJcchlDhwyEjRA5n//JeVSR9xb1ROPQ0nnyJric:NotEcjDhwJRWnXoS/Bh0nkic | ||
imphash | f34d5f2d4577ed6d9ceec516c1f5a744 | ||
impfuzzy | 3:rGsLdAIEK:tf |
Network IP location
Signature (19cnts)
Level | Description |
---|---|
danger | File has been identified by 51 AntiVirus engines on VirusTotal as malicious |
watch | Attempts to identify installed AV products by installation directory |
watch | Communicates with host for which no DNS query was performed |
watch | Deletes a large number of files from the system indicative of ransomware |
watch | Deletes executed files from disk |
watch | Detects VirtualBox through the presence of a file |
watch | Drops 105 unknown file mime types indicative of ransomware writing encrypted files back to disk |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An executable file was downloaded by the process installsetup9.exe |
notice | Creates executable files on the filesystem |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Looks up the external IP address |
notice | Performs some HTTP requests |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
Rules (30cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | HermeticWiper_Zero | HermeticWiper | binaries (download) |
danger | NPKI_Zero | File included NPKI | binaries (download) |
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
warning | NSIS_Installer | Null Soft Installer | binaries (download) |
warning | Suspicious_Obfuscation_Script | Suspicious obfuscation script | binaries (download) |
watch | Admin_Tool_IN_Zero | Admin Tool Sysinternals | binaries (download) |
watch | Antivirus | Contains references to security software | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (download) |
notice | anti_vm_detect | Possibly employs anti-virtualization techniques | binaries (download) |
notice | Javascript_Blob | use blob(Binary Large Objec) javascript | binaries (download) |
info | bmp_file_format | bmp file format | binaries (download) |
info | CAB_file_format | CAB archive file | binaries (download) |
info | DllRegisterServer_Zero | execute regsvr32.exe | binaries (download) |
info | icon_file_format | icon file format | binaries (download) |
info | Is_DotNET_EXE | (no description) | binaries (download) |
info | Is_DotNET_EXE | (no description) | binaries (upload) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | IsPE64 | (no description) | binaries (download) |
info | JPEG_Format_Zero | JPEG Format | binaries (download) |
info | Microsoft_Office_File_Zero | Microsoft Office File | binaries (download) |
info | mzp_file_format | MZP(Delphi) file format | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | PNG_Format_Zero | PNG Format | binaries (download) |
info | zip_file_format | ZIP file format | binaries (download) |
Network (7cnts) ?
Suricata ids
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
ET POLICY External IP Lookup (ipify .org)
ET INFO Executable Download from dotted-quad Host
ET INFO Packed Executable Download
ET POLICY PE EXE or DLL Windows file download HTTP
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
ET POLICY External IP Lookup (ipify .org)
ET INFO Executable Download from dotted-quad Host
ET INFO Packed Executable Download
ET POLICY PE EXE or DLL Windows file download HTTP
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
PE API
IAT(Import Address Table) Library
mscoree.dll
0x402000 _CorExeMain
EAT(Export Address Table) is none
mscoree.dll
0x402000 _CorExeMain
EAT(Export Address Table) is none