Report - nocry.exe

EnigmaProtector Generic Malware UPX Antivirus PE32 PE File .NET EXE DLL OS Processor Check Lnk Format GIF Format
ScreenShot
Created 2024.01.06 10:58 Machine s1_win7_x6401
Filename nocry.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
8
Behavior Score
12.2
ZERO API file : malware
VT API (file) 34 detected (AIDetectMalware, Jaik, Artemis, unsafe, Save, malicious, confidence, ZexaF, Ez0@auPAfqj, Attribute, HighConfidence, high confidence, EnigmaProtector, M suspicious, score, AGEN, Generic ML PUA, Static AI, Malicious PE, Bladabindi, Wacatac, ai score=87, Probably Heur, ExeHeaderL)
md5 d51470d48757a38f3023a9d40a081056
sha256 d248fd99ca4fe5a3a0b41829aacf20c91bf18c6b991d7f0061c1fe3716626578
ssdeep 24576:jbvRkQZEjGCqWfwg1piyraiHWD/MqMCPp1k72IWkiqGcpJGhBjikjQcfgcWe9:/b6j9qWfwgqD/MqMCPp1W2IWWpyBjzQU
imphash 2e5467cba76f44a088d39f78c5e807b6
impfuzzy 6:nERGDvZ/OiBJAEcXQwDLzRgSdn8BbMqtYbdxBMf:EcDvZGqA9AwDXRgKQcxBMf
  Network IP location

Signature (29cnts)

Level Description
danger Disables Windows Security features
danger File has been identified by 34 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch Looks for the Windows Idle Time to determine the uptime
watch The process powershell.exe wrote an executable file to disk
watch Uses Sysinternals tools in order to add additional command line functionality
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries
notice Executes one or more WMI queries which can be used to identify virtual machines
notice Looks up the external IP address
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info Uses Windows APIs to generate a cryptographic key

Rules (14cnts)

Level Name Description Collection
warning EnigmaProtector_IN EnigmaProtector binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info Is_DotNET_EXE (no description) binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info lnk_file_format Microsoft Windows Shortcut File Format binaries (download)
info Lnk_Format_Zero LNK Format binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
ipinfo.io US GOOGLE 34.117.186.192 clean
193.233.132.62 RU JSC Redcom-lnternet 193.233.132.62 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x77f0d4 GetModuleHandleA
 0x77f0d8 GetProcAddress
 0x77f0dc ExitProcess
 0x77f0e0 LoadLibraryA
user32.dll
 0x77f0e8 MessageBoxA
advapi32.dll
 0x77f0f0 RegCloseKey
oleaut32.dll
 0x77f0f8 SysFreeString
gdi32.dll
 0x77f100 CreateFontA
shell32.dll
 0x77f108 ShellExecuteA
version.dll
 0x77f110 GetFileVersionInfoA
mscoree.dll
 0x77f118 _CorExeMain

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure