Report - vinu.exe

Malicious Packer Anti_VM PE32 PE File
ScreenShot
Created 2024.01.29 08:00 Machine s1_win7_x6401
Filename vinu.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
5.6
ZERO API file : malware
VT API (file)
md5 b999d160106e9c1cc130e81cb65cb6c1
sha256 2d00cfe8948856043ce000945771608575508d8e30c8dfcaaa3eef6965feb01d
ssdeep 12288:pXSDlAR+M1QZZWPnPYSrWgKNJK/PdBMp0dYrko7YNQELPxez8dFlZqBUgG9y9vQi:UDKR+MmZ40gPIW4dwQHz+8Bv+8W5U
imphash 5ab723dc8d5af21b79dc301ed6a56a64
impfuzzy 12:c2cDvZGqA9AwDXRgKQcOx/0yNCPsKAJSn:clDRdWAwDOdxCTn
  Network IP location

Signature (15cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
watch Uses Sysinternals tools in order to add additional command line functionality
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Looks up the external IP address
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (4cnts)

Level Name Description Collection
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (14cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://www.maxmind.com/geoip/v2.1/city/me US CLOUDFLARENET 104.18.146.235 clean
https://db-ip.com/demo/home.php?s=175.208.134.152 US CLOUDFLARENET 172.67.75.166 clean
ipinfo.io US GOOGLE 34.117.186.192 clean
db-ip.com US CLOUDFLARENET 172.67.75.166 clean
www.maxmind.com US CLOUDFLARENET 104.18.145.235 clean
172.67.75.166 US CLOUDFLARENET 172.67.75.166 clean
104.18.146.235 US CLOUDFLARENET 104.18.146.235 clean
185.172.128.19 RU OOO Nadym Svyaz Service 185.172.128.19 mailcious
34.117.186.192 US GOOGLE 34.117.186.192 clean
185.215.113.68 Unknown 185.215.113.68 malware
193.233.132.62 RU JSC Redcom-lnternet 193.233.132.62 mailcious
154.92.15.189 HK HK Kwaifong Group Limited 154.92.15.189 mailcious
109.107.182.3 RU Teleport-TV Ltd 109.107.182.3 mailcious
125.253.92.50 AU FireNet Pty Ltd 125.253.92.50 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0x84213c VirtualAlloc
 0x842140 VirtualFree
 0x842144 GetModuleHandleA
 0x842148 GetProcAddress
 0x84214c ExitProcess
 0x842150 LoadLibraryA
user32.dll
 0x842158 MessageBoxA
advapi32.dll
 0x842160 RegCloseKey
oleaut32.dll
 0x842168 SysFreeString
gdi32.dll
 0x842170 CreateFontA
shell32.dll
 0x842178 ShellExecuteA
version.dll
 0x842180 GetFileVersionInfoA
ole32.dll
 0x842188 CoInitializeEx
ws2_32.dll
 0x842190 WSAStartup
crypt32.dll
 0x842198 CryptUnprotectData
shlwapi.dll
 0x8421a0 PathFindExtensionA
gdiplus.dll
 0x8421a8 GdiplusStartup
setupapi.dll
 0x8421b0 SetupDiEnumDeviceInterfaces
ntdll.dll
 0x8421b8 RtlUnicodeStringToAnsiString

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure