Report - winserver.exe

UPX PE File PE64 OS Processor Check
ScreenShot
Created 2024.01.14 13:28 Machine s1_win7_x6401
Filename winserver.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
8
Behavior Score
3.6
ZERO API file : malware
VT API (file) 36 detected (Common, malicious, moderate confidence, score, Generic Dropper, GenericKD, unsafe, Vifj, Attribute, HighConfidence, DropperX, R011C0PLM23, hsbyw, Detected, Casdet, ABRisk, SPAC, Chgt, susgen, PossibleThreat, confidence)
md5 4952f7d5dbfdd54e151d6cd75afcc930
sha256 5027e50a930fe5890e729194116e23a12f3109606346941c6f932008fa1829f2
ssdeep 192:88EkmyjZ8fjTVfFaCZ7AamqnrAgVhl3Q5tfDXU/tr:8Cmy27jZ7AWR3e0r
imphash 07e4d3f8fedafc070f7b31eddac6ba20
impfuzzy 24:52tMK8AfiDYgMyWNwyWPWUDZhyBSJCfocAbD29hJLzABAihTK4Tg+BbQLSQMu5F3:8tMK8aHNg3pQJdH4BMLSQMM
  Network IP location

Signature (6cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
49.235.80.190 CN Shenzhen Tencent Computer Systems Company Limited 49.235.80.190 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140002000 HeapCreate
 0x140002008 HeapAlloc
 0x140002010 RtlLookupFunctionEntry
 0x140002018 RtlVirtualUnwind
 0x140002020 UnhandledExceptionFilter
 0x140002028 SetUnhandledExceptionFilter
 0x140002030 GetCurrentProcess
 0x140002038 TerminateProcess
 0x140002040 IsProcessorFeaturePresent
 0x140002048 QueryPerformanceCounter
 0x140002050 GetModuleHandleW
 0x140002058 IsDebuggerPresent
 0x140002060 InitializeSListHead
 0x140002068 GetSystemTimeAsFileTime
 0x140002070 GetCurrentThreadId
 0x140002078 GetCurrentProcessId
 0x140002080 RtlCaptureContext
USER32.dll
 0x140002090 EnumChildWindows
VCRUNTIME140.dll
 0x1400020a0 __C_specific_handler
 0x1400020a8 __current_exception
 0x1400020b0 __current_exception_context
 0x1400020b8 memset
 0x1400020c0 memcpy
api-ms-win-crt-string-l1-1-0.dll
 0x1400021b0 _strrev
api-ms-win-crt-runtime-l1-1-0.dll
 0x140002100 _initialize_onexit_table
 0x140002108 terminate
 0x140002110 _seh_filter_exe
 0x140002118 _register_onexit_function
 0x140002120 _set_app_type
 0x140002128 _c_exit
 0x140002130 _crt_atexit
 0x140002138 _cexit
 0x140002140 __p___argv
 0x140002148 __p___argc
 0x140002150 _register_thread_local_exe_atexit_callback
 0x140002158 _exit
 0x140002160 exit
 0x140002168 _initterm_e
 0x140002170 _initterm
 0x140002178 _get_initial_narrow_environment
 0x140002180 _initialize_narrow_environment
 0x140002188 _configure_narrow_argv
api-ms-win-crt-math-l1-1-0.dll
 0x1400020f0 __setusermatherr
api-ms-win-crt-stdio-l1-1-0.dll
 0x140002198 __p__commode
 0x1400021a0 _set_fmode
api-ms-win-crt-locale-l1-1-0.dll
 0x1400020e0 _configthreadlocale
api-ms-win-crt-heap-l1-1-0.dll
 0x1400020d0 _set_new_mode

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure