Report - HJC.exe

Emotet Malicious Library UPX PE File DllRegisterServer dll PE32 MZP Format
ScreenShot
Created 2024.04.19 13:12 Machine s1_win7_x6401
Filename HJC.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
4.8
ZERO API file : mailcious
VT API (file) 41 detected (AIDetectMalware, Malicious, score, unsafe, Remcos, Vrn0, confidence, 100%, Zusy, Attribute, HighConfidence, high confidence, ModiLoader, DropperX, CLASSIC, Redcap, pilcq, DownLoader46, MetaStealer, Detected, ai score=83, KillAV, ERW5U9@gen, MEZZ, DelfInject, GdSda, Igent, b17A9L, Static AI, Suspicious PE, susgen)
md5 29af19382bdeadee6d93b98f354e703d
sha256 8a005601e52341e8aff3c95cf30f4ede6b874d2b7e6ffdb9afda9425733fc5d7
ssdeep 49152:3ARQYxxZrm0UZu0LCi2wcc/Z9L7KtQDSxxZrmh7:3Uxu0UQ0LCccaZ9LU7xuh
imphash 3693314404800418c83d1170338a8d27
impfuzzy 192:o13MDbuu0xSUvK9kso1XEpeFLcyG1Q+POQ4:C3m0q9uY1vPOQ4
  Network IP location

Signature (11cnts)

Level Description
danger File has been identified by 41 AntiVirus engines on VirusTotal as malicious
watch Disables proxy possibly for traffic interception
watch Manipulates memory of a non-child process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (7cnts)

Level Name Description Collection
danger Win32_Trojan_Emotet_2_Zero Win32 Trojan Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (upload)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
onedrive.live.com US MICROSOFT-CORP-MSN-AS-BLOCK 13.107.139.11 mailcious
13.107.137.11 US MICROSOFT-CORP-MSN-AS-BLOCK 13.107.137.11 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

oleaut32.dll
 0x52d710 SysFreeString
 0x52d714 SysReAllocStringLen
 0x52d718 SysAllocStringLen
advapi32.dll
 0x52d720 RegQueryValueExA
 0x52d724 RegOpenKeyExA
 0x52d728 RegCloseKey
user32.dll
 0x52d730 GetKeyboardType
 0x52d734 DestroyWindow
 0x52d738 LoadStringA
 0x52d73c MessageBoxA
 0x52d740 CharNextA
kernel32.dll
 0x52d748 GetACP
 0x52d74c Sleep
 0x52d750 VirtualFree
 0x52d754 VirtualAlloc
 0x52d758 GetCurrentThreadId
 0x52d75c InterlockedDecrement
 0x52d760 InterlockedIncrement
 0x52d764 VirtualQuery
 0x52d768 WideCharToMultiByte
 0x52d76c MultiByteToWideChar
 0x52d770 lstrlenA
 0x52d774 lstrcpynA
 0x52d778 LoadLibraryExA
 0x52d77c GetThreadLocale
 0x52d780 GetStartupInfoA
 0x52d784 GetProcAddress
 0x52d788 GetModuleHandleA
 0x52d78c GetModuleFileNameA
 0x52d790 GetLocaleInfoA
 0x52d794 GetCommandLineA
 0x52d798 FreeLibrary
 0x52d79c FindFirstFileA
 0x52d7a0 FindClose
 0x52d7a4 ExitProcess
 0x52d7a8 CompareStringA
 0x52d7ac WriteFile
 0x52d7b0 UnhandledExceptionFilter
 0x52d7b4 RtlUnwind
 0x52d7b8 RaiseException
 0x52d7bc GetStdHandle
kernel32.dll
 0x52d7c4 TlsSetValue
 0x52d7c8 TlsGetValue
 0x52d7cc LocalAlloc
 0x52d7d0 GetModuleHandleA
user32.dll
 0x52d7d8 CreateWindowExA
 0x52d7dc WindowFromPoint
 0x52d7e0 WaitMessage
 0x52d7e4 UpdateWindow
 0x52d7e8 UnregisterClassA
 0x52d7ec UnhookWindowsHookEx
 0x52d7f0 TranslateMessage
 0x52d7f4 TranslateMDISysAccel
 0x52d7f8 TrackPopupMenu
 0x52d7fc SystemParametersInfoA
 0x52d800 ShowWindow
 0x52d804 ShowScrollBar
 0x52d808 ShowOwnedPopups
 0x52d80c SetWindowsHookExA
 0x52d810 SetWindowPos
 0x52d814 SetWindowPlacement
 0x52d818 SetWindowLongW
 0x52d81c SetWindowLongA
 0x52d820 SetTimer
 0x52d824 SetScrollRange
 0x52d828 SetScrollPos
 0x52d82c SetScrollInfo
 0x52d830 SetRect
 0x52d834 SetPropA
 0x52d838 SetParent
 0x52d83c SetMenuItemInfoA
 0x52d840 SetMenu
 0x52d844 SetForegroundWindow
 0x52d848 SetFocus
 0x52d84c SetCursor
 0x52d850 SetClassLongA
 0x52d854 SetCapture
 0x52d858 SetActiveWindow
 0x52d85c SendMessageW
 0x52d860 SendMessageA
 0x52d864 ScrollWindow
 0x52d868 ScreenToClient
 0x52d86c RemovePropA
 0x52d870 RemoveMenu
 0x52d874 ReleaseDC
 0x52d878 ReleaseCapture
 0x52d87c RegisterWindowMessageA
 0x52d880 RegisterClipboardFormatA
 0x52d884 RegisterClassA
 0x52d888 RedrawWindow
 0x52d88c PtInRect
 0x52d890 PostQuitMessage
 0x52d894 PostMessageA
 0x52d898 PeekMessageW
 0x52d89c PeekMessageA
 0x52d8a0 OffsetRect
 0x52d8a4 OemToCharA
 0x52d8a8 MessageBoxA
 0x52d8ac MapWindowPoints
 0x52d8b0 MapVirtualKeyA
 0x52d8b4 LoadStringA
 0x52d8b8 LoadKeyboardLayoutA
 0x52d8bc LoadIconA
 0x52d8c0 LoadCursorA
 0x52d8c4 LoadBitmapA
 0x52d8c8 KillTimer
 0x52d8cc IsZoomed
 0x52d8d0 IsWindowVisible
 0x52d8d4 IsWindowUnicode
 0x52d8d8 IsWindowEnabled
 0x52d8dc IsWindow
 0x52d8e0 IsRectEmpty
 0x52d8e4 IsIconic
 0x52d8e8 IsDialogMessageW
 0x52d8ec IsDialogMessageA
 0x52d8f0 IsChild
 0x52d8f4 InvalidateRect
 0x52d8f8 IntersectRect
 0x52d8fc InsertMenuItemA
 0x52d900 InsertMenuA
 0x52d904 InflateRect
 0x52d908 GetWindowThreadProcessId
 0x52d90c GetWindowTextA
 0x52d910 GetWindowRect
 0x52d914 GetWindowPlacement
 0x52d918 GetWindowLongW
 0x52d91c GetWindowLongA
 0x52d920 GetWindowDC
 0x52d924 GetTopWindow
 0x52d928 GetSystemMetrics
 0x52d92c GetSystemMenu
 0x52d930 GetSysColorBrush
 0x52d934 GetSysColor
 0x52d938 GetSubMenu
 0x52d93c GetScrollRange
 0x52d940 GetScrollPos
 0x52d944 GetScrollInfo
 0x52d948 GetPropA
 0x52d94c GetParent
 0x52d950 GetWindow
 0x52d954 GetMessagePos
 0x52d958 GetMenuStringA
 0x52d95c GetMenuState
 0x52d960 GetMenuItemInfoA
 0x52d964 GetMenuItemID
 0x52d968 GetMenuItemCount
 0x52d96c GetMenu
 0x52d970 GetLastActivePopup
 0x52d974 GetKeyboardState
 0x52d978 GetKeyboardLayoutNameA
 0x52d97c GetKeyboardLayoutList
 0x52d980 GetKeyboardLayout
 0x52d984 GetKeyState
 0x52d988 GetKeyNameTextA
 0x52d98c GetIconInfo
 0x52d990 GetForegroundWindow
 0x52d994 GetFocus
 0x52d998 GetDesktopWindow
 0x52d99c GetDCEx
 0x52d9a0 GetDC
 0x52d9a4 GetCursorPos
 0x52d9a8 GetCursor
 0x52d9ac GetClipboardData
 0x52d9b0 GetClientRect
 0x52d9b4 GetClassLongA
 0x52d9b8 GetClassInfoA
 0x52d9bc GetCapture
 0x52d9c0 GetActiveWindow
 0x52d9c4 FrameRect
 0x52d9c8 FindWindowA
 0x52d9cc FillRect
 0x52d9d0 EqualRect
 0x52d9d4 EnumWindows
 0x52d9d8 EnumThreadWindows
 0x52d9dc EnumChildWindows
 0x52d9e0 EndPaint
 0x52d9e4 EnableWindow
 0x52d9e8 EnableScrollBar
 0x52d9ec EnableMenuItem
 0x52d9f0 DrawTextA
 0x52d9f4 DrawMenuBar
 0x52d9f8 DrawIconEx
 0x52d9fc DrawIcon
 0x52da00 DrawFrameControl
 0x52da04 DrawEdge
 0x52da08 DispatchMessageW
 0x52da0c DispatchMessageA
 0x52da10 DestroyWindow
 0x52da14 DestroyMenu
 0x52da18 DestroyIcon
 0x52da1c DestroyCursor
 0x52da20 DeleteMenu
 0x52da24 DefWindowProcA
 0x52da28 DefMDIChildProcA
 0x52da2c DefFrameProcA
 0x52da30 CreatePopupMenu
 0x52da34 CreateMenu
 0x52da38 CreateIcon
 0x52da3c ClientToScreen
 0x52da40 CheckMenuItem
 0x52da44 CallWindowProcA
 0x52da48 CallNextHookEx
 0x52da4c BeginPaint
 0x52da50 CharNextA
 0x52da54 CharLowerBuffA
 0x52da58 CharLowerA
 0x52da5c CharToOemA
 0x52da60 AdjustWindowRectEx
 0x52da64 ActivateKeyboardLayout
gdi32.dll
 0x52da6c UnrealizeObject
 0x52da70 StretchBlt
 0x52da74 SetWindowOrgEx
 0x52da78 SetWinMetaFileBits
 0x52da7c SetViewportOrgEx
 0x52da80 SetTextColor
 0x52da84 SetStretchBltMode
 0x52da88 SetROP2
 0x52da8c SetPixel
 0x52da90 SetEnhMetaFileBits
 0x52da94 SetDIBColorTable
 0x52da98 SetBrushOrgEx
 0x52da9c SetBkMode
 0x52daa0 SetBkColor
 0x52daa4 SelectPalette
 0x52daa8 SelectObject
 0x52daac SaveDC
 0x52dab0 RestoreDC
 0x52dab4 Rectangle
 0x52dab8 RectVisible
 0x52dabc RealizePalette
 0x52dac0 PlayEnhMetaFile
 0x52dac4 PatBlt
 0x52dac8 MoveToEx
 0x52dacc MaskBlt
 0x52dad0 LineTo
 0x52dad4 IntersectClipRect
 0x52dad8 GetWindowOrgEx
 0x52dadc GetWinMetaFileBits
 0x52dae0 GetTextMetricsA
 0x52dae4 GetTextExtentPoint32A
 0x52dae8 GetSystemPaletteEntries
 0x52daec GetStockObject
 0x52daf0 GetRgnBox
 0x52daf4 GetPixel
 0x52daf8 GetPaletteEntries
 0x52dafc GetObjectA
 0x52db00 GetEnhMetaFilePaletteEntries
 0x52db04 GetEnhMetaFileHeader
 0x52db08 GetEnhMetaFileBits
 0x52db0c GetDeviceCaps
 0x52db10 GetDIBits
 0x52db14 GetDIBColorTable
 0x52db18 GetDCOrgEx
 0x52db1c GetCurrentPositionEx
 0x52db20 GetClipBox
 0x52db24 GetBrushOrgEx
 0x52db28 GetBitmapBits
 0x52db2c ExcludeClipRect
 0x52db30 DeleteObject
 0x52db34 DeleteEnhMetaFile
 0x52db38 DeleteDC
 0x52db3c CreateSolidBrush
 0x52db40 CreatePenIndirect
 0x52db44 CreatePalette
 0x52db48 CreateHalftonePalette
 0x52db4c CreateFontIndirectA
 0x52db50 CreateDIBitmap
 0x52db54 CreateDIBSection
 0x52db58 CreateCompatibleDC
 0x52db5c CreateCompatibleBitmap
 0x52db60 CreateBrushIndirect
 0x52db64 CreateBitmap
 0x52db68 CopyEnhMetaFileA
 0x52db6c BitBlt
version.dll
 0x52db74 VerQueryValueA
 0x52db78 GetFileVersionInfoSizeA
 0x52db7c GetFileVersionInfoA
kernel32.dll
 0x52db84 lstrcpyA
 0x52db88 WriteFile
 0x52db8c WaitForSingleObject
 0x52db90 VirtualQuery
 0x52db94 VirtualAlloc
 0x52db98 SizeofResource
 0x52db9c SetThreadLocale
 0x52dba0 SetFilePointer
 0x52dba4 SetEvent
 0x52dba8 SetErrorMode
 0x52dbac SetEndOfFile
 0x52dbb0 ResetEvent
 0x52dbb4 ReadFile
 0x52dbb8 MulDiv
 0x52dbbc LockResource
 0x52dbc0 LoadResource
 0x52dbc4 LoadLibraryA
 0x52dbc8 LeaveCriticalSection
 0x52dbcc InitializeCriticalSection
 0x52dbd0 GlobalFindAtomA
 0x52dbd4 GlobalDeleteAtom
 0x52dbd8 GlobalAddAtomA
 0x52dbdc GetVersionExA
 0x52dbe0 GetVersion
 0x52dbe4 GetTickCount
 0x52dbe8 GetThreadLocale
 0x52dbec GetStdHandle
 0x52dbf0 GetProcAddress
 0x52dbf4 GetModuleHandleA
 0x52dbf8 GetModuleFileNameA
 0x52dbfc GetLocaleInfoA
 0x52dc00 GetLocalTime
 0x52dc04 GetLastError
 0x52dc08 GetFullPathNameA
 0x52dc0c GetDiskFreeSpaceA
 0x52dc10 GetDateFormatA
 0x52dc14 GetCurrentThreadId
 0x52dc18 GetCurrentProcessId
 0x52dc1c GetCPInfo
 0x52dc20 FreeResource
 0x52dc24 InterlockedExchange
 0x52dc28 FreeLibrary
 0x52dc2c FormatMessageA
 0x52dc30 FindResourceA
 0x52dc34 EnumCalendarInfoA
 0x52dc38 EnterCriticalSection
 0x52dc3c DeleteCriticalSection
 0x52dc40 CreateThread
 0x52dc44 CreateFileA
 0x52dc48 CreateEventA
 0x52dc4c CompareStringA
 0x52dc50 CloseHandle
advapi32.dll
 0x52dc58 RegQueryValueExA
 0x52dc5c RegOpenKeyExA
 0x52dc60 RegFlushKey
 0x52dc64 RegCloseKey
kernel32.dll
 0x52dc6c Sleep
oleaut32.dll
 0x52dc74 SafeArrayPtrOfIndex
 0x52dc78 SafeArrayGetUBound
 0x52dc7c SafeArrayGetLBound
 0x52dc80 SafeArrayCreate
 0x52dc84 VariantChangeType
 0x52dc88 VariantCopy
 0x52dc8c VariantClear
 0x52dc90 VariantInit
comctl32.dll
 0x52dc98 _TrackMouseEvent
 0x52dc9c ImageList_SetIconSize
 0x52dca0 ImageList_GetIconSize
 0x52dca4 ImageList_Write
 0x52dca8 ImageList_Read
 0x52dcac ImageList_DragShowNolock
 0x52dcb0 ImageList_DragMove
 0x52dcb4 ImageList_DragLeave
 0x52dcb8 ImageList_DragEnter
 0x52dcbc ImageList_EndDrag
 0x52dcc0 ImageList_BeginDrag
 0x52dcc4 ImageList_Remove
 0x52dcc8 ImageList_DrawEx
 0x52dccc ImageList_Draw
 0x52dcd0 ImageList_GetBkColor
 0x52dcd4 ImageList_SetBkColor
 0x52dcd8 ImageList_Add
 0x52dcdc ImageList_GetImageCount
 0x52dce0 ImageList_Destroy
 0x52dce4 ImageList_Create
ntdll
 0x52dcec ZwAllocateVirtualMemory

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure