Report - nikon.exe

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.03.31 11:27 Machine s1_win7_x6403
Filename nikon.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
2.6
ZERO API file : malware
VT API (file) 44 detected (AIDetectMalware, Zbot, m5ir, malicious, high confidence, score, Lockbit, unsafe, Save, Fragtor, Attribute, HighConfidence, GenKryptik, GVSW, Artemis, TrojanX, Stealerc, SmokeLoader, CLASSIC, hvbpu, PRIVATELOADER, YXEC4Z, moderate, Detected, ai score=87, RisePro, Amadey, X98OY8, Kryptik, Eldorado, PWSX, R642038, ZexaF, 4q0@aSOhZSR, MachineLearning, Anomalous, Chgt, Static AI, Malicious PE, susgen, HCOV, confidence, 100%)
md5 4673027c92dbac1d082d3b8754a43de1
sha256 ac285068acce8f4243892ccc2130abb931cd664c7c4d6fab7e2fe9b4d7a4a049
ssdeep 24576:r3hIOb0z/dixAzpymW4YYUZ7fSc7u4MXnZZ:r3fgzQAVymxY5Z7ffutX
imphash dfd9e96c2643a560f1d88ff6b08a3ecb
impfuzzy 24:arlckrkIOnFXcTgVakaH1VV4WcHvCDhPgWbKPv9CsZLOtZacrliJ3I+HRyv0T4Q9:arlztyh156tZacrcC0cg/xkSeVo
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 44 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
104.26.4.15 US CLOUDFLARENET 104.26.4.15 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x411000 GetSystemDefaultLangID
 0x411004 DebugActiveProcess
 0x411008 CreateFileA
 0x41100c GetConsoleAliasesLengthW
 0x411010 GetNumaProcessorNode
 0x411014 SetUnhandledExceptionFilter
 0x411018 InterlockedIncrement
 0x41101c HeapFree
 0x411020 SetComputerNameW
 0x411024 ConnectNamedPipe
 0x411028 GetModuleHandleW
 0x41102c ReadConsoleOutputA
 0x411030 GlobalAlloc
 0x411034 GlobalFindAtomA
 0x411038 LoadLibraryW
 0x41103c GetLocaleInfoW
 0x411040 GetConsoleAliasExesLengthW
 0x411044 GetFileAttributesA
 0x411048 HeapCreate
 0x41104c lstrcpynW
 0x411050 GetAtomNameW
 0x411054 GetModuleFileNameW
 0x411058 FindNextVolumeMountPointW
 0x41105c SetConsoleTitleA
 0x411060 WritePrivateProfileStringW
 0x411064 GetLastError
 0x411068 GetThreadLocale
 0x41106c GetProcAddress
 0x411070 SetCalendarInfoW
 0x411074 CreateHardLinkW
 0x411078 SetConsoleDisplayMode
 0x41107c FindAtomA
 0x411080 WaitForMultipleObjects
 0x411084 SetSystemTime
 0x411088 SetConsoleTitleW
 0x41108c HeapSetInformation
 0x411090 VirtualProtect
 0x411094 GetCurrentDirectoryA
 0x411098 DeleteCriticalSection
 0x41109c CreateFileW
 0x4110a0 ReadFile
 0x4110a4 FlushFileBuffers
 0x4110a8 HeapAlloc
 0x4110ac EncodePointer
 0x4110b0 DecodePointer
 0x4110b4 ExitProcess
 0x4110b8 GetCommandLineW
 0x4110bc GetStartupInfoW
 0x4110c0 RaiseException
 0x4110c4 TerminateProcess
 0x4110c8 GetCurrentProcess
 0x4110cc UnhandledExceptionFilter
 0x4110d0 IsDebuggerPresent
 0x4110d4 IsProcessorFeaturePresent
 0x4110d8 WriteFile
 0x4110dc GetStdHandle
 0x4110e0 EnterCriticalSection
 0x4110e4 LeaveCriticalSection
 0x4110e8 Sleep
 0x4110ec HeapSize
 0x4110f0 InitializeCriticalSectionAndSpinCount
 0x4110f4 TlsAlloc
 0x4110f8 TlsGetValue
 0x4110fc TlsSetValue
 0x411100 TlsFree
 0x411104 SetLastError
 0x411108 GetCurrentThreadId
 0x41110c InterlockedDecrement
 0x411110 FreeEnvironmentStringsW
 0x411114 GetEnvironmentStringsW
 0x411118 SetHandleCount
 0x41111c GetFileType
 0x411120 QueryPerformanceCounter
 0x411124 GetTickCount
 0x411128 GetCurrentProcessId
 0x41112c GetSystemTimeAsFileTime
 0x411130 SetFilePointer
 0x411134 WideCharToMultiByte
 0x411138 GetConsoleCP
 0x41113c GetConsoleMode
 0x411140 GetCPInfo
 0x411144 GetACP
 0x411148 GetOEMCP
 0x41114c IsValidCodePage
 0x411150 RtlUnwind
 0x411154 MultiByteToWideChar
 0x411158 HeapReAlloc
 0x41115c SetStdHandle
 0x411160 WriteConsoleW
 0x411164 LCMapStringW
 0x411168 GetStringTypeW
 0x41116c CloseHandle
USER32.dll
 0x411174 GetMonitorInfoW
 0x411178 LoadIconA
 0x41117c CopyRect
WINHTTP.dll
 0x411184 WinHttpCloseHandle
 0x411188 WinHttpAddRequestHeaders

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure