ScreenShot
Created | 2024.01.10 08:07 | Machine | s1_win7_x6401 |
Filename | 288c47bbc187122b439df19ff4df68f076.exe | ||
Type | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 51 detected (AIDetectMalware, ShortLoader, MulDropNET, MSILZilla, GenericRXPI, unsafe, Save, Ransomware, Mokes, malicious, ZemsilF, @p0@aC@zlvf, Attribute, HighConfidence, high confidence, DropperX, Ximw, AGEN, SMOKELOADER, YXEAIZ, ILAgent, Krypt, Detected, Kryptik, Eldorado, Malware@#ngtmjep2aye9, score, GdSda, AntiVM, CLASSIC, Static AI, Malicious PE, GenKryptik, FFMZ, confidence, 100%) | ||
md5 | d872ad98ce3e3db8497ccd15e0baad33 | ||
sha256 | d77a59decea0b458372ccc3ace96fcf3726346ef030fb6dd35e0ba64ba734f0b | ||
ssdeep | 196608:x90qA5Ae48OeGc1GbJjL7d/jKczNljQgK/:x93qMpYG1v8WTQgK | ||
imphash | f34d5f2d4577ed6d9ceec516c1f5a744 | ||
impfuzzy | 3:rGsLdAIEK:tf |
Network IP location
Signature (20cnts)
Level | Description |
---|---|
danger | File has been identified by 51 AntiVirus engines on VirusTotal as malicious |
danger | Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) |
watch | Attempts to identify installed AV products by installation directory |
watch | Communicates with host for which no DNS query was performed |
watch | Deletes a large number of files from the system indicative of ransomware |
watch | Deletes executed files from disk |
watch | Detects VirtualBox through the presence of a file |
watch | Drops 105 unknown file mime types indicative of ransomware writing encrypted files back to disk |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An executable file was downloaded by the process installsetup9.exe |
notice | Creates executable files on the filesystem |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Looks up the external IP address |
notice | Performs some HTTP requests |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
Rules (30cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | HermeticWiper_Zero | HermeticWiper | binaries (download) |
danger | NPKI_Zero | File included NPKI | binaries (download) |
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
warning | NSIS_Installer | Null Soft Installer | binaries (download) |
warning | Suspicious_Obfuscation_Script | Suspicious obfuscation script | binaries (download) |
watch | Admin_Tool_IN_Zero | Admin Tool Sysinternals | binaries (download) |
watch | Antivirus | Contains references to security software | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (download) |
notice | anti_vm_detect | Possibly employs anti-virtualization techniques | binaries (download) |
notice | Javascript_Blob | use blob(Binary Large Objec) javascript | binaries (download) |
info | bmp_file_format | bmp file format | binaries (download) |
info | CAB_file_format | CAB archive file | binaries (download) |
info | DllRegisterServer_Zero | execute regsvr32.exe | binaries (download) |
info | icon_file_format | icon file format | binaries (download) |
info | Is_DotNET_EXE | (no description) | binaries (download) |
info | Is_DotNET_EXE | (no description) | binaries (upload) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | IsPE64 | (no description) | binaries (download) |
info | JPEG_Format_Zero | JPEG Format | binaries (download) |
info | Microsoft_Office_File_Zero | Microsoft Office File | binaries (download) |
info | mzp_file_format | MZP(Delphi) file format | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | PNG_Format_Zero | PNG Format | binaries (download) |
info | zip_file_format | ZIP file format | binaries (download) |
Network (9cnts) ?
Suricata ids
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
ET INFO External IP Lookup Domain (iplogger .com in DNS lookup)
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
ET INFO Executable Download from dotted-quad Host
ET POLICY PE EXE or DLL Windows file download HTTP
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET INFO External IP Lookup Domain (iplogger .com in TLS SNI)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET POLICY External IP Lookup (ipify .org)
ET INFO External IP Lookup Domain (iplogger .com in DNS lookup)
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
ET INFO Executable Download from dotted-quad Host
ET POLICY PE EXE or DLL Windows file download HTTP
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET INFO External IP Lookup Domain (iplogger .com in TLS SNI)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET POLICY External IP Lookup (ipify .org)
PE API
IAT(Import Address Table) Library
mscoree.dll
0x402000 _CorExeMain
EAT(Export Address Table) is none
mscoree.dll
0x402000 _CorExeMain
EAT(Export Address Table) is none