Report - mm.txt.exe

Malicious Library PE32 PE File
ScreenShot
Created 2024.01.10 09:31 Machine s1_win7_x6402
Filename mm.txt.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
12
Behavior Score
4.2
ZERO API file : malware
VT API (file) 58 detected (AIDetectMalware, KillMBR, Farfli, DeepScan, GenericRI, S26298297, GenericRXNT, Save, malicious, confidence, 100%, Genus, Attribute, HighConfidence, high confidence, Kryptik, HOBH, jozzvh, BackdoorX, Shellex, CLASSIC, ZPACK, R002C0DA924, NSAnti, hjgut, Detected, Eldorado, score, R356012, BScope, unsafe, Genetic, Gencirc, GenAsa, aUeFk+Sxvek, Static AI, Malicious PE, susgen, GenKryptik, DJUZ)
md5 af0577837683f80c555a27e9af137a55
sha256 40e261e7bffce05b06dc3d6feaa430d310ec8bde473e1136255965b8aa28f925
ssdeep 12288:zcWl26g/UBlRn5DzZ3TTP+5WkOVHK/H7sx117ksgSh20RUTMkzVSleJHcT/rBMSD:gWgHN8kSszVSlMHcTDBMGr9chBMGk
imphash de6942886ea1706308de6a5dc748b51c
impfuzzy 24:f0aMDoocOMiOovVfcP7JHd3iv8ERRvNuCJy9s:X+cOM14fcPr3WJJyW
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 58 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info The executable uses a known packer

Rules (3cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
154.211.23.99 HK HK AISI CLOUD COMPUTING LIMITED 154.211.23.99 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x401000 HeapFree
 0x401004 GetProcessHeap
 0x401008 HeapAlloc
 0x40100c HeapReAlloc
 0x401010 VirtualFree
 0x401014 FreeLibrary
 0x401018 VirtualAlloc
 0x40101c VirtualProtect
 0x401020 GetProcAddress
 0x401024 LoadLibraryA
 0x401028 IsBadReadPtr
 0x40102c ExitProcess
 0x401030 RtlUnwind
 0x401034 RaiseException
 0x401038 GetModuleHandleA
 0x40103c GetStartupInfoA
 0x401040 GetCommandLineA
 0x401044 GetVersion
 0x401048 InitializeCriticalSection
 0x40104c EnterCriticalSection
 0x401050 LeaveCriticalSection
 0x401054 GetCurrentThreadId
 0x401058 TlsSetValue
 0x40105c TlsAlloc
 0x401060 SetLastError
 0x401064 TlsGetValue
 0x401068 GetLastError
 0x40106c SetUnhandledExceptionFilter
 0x401070 TerminateProcess
 0x401074 GetCurrentProcess
 0x401078 UnhandledExceptionFilter
 0x40107c GetModuleFileNameA
 0x401080 FreeEnvironmentStringsA
 0x401084 FreeEnvironmentStringsW
 0x401088 WideCharToMultiByte
 0x40108c GetEnvironmentStrings
 0x401090 GetEnvironmentStringsW
 0x401094 SetHandleCount
 0x401098 GetStdHandle
 0x40109c GetFileType
 0x4010a0 GetEnvironmentVariableA
 0x4010a4 GetVersionExA
 0x4010a8 HeapDestroy
 0x4010ac HeapCreate
 0x4010b0 WriteFile
 0x4010b4 IsBadWritePtr
 0x4010b8 IsBadCodePtr
 0x4010bc GetCPInfo
 0x4010c0 GetACP
 0x4010c4 GetOEMCP
 0x4010c8 MultiByteToWideChar
 0x4010cc LCMapStringA
 0x4010d0 LCMapStringW
 0x4010d4 GetStringTypeA
 0x4010d8 GetStringTypeW
 0x4010dc InterlockedDecrement
 0x4010e0 InterlockedIncrement

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure