Report - wormr.exe

Malicious Library Downloader UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.04.12 15:09 Machine s1_win7_x6401
Filename wormr.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
0.6
ZERO API file : malware
VT API (file)
md5 c6f9d01d211a535eb819a7bb0057a77a
sha256 3a7926816890498b4b28caeb0017fc5adea97a222c2c63f2e477e3dab269971a
ssdeep 1536:COlCGjrZRlV1eCE6cWzPLoZh4hb0qfWT5M4:DLrV1eCjx0Z2ewWT5r
imphash d450bcae35dd205865d1ae0b90837f42
impfuzzy 24:WjE9yGuGK4ti6i19XDI/D8XJYBLBmunEpZwu42d1wYqAo+B7y7qjJZCV1G3bTXgr:/7P/QXJYtjbyrvV7y7qjJZCTGrTXK+qt
  Network IP location

Signature (2cnts)

Level Description
notice Foreign language identified in PE resource
info The executable uses a known packer

Rules (6cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Network_Downloader File Downloader binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x408044 WaitForSingleObject
 0x408048 WinExec
 0x40804c WriteFile
 0x408050 CreateFileA
 0x408054 LockResource
 0x408058 LoadResource
 0x40805c SizeofResource
 0x408060 FindResourceA
 0x408064 EnumResourceNamesA
 0x408068 EndUpdateResourceA
 0x40806c lstrlenA
 0x408070 UpdateResourceA
 0x408074 GetSystemInfo
 0x408078 GlobalFree
 0x40807c ReadFile
 0x408080 GlobalAlloc
 0x408084 GetFileSize
 0x408088 GetFileAttributesA
 0x40808c lstrcatA
 0x408090 GetLastError
 0x408094 CopyFileA
 0x408098 GetModuleHandleA
 0x40809c GetStartupInfoA
 0x4080a0 GetComputerNameA
 0x4080a4 GetSystemDefaultUILanguage
 0x4080a8 GetModuleFileNameA
 0x4080ac GetTempPathA
 0x4080b0 MoveFileA
 0x4080b4 MoveFileExA
 0x4080b8 CreateThread
 0x4080bc CloseHandle
 0x4080c0 GetCurrentProcessId
 0x4080c4 lstrcpyA
 0x4080c8 GetCurrentProcess
 0x4080cc ExitThread
 0x4080d0 Sleep
 0x4080d4 GetTickCount
 0x4080d8 LoadLibraryA
 0x4080dc BeginUpdateResourceA
 0x4080e0 GetProcAddress
USER32.dll
 0x408188 wsprintfA
ADVAPI32.dll
 0x408000 OpenSCManagerA
 0x408004 LockServiceDatabase
 0x408008 ChangeServiceConfig2A
 0x40800c UnlockServiceDatabase
 0x408010 OpenServiceA
 0x408014 StartServiceA
 0x408018 RegSetValueExA
 0x40801c CloseServiceHandle
 0x408020 StartServiceCtrlDispatcherA
 0x408024 RegisterServiceCtrlHandlerA
 0x408028 SetServiceStatus
 0x40802c RegOpenKeyExA
 0x408030 RegOpenKeyA
 0x408034 RegQueryValueExA
 0x408038 RegCloseKey
 0x40803c CreateServiceA
MSVCRT.dll
 0x4080e8 _initterm
 0x4080ec memcpy
 0x4080f0 ??3@YAXPAX@Z
 0x4080f4 strlen
 0x4080f8 sprintf
 0x4080fc _controlfp
 0x408100 time
 0x408104 rand
 0x408108 srand
 0x40810c memset
 0x408110 fprintf
 0x408114 printf
 0x408118 _except_handler3
 0x40811c _local_unwind2
 0x408120 __CxxFrameHandler
 0x408124 _ftol
 0x408128 strcpy
 0x40812c strcat
 0x408130 strstr
 0x408134 atoi
 0x408138 exit
 0x40813c system
 0x408140 strcmp
 0x408144 strncmp
 0x408148 free
 0x40814c ??2@YAPAXI@Z
 0x408150 _iob
 0x408154 __dllonexit
 0x408158 _onexit
 0x40815c _exit
 0x408160 _XcptFilter
 0x408164 _acmdln
 0x408168 __getmainargs
 0x40816c localtime
 0x408170 __setusermatherr
 0x408174 _adjust_fdiv
 0x408178 __p__commode
 0x40817c __p__fmode
 0x408180 __set_app_type
WS2_32.dll
 0x4081a4 WSACleanup
 0x4081a8 sendto
 0x4081ac htonl
 0x4081b0 setsockopt
 0x4081b4 WSAGetLastError
 0x4081b8 WSASocketA
 0x4081bc socket
 0x4081c0 gethostbyname
 0x4081c4 send
 0x4081c8 recv
 0x4081cc __WSAFDIsSet
 0x4081d0 select
 0x4081d4 htons
 0x4081d8 connect
 0x4081dc closesocket
 0x4081e0 WSAStartup
 0x4081e4 inet_addr
 0x4081e8 WSAIoctl
WININET.dll
 0x408190 InternetOpenA
 0x408194 InternetOpenUrlA
 0x408198 InternetReadFile
 0x40819c InternetCloseHandle
iphlpapi.dll
 0x4081f0 GetIfTable

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure