Report - amaa.exe

Malicious Library Malicious Packer UPX PE File PE32 OS Processor Check PNG Format
ScreenShot
Created 2024.03.28 07:56 Machine s1_win7_x6403
Filename amaa.exe
Type PE32 executable (console) Intel 80386, for MS Windows
AI Score
2
Behavior Score
6.0
ZERO API file : malware
VT API (file) 43 detected (AIDetectMalware, Penguish, malicious, high confidence, score, unsafe, Attribute, HighConfidence, GenKryptik, GURY, Generic@AI, RDML, xy8CjcmF3KH6vP6OApMYbw, lwztf, LUMMASTEALER, YXECZZ, Krypt, Detected, ai score=80, Sabsik, Casdet, ABRisk, NPZW, RnkBend, Gencirc, susgen, confidence)
md5 7077ab5685f753d94192aca8e3158fb5
sha256 751ad0b26586c0dbb06379c8bbb1b7a47e77adc19c3f068d6305f47faec551b2
ssdeep 98304:Xrxkmr7CWoqbb4ngAFGw7WClREnjwaeSkMc88QS+qE0AaG8MlftjxeUZH:XKyzoLgkW4RmKMcJWqE0AaGxftjx/Z
imphash 217688f6edd2d15825eabb179401f94c
impfuzzy 24:avlIOUf6Uvvh9UteS1kLf0D3HuTMhlJ2pl39MsTcCoo3OovbOuH5jMsN5ZHuqu9X:s459UteS1kLpMEppBTcCoT3mf4
  Network IP location

Signature (15cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
watch Attempts to identify installed AV products by installation directory
watch Network communications indicative of possible code injection originated from the process explorer.exe
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (13cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PNG_Format_Zero PNG Format binaries (download)
info 1 dumpmem
info 1 memory
info 1 office
info 1 scripts
info 1 urls
info 94102 shellcode

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://creationofprogress.com/8BvxwQdec3/index.php RU Perviy TSOD LLC 194.116.214.7 clean
creationofprogress.com RU Perviy TSOD LLC 194.116.214.7 clean
194.116.214.7 RU Perviy TSOD LLC 194.116.214.7 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
&emsp


Similarity measure (PE file only) - Checking for service failure