Report - hghghgfhgfh.EXE

Generic Malware Malicious Library UPX PE64 PE File
ScreenShot
Created 2024.04.01 07:52 Machine s1_win7_x6403
Filename hghghgfhgfh.EXE
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
7
Behavior Score
4.8
ZERO API file : malware
VT API (file)
md5 93b2a56dbc2bb2a4ee1b4c6f2873b50b
sha256 875a2f8b2193bd50ea6c835859aaa348f0168cd10235b632d7dd95913b6ffba7
ssdeep 6144:66kMYlOIa6VkctankhTl2DGl8HjZRw9w0UUCH:62X8anauZqd
imphash cc12e3f394a2cfaeb0c35364d40acf00
impfuzzy 48:3NqpgKfRVuC3tEFK9ZTJ3/KA0WFGKQ/1Wn6gq/gQ0:3wCKfRVuEtEFQZ1UiuabQ0
  Network IP location

Signature (8cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch Created a process named as a common system process
watch Creates or sets a registry key to a long series of bytes
watch Manipulates memory of a non-child process indicative of process injection
watch Stores an executable in the registry
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
94.156.8.44 BG NET1 Ltd. 94.156.8.44 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140036000 WaitForSingleObject
 0x140036008 GetWindowsDirectoryW
 0x140036010 GetTempPathW
 0x140036018 OpenEventW
 0x140036020 LoadLibraryW
 0x140036028 TerminateProcess
 0x140036030 ExitProcess
 0x140036038 lstrcpyW
 0x140036040 lstrlenW
 0x140036048 GetCurrentProcess
 0x140036050 GetSystemDirectoryW
 0x140036058 GetModuleFileNameW
 0x140036060 LocalFree
 0x140036068 CreateProcessW
 0x140036070 LocalAlloc
 0x140036078 lstrcmpiW
 0x140036080 lstrcpyA
 0x140036088 CloseHandle
 0x140036090 GetLastError
 0x140036098 GetProcAddress
 0x1400360a0 GetModuleHandleW
 0x1400360a8 lstrlenA
 0x1400360b0 FileTimeToSystemTime
 0x1400360b8 CreateThread
 0x1400360c0 lstrcmpA
 0x1400360c8 SetEvent
 0x1400360d0 WaitForMultipleObjects
 0x1400360d8 CreateMutexW
 0x1400360e0 OpenMutexW
 0x1400360e8 GetModuleHandleA
 0x1400360f0 VirtualProtect
 0x1400360f8 VirtualAlloc
 0x140036100 VirtualFree
 0x140036108 LoadLibraryA
 0x140036110 ReadFile
 0x140036118 GetFileSize
 0x140036120 CreateFileW
 0x140036128 CreateEventW
 0x140036130 GetTickCount64
 0x140036138 GetCurrentProcessId
 0x140036140 ReleaseMutex
 0x140036148 Sleep
 0x140036150 HeapReAlloc
 0x140036158 WriteConsoleW
 0x140036160 SetStdHandle
 0x140036168 LCMapStringW
 0x140036170 GetStringTypeW
 0x140036178 HeapSize
 0x140036180 MultiByteToWideChar
 0x140036188 LeaveCriticalSection
 0x140036190 EnterCriticalSection
 0x140036198 GetConsoleMode
 0x1400361a0 GetConsoleCP
 0x1400361a8 SetFilePointer
 0x1400361b0 GetSystemTimeAsFileTime
 0x1400361b8 GetTickCount
 0x1400361c0 FlushFileBuffers
 0x1400361c8 RtlLookupFunctionEntry
 0x1400361d0 RtlUnwindEx
 0x1400361d8 RaiseException
 0x1400361e0 RtlPcToFileHeader
 0x1400361e8 GetCommandLineA
 0x1400361f0 GetStartupInfoW
 0x1400361f8 DecodePointer
 0x140036200 UnhandledExceptionFilter
 0x140036208 SetUnhandledExceptionFilter
 0x140036210 IsDebuggerPresent
 0x140036218 RtlVirtualUnwind
 0x140036220 RtlCaptureContext
 0x140036228 EncodePointer
 0x140036230 FlsGetValue
 0x140036238 FlsSetValue
 0x140036240 FlsFree
 0x140036248 SetLastError
 0x140036250 GetCurrentThreadId
 0x140036258 FlsAlloc
 0x140036260 HeapFree
 0x140036268 HeapAlloc
 0x140036270 GetCPInfo
 0x140036278 GetACP
 0x140036280 GetOEMCP
 0x140036288 IsValidCodePage
 0x140036290 WriteFile
 0x140036298 GetStdHandle
 0x1400362a0 GetModuleFileNameA
 0x1400362a8 FreeEnvironmentStringsW
 0x1400362b0 WideCharToMultiByte
 0x1400362b8 GetEnvironmentStringsW
 0x1400362c0 SetHandleCount
 0x1400362c8 InitializeCriticalSectionAndSpinCount
 0x1400362d0 GetFileType
 0x1400362d8 DeleteCriticalSection
 0x1400362e0 HeapSetInformation
 0x1400362e8 GetVersion
 0x1400362f0 HeapCreate
 0x1400362f8 QueryPerformanceCounter
USER32.dll
 0x140036330 DispatchMessageW
 0x140036338 wsprintfW
 0x140036340 DefWindowProcW
 0x140036348 RegisterClassW
 0x140036350 GetMessageW
 0x140036358 TranslateMessage
 0x140036360 wsprintfA
 0x140036368 DestroyWindow
 0x140036370 UnregisterClassW
 0x140036378 PostMessageW
 0x140036380 CreateWindowExW
ole32.dll
 0x140036390 CoCreateInstance
OLEAUT32.dll
 0x140036308 VariantClear
 0x140036310 VariantInit
 0x140036318 SysFreeString
 0x140036320 SysAllocString

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure