Report - js.exe

Generic Malware Malicious Library UPX PE File DllRegisterServer dll PE32 OS Processor Check
ScreenShot
Created 2024.04.19 13:12 Machine s1_win7_x6403
Filename js.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
7.6
ZERO API file : mailcious
VT API (file) 47 detected (AIDetectMalware, Malicious, score, GenericRXEP, unsafe, Save, Attribute, HighConfidence, high confidence, FlyStudio, Xkcp, DownLoader46, moderate, Detected, ai score=86, RA@1qraug, Emotet, 10ODIJ9, Eldorado, ZexaF, Uq2@aynP2Llb, Chgt, R002H06DI24, GenAsa, kHMPwob5fm4, Static AI, Malicious PE, susgen, FlyApplication)
md5 269a3d770289d6442ad0b01e03276a10
sha256 1b0a15ce9c6a24c1d420956e45110f25170fd2bb8c2fe1269f36aa43c40b59aa
ssdeep 12288:K4AzttgbhCMCtTSb1uuH8fu2l6heoBPQED6lsKnsXLW:K7jgbhjCxShjHqLl6ZPmsKsXS
imphash 4ed9366b5a0bbd2ec353460afdd55ba6
impfuzzy 192:TwUyC0tCKD9wUqT0At4zSccRcQc3A1hPVlh:wCSyToE7Zh
  Network IP location

Signature (18cnts)

Level Description
danger File has been identified by 47 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs an hook procedure to monitor for mouse events
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Foreign language identified in PE resource
notice Moves the original executable to a new location
notice One or more potentially interesting buffers were extracted
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
info Checks amount of memory in system
info Queries for the computername
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (14cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (download)
info DllRegisterServer_Zero execute regsvr32.exe binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://192.227.146.252:2025/%6f%75%74%70%75%74_86%2e%62%69%6e US AS-COLOCROSSING 192.227.146.252 clean
192.227.146.252 US AS-COLOCROSSING 192.227.146.252 clean

Suricata ids

PE API

IAT(Import Address Table) Library

RASAPI32.dll
 0x47f380 RasHangUpA
 0x47f384 RasGetConnectStatusA
KERNEL32.dll
 0x47f170 SetEndOfFile
 0x47f174 UnlockFile
 0x47f178 LockFile
 0x47f17c FlushFileBuffers
 0x47f180 SetFilePointer
 0x47f184 GetCurrentProcess
 0x47f188 SetLastError
 0x47f18c GetTimeZoneInformation
 0x47f190 FileTimeToSystemTime
 0x47f194 CreateSemaphoreA
 0x47f198 ResumeThread
 0x47f19c ReleaseSemaphore
 0x47f1a0 EnterCriticalSection
 0x47f1a4 LeaveCriticalSection
 0x47f1a8 GetProfileStringA
 0x47f1ac WriteFile
 0x47f1b0 WaitForMultipleObjects
 0x47f1b4 CreateFileA
 0x47f1b8 SetEvent
 0x47f1bc FindResourceA
 0x47f1c0 LoadResource
 0x47f1c4 IsBadCodePtr
 0x47f1c8 IsBadReadPtr
 0x47f1cc CompareStringW
 0x47f1d0 CompareStringA
 0x47f1d4 SetUnhandledExceptionFilter
 0x47f1d8 GetStringTypeW
 0x47f1dc GetStringTypeA
 0x47f1e0 InterlockedIncrement
 0x47f1e4 VirtualAlloc
 0x47f1e8 LCMapStringW
 0x47f1ec LCMapStringA
 0x47f1f0 SetEnvironmentVariableA
 0x47f1f4 VirtualFree
 0x47f1f8 HeapCreate
 0x47f1fc HeapDestroy
 0x47f200 GetEnvironmentVariableA
 0x47f204 GetStdHandle
 0x47f208 SetHandleCount
 0x47f20c GetEnvironmentStringsW
 0x47f210 GetEnvironmentStrings
 0x47f214 FreeEnvironmentStringsW
 0x47f218 FreeEnvironmentStringsA
 0x47f21c UnhandledExceptionFilter
 0x47f220 GetFileType
 0x47f224 SetStdHandle
 0x47f228 GetACP
 0x47f22c HeapSize
 0x47f230 TerminateProcess
 0x47f234 GetLocalTime
 0x47f238 GetSystemTime
 0x47f23c RaiseException
 0x47f240 LockResource
 0x47f244 ReadFile
 0x47f248 GetModuleFileNameA
 0x47f24c GetCurrentThreadId
 0x47f250 ExitProcess
 0x47f254 GlobalSize
 0x47f258 GlobalFree
 0x47f25c DeleteCriticalSection
 0x47f260 InitializeCriticalSection
 0x47f264 lstrcatA
 0x47f268 lstrlenA
 0x47f26c WinExec
 0x47f270 lstrcpyA
 0x47f274 FindNextFileA
 0x47f278 GlobalReAlloc
 0x47f27c HeapFree
 0x47f280 HeapReAlloc
 0x47f284 GetProcessHeap
 0x47f288 HeapAlloc
 0x47f28c MultiByteToWideChar
 0x47f290 WideCharToMultiByte
 0x47f294 GetFullPathNameA
 0x47f298 FreeLibrary
 0x47f29c LoadLibraryA
 0x47f2a0 GetLastError
 0x47f2a4 GetVersionExA
 0x47f2a8 WritePrivateProfileStringA
 0x47f2ac CreateThread
 0x47f2b0 CreateEventA
 0x47f2b4 Sleep
 0x47f2b8 GlobalAlloc
 0x47f2bc GlobalLock
 0x47f2c0 GlobalUnlock
 0x47f2c4 FindFirstFileA
 0x47f2c8 FindClose
 0x47f2cc GetFileAttributesA
 0x47f2d0 SetCurrentDirectoryA
 0x47f2d4 GetVolumeInformationA
 0x47f2d8 GetModuleHandleA
 0x47f2dc GetProcAddress
 0x47f2e0 MulDiv
 0x47f2e4 GetCommandLineA
 0x47f2e8 GetTickCount
 0x47f2ec RtlUnwind
 0x47f2f0 GetStartupInfoA
 0x47f2f4 GetOEMCP
 0x47f2f8 GetCPInfo
 0x47f2fc GetProcessVersion
 0x47f300 SetErrorMode
 0x47f304 GlobalFlags
 0x47f308 GetCurrentThread
 0x47f30c GetFileTime
 0x47f310 GetFileSize
 0x47f314 TlsGetValue
 0x47f318 LocalReAlloc
 0x47f31c TlsSetValue
 0x47f320 TlsFree
 0x47f324 GlobalHandle
 0x47f328 TlsAlloc
 0x47f32c LocalAlloc
 0x47f330 lstrcmpA
 0x47f334 GetVersion
 0x47f338 WaitForSingleObject
 0x47f33c CloseHandle
 0x47f340 DuplicateHandle
 0x47f344 lstrcpynA
 0x47f348 FileTimeToLocalFileTime
 0x47f34c LocalFree
 0x47f350 InterlockedDecrement
 0x47f354 IsBadWritePtr
 0x47f358 GlobalGetAtomNameA
 0x47f35c GlobalAddAtomA
 0x47f360 GlobalFindAtomA
 0x47f364 GlobalDeleteAtom
 0x47f368 lstrcmpiA
USER32.dll
 0x47f398 OpenClipboard
 0x47f39c SetClipboardData
 0x47f3a0 EmptyClipboard
 0x47f3a4 GetSystemMetrics
 0x47f3a8 GetCursorPos
 0x47f3ac MessageBoxA
 0x47f3b0 SetWindowPos
 0x47f3b4 SendMessageA
 0x47f3b8 DestroyCursor
 0x47f3bc SetParent
 0x47f3c0 IsWindow
 0x47f3c4 PostMessageA
 0x47f3c8 GetTopWindow
 0x47f3cc GetParent
 0x47f3d0 GetClipboardData
 0x47f3d4 CloseClipboard
 0x47f3d8 GetFocus
 0x47f3dc GetClientRect
 0x47f3e0 InvalidateRect
 0x47f3e4 ValidateRect
 0x47f3e8 UpdateWindow
 0x47f3ec EqualRect
 0x47f3f0 GetWindowRect
 0x47f3f4 SetForegroundWindow
 0x47f3f8 DestroyMenu
 0x47f3fc IsChild
 0x47f400 ReleaseDC
 0x47f404 IsRectEmpty
 0x47f408 wsprintfA
 0x47f40c GetDC
 0x47f410 SetCursor
 0x47f414 LoadCursorA
 0x47f418 SetCursorPos
 0x47f41c SetActiveWindow
 0x47f420 GetSysColor
 0x47f424 SetWindowLongA
 0x47f428 GetWindowLongA
 0x47f42c RedrawWindow
 0x47f430 EnableWindow
 0x47f434 IsWindowVisible
 0x47f438 OffsetRect
 0x47f43c PtInRect
 0x47f440 DestroyIcon
 0x47f444 IntersectRect
 0x47f448 InflateRect
 0x47f44c SetRect
 0x47f450 SetScrollPos
 0x47f454 SetScrollRange
 0x47f458 GetScrollRange
 0x47f45c SetCapture
 0x47f460 GetCapture
 0x47f464 ReleaseCapture
 0x47f468 SetTimer
 0x47f46c KillTimer
 0x47f470 WinHelpA
 0x47f474 LoadBitmapA
 0x47f478 CopyRect
 0x47f47c ChildWindowFromPointEx
 0x47f480 ScreenToClient
 0x47f484 GetMessagePos
 0x47f488 SetWindowRgn
 0x47f48c DestroyAcceleratorTable
 0x47f490 GetWindow
 0x47f494 GetActiveWindow
 0x47f498 SetFocus
 0x47f49c FillRect
 0x47f4a0 GrayStringA
 0x47f4a4 IsIconic
 0x47f4a8 GetSysColorBrush
 0x47f4ac LoadStringA
 0x47f4b0 GetDesktopWindow
 0x47f4b4 GetClassNameA
 0x47f4b8 GetMenuCheckMarkDimensions
 0x47f4bc GetMenuState
 0x47f4c0 SetMenuItemBitmaps
 0x47f4c4 CheckMenuItem
 0x47f4c8 MoveWindow
 0x47f4cc IsDialogMessageA
 0x47f4d0 ScrollWindowEx
 0x47f4d4 SendDlgItemMessageA
 0x47f4d8 MapWindowPoints
 0x47f4dc AdjustWindowRectEx
 0x47f4e0 SetWindowTextA
 0x47f4e4 LoadIconA
 0x47f4e8 TranslateMessage
 0x47f4ec DrawFrameControl
 0x47f4f0 DrawEdge
 0x47f4f4 DrawFocusRect
 0x47f4f8 WindowFromPoint
 0x47f4fc GetMessageA
 0x47f500 DispatchMessageA
 0x47f504 SetRectEmpty
 0x47f508 RegisterClipboardFormatA
 0x47f50c CreateIconFromResourceEx
 0x47f510 CreateIconFromResource
 0x47f514 DrawIconEx
 0x47f518 CreatePopupMenu
 0x47f51c AppendMenuA
 0x47f520 ModifyMenuA
 0x47f524 CreateMenu
 0x47f528 CreateAcceleratorTableA
 0x47f52c GetDlgCtrlID
 0x47f530 GetSubMenu
 0x47f534 EnableMenuItem
 0x47f538 ClientToScreen
 0x47f53c EnumDisplaySettingsA
 0x47f540 LoadImageA
 0x47f544 SystemParametersInfoA
 0x47f548 ShowWindow
 0x47f54c IsWindowEnabled
 0x47f550 TranslateAcceleratorA
 0x47f554 GetKeyState
 0x47f558 CopyAcceleratorTableA
 0x47f55c PostQuitMessage
 0x47f560 IsZoomed
 0x47f564 GetClassInfoA
 0x47f568 DefWindowProcA
 0x47f56c GetMenu
 0x47f570 SetMenu
 0x47f574 PeekMessageA
 0x47f578 GetWindowTextA
 0x47f57c GetWindowTextLengthA
 0x47f580 CharUpperA
 0x47f584 GetWindowDC
 0x47f588 BeginPaint
 0x47f58c EndPaint
 0x47f590 TabbedTextOutA
 0x47f594 DrawTextA
 0x47f598 UnregisterClassA
 0x47f59c GetDlgItem
 0x47f5a0 DestroyWindow
 0x47f5a4 CreateDialogIndirectParamA
 0x47f5a8 EndDialog
 0x47f5ac GetNextDlgTabItem
 0x47f5b0 GetWindowPlacement
 0x47f5b4 RegisterWindowMessageA
 0x47f5b8 GetForegroundWindow
 0x47f5bc GetLastActivePopup
 0x47f5c0 GetMessageTime
 0x47f5c4 RemovePropA
 0x47f5c8 CallWindowProcA
 0x47f5cc GetPropA
 0x47f5d0 UnhookWindowsHookEx
 0x47f5d4 SetPropA
 0x47f5d8 GetClassLongA
 0x47f5dc CallNextHookEx
 0x47f5e0 SetWindowsHookExA
 0x47f5e4 CreateWindowExA
 0x47f5e8 GetMenuItemID
 0x47f5ec GetMenuItemCount
 0x47f5f0 RegisterClassA
 0x47f5f4 GetScrollPos
GDI32.dll
 0x47f024 SelectPalette
 0x47f028 RealizePalette
 0x47f02c GetDIBits
 0x47f030 GetWindowExtEx
 0x47f034 GetViewportOrgEx
 0x47f038 GetWindowOrgEx
 0x47f03c BeginPath
 0x47f040 EndPath
 0x47f044 PathToRegion
 0x47f048 CreateEllipticRgn
 0x47f04c CreateRoundRectRgn
 0x47f050 GetTextColor
 0x47f054 GetBkMode
 0x47f058 GetBkColor
 0x47f05c GetROP2
 0x47f060 GetStretchBltMode
 0x47f064 GetPolyFillMode
 0x47f068 CreateCompatibleBitmap
 0x47f06c CreateDCA
 0x47f070 CreateBitmap
 0x47f074 SelectObject
 0x47f078 GetObjectA
 0x47f07c CreatePen
 0x47f080 PatBlt
 0x47f084 CombineRgn
 0x47f088 CreateRectRgn
 0x47f08c FillRgn
 0x47f090 CreateSolidBrush
 0x47f094 GetStockObject
 0x47f098 CreateFontIndirectA
 0x47f09c EndPage
 0x47f0a0 EndDoc
 0x47f0a4 DeleteDC
 0x47f0a8 StartDocA
 0x47f0ac StartPage
 0x47f0b0 BitBlt
 0x47f0b4 CreateRectRgnIndirect
 0x47f0b8 StretchBlt
 0x47f0bc Rectangle
 0x47f0c0 LPtoDP
 0x47f0c4 DPtoLP
 0x47f0c8 GetCurrentObject
 0x47f0cc RoundRect
 0x47f0d0 GetTextExtentPoint32A
 0x47f0d4 GetDeviceCaps
 0x47f0d8 SaveDC
 0x47f0dc RestoreDC
 0x47f0e0 SetBkMode
 0x47f0e4 SetPolyFillMode
 0x47f0e8 SetROP2
 0x47f0ec SetTextColor
 0x47f0f0 SetMapMode
 0x47f0f4 SetViewportOrgEx
 0x47f0f8 OffsetViewportOrgEx
 0x47f0fc SetViewportExtEx
 0x47f100 ScaleViewportExtEx
 0x47f104 SetWindowOrgEx
 0x47f108 SetWindowExtEx
 0x47f10c ScaleWindowExtEx
 0x47f110 GetClipBox
 0x47f114 ExcludeClipRect
 0x47f118 MoveToEx
 0x47f11c LineTo
 0x47f120 CreatePalette
 0x47f124 GetSystemPaletteEntries
 0x47f128 CreateDIBitmap
 0x47f12c DeleteObject
 0x47f130 SelectClipRgn
 0x47f134 CreatePolygonRgn
 0x47f138 GetClipRgn
 0x47f13c SetStretchBltMode
 0x47f140 Ellipse
 0x47f144 ExtSelectClipRgn
 0x47f148 SetBkColor
 0x47f14c CreateCompatibleDC
 0x47f150 GetTextMetricsA
 0x47f154 Escape
 0x47f158 ExtTextOutA
 0x47f15c TextOutA
 0x47f160 RectVisible
 0x47f164 PtVisible
 0x47f168 GetViewportExtEx
WINMM.dll
 0x47f628 waveOutUnprepareHeader
 0x47f62c waveOutPrepareHeader
 0x47f630 waveOutWrite
 0x47f634 midiStreamRestart
 0x47f638 waveOutPause
 0x47f63c waveOutReset
 0x47f640 waveOutClose
 0x47f644 waveOutGetNumDevs
 0x47f648 waveOutOpen
 0x47f64c midiOutUnprepareHeader
 0x47f650 midiStreamOpen
 0x47f654 midiStreamProperty
 0x47f658 midiOutPrepareHeader
 0x47f65c midiStreamOut
 0x47f660 midiStreamStop
 0x47f664 midiOutReset
 0x47f668 midiStreamClose
WINSPOOL.DRV
 0x47f670 OpenPrinterA
 0x47f674 ClosePrinter
 0x47f678 DocumentPropertiesA
ADVAPI32.dll
 0x47f000 RegQueryValueA
 0x47f004 RegSetValueExA
 0x47f008 RegOpenKeyExA
 0x47f00c RegCloseKey
 0x47f010 RegCreateKeyExA
SHELL32.dll
 0x47f38c ShellExecuteA
 0x47f390 Shell_NotifyIconA
ole32.dll
 0x47f6c8 CLSIDFromString
 0x47f6cc OleUninitialize
 0x47f6d0 OleInitialize
OLEAUT32.dll
 0x47f370 RegisterTypeLib
 0x47f374 LoadTypeLib
 0x47f378 UnRegisterTypeLib
COMCTL32.dll
 0x47f018 None
 0x47f01c ImageList_Destroy
WS2_32.dll
 0x47f680 recvfrom
 0x47f684 ioctlsocket
 0x47f688 inet_ntoa
 0x47f68c recv
 0x47f690 getpeername
 0x47f694 accept
 0x47f698 WSAStartup
 0x47f69c WSACleanup
 0x47f6a0 select
 0x47f6a4 send
 0x47f6a8 closesocket
 0x47f6ac WSAAsyncSelect
WININET.dll
 0x47f5fc InternetCanonicalizeUrlA
 0x47f600 InternetCrackUrlA
 0x47f604 HttpOpenRequestA
 0x47f608 InternetOpenA
 0x47f60c InternetCloseHandle
 0x47f610 InternetSetOptionA
 0x47f614 InternetConnectA
 0x47f618 InternetReadFile
 0x47f61c HttpQueryInfoA
 0x47f620 HttpSendRequestA
comdlg32.dll
 0x47f6b4 ChooseColorA
 0x47f6b8 GetSaveFileNameA
 0x47f6bc GetOpenFileNameA
 0x47f6c0 GetFileTitleA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure