Report - hghjhjghjhgj.exe

Generic Malware Malicious Library UPX PE64 PE File
ScreenShot
Created 2024.04.01 07:52 Machine s1_win7_x6401
Filename hghjhjghjhgj.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
7
Behavior Score
6.2
ZERO API file : malware
VT API (file)
md5 e75338a175f80b85cb99b51580451d37
sha256 1f12f9b84cbc176f6313d69749c69d83ac32b322ce16d4a9a48803a264a8d4dd
ssdeep 6144:66kMYlOIa6VkctankhTl2DGl8HpZRw9wx2UCH:62X8anasZq
imphash cc12e3f394a2cfaeb0c35364d40acf00
impfuzzy 48:3NqpgKfRVuC3tEFK9ZTJ3/KA0WFGKQ/1Wn6gq/gQ0:3wCKfRVuEtEFQZ1UiuabQ0
  Network IP location

Signature (11cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
danger Executed a process and injected code into it
danger Executed a process and injected code into it
watch Communicates with host for which no DNS query was performed
watch Created a process named as a common system process
watch Creates known RBot files
watch Creates or sets a registry key to a long series of bytes
watch Manipulates memory of a non-child process indicative of process injection
watch Stores an executable in the registry
notice One or more potentially interesting buffers were extracted
info Checks amount of memory in system

Rules (11cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info 1 dumpmem
info 1 memory
info 1 office
info 1 scripts
info 1 urls
info 94102 shellcode

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
94.156.8.44 BG NET1 Ltd. 94.156.8.44 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
&emsp


Similarity measure (PE file only) - Checking for service failure