Report - Windows.exe

Ave Maria WARZONE RAT Generic Malware Malicious Library Downloader Malicious Packer UPX Antivirus PE File PE32 OS Processor Check
ScreenShot
Created 2024.05.16 07:36 Machine s1_win7_x6403
Filename Windows.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
9.8
ZERO API file : mailcious
VT API (file) 66 detected (VinaPhuonterOD, AveMaria, Windows, Threat, Malicious, score, Agentb, unsafe, Mint, Zard, Save, GenericKD, Genus, Warzone, FDNF, jiad, Remcos, AntiAV, fljpfv, CLASSIC, Redcap, ghjpt, Maria, MOCRT, high, Detected, ai score=87, WarzoneRAT, Malware@#3idmbkggge6ot, INDT, R263895, ZexaF, iyW@aiQHI7li, Genetic, Gencirc, GenAsa, ++8lN4UW0KE, Static AI, Malicious PE, susgen)
md5 b3390afd5206f8b49b32382041b80c2b
sha256 a6c7f1f1e73b612bf2c34e4b6193dd41f75ec0298c694e3600756a79da348152
ssdeep 3072:K7W9jps0Tx4azG6GweOTir5axbjNCz45LT7a:KwpsERzGKurEXCzeLT7a
imphash 56fc94e02d7bc310030753938e49a91a
impfuzzy 96:Ai88luyscd95l+/IHeMCDr5pKyBmAKncGKCoh5mCp6wvfC:AFyJ00eMCDr5pXnRRtfC
  Network IP location

Signature (21cnts)

Level Description
danger File has been identified by 66 AntiVirus engines on VirusTotal as malicious
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Allocates execute permission to another process indicative of possible code injection
watch Attempts to remove evidence of file being downloaded from the Internet
watch Communicates with host for which no DNS query was performed
watch Creates an Alternate Data Stream (ADS)
watch Installs itself for autorun at Windows startup
watch Potential code injection by writing to the memory of another process
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Foreign language identified in PE resource
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info The file contains an unknown PE resource name possibly indicative of a packer
info Uses Windows APIs to generate a cryptographic key

Rules (11cnts)

Level Name Description Collection
danger Ave_Maria_Zero Remote Access Trojan that is also called WARZONE RAT binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch Network_Downloader File Downloader binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
45.138.16.138 NL SpectraIP B.V. 45.138.16.138 clean

Suricata ids

PE API

IAT(Import Address Table) Library

webservices.dll
 0x419370 WsFileTimeToDateTime
crypt.dll
 0x41933c BCryptSetProperty
 0x419340 BCryptGenerateSymmetricKey
 0x419344 BCryptOpenAlgorithmProvider
 0x419348 BCryptDecrypt
KERNEL32.dll
 0x41908c lstrcpyW
 0x419090 GetTickCount
 0x419094 HeapAlloc
 0x419098 GetProcessHeap
 0x41909c GetCommandLineA
 0x4190a0 GetStartupInfoA
 0x4190a4 HeapFree
 0x4190a8 VirtualAlloc
 0x4190ac HeapReAlloc
 0x4190b0 VirtualQuery
 0x4190b4 LocalAlloc
 0x4190b8 LocalFree
 0x4190bc SystemTimeToFileTime
 0x4190c0 TerminateThread
 0x4190c4 CreateThread
 0x4190c8 WriteProcessMemory
 0x4190cc GetCurrentProcess
 0x4190d0 OpenProcess
 0x4190d4 GetWindowsDirectoryA
 0x4190d8 VirtualProtectEx
 0x4190dc VirtualAllocEx
 0x4190e0 CreateRemoteThread
 0x4190e4 GetModuleHandleW
 0x4190e8 IsWow64Process
 0x4190ec WriteFile
 0x4190f0 CreateFileW
 0x4190f4 LoadLibraryW
 0x4190f8 GetLocalTime
 0x4190fc GetCurrentThreadId
 0x419100 GetCurrentProcessId
 0x419104 ReadFile
 0x419108 FindFirstFileA
 0x41910c GetBinaryTypeW
 0x419110 FindNextFileA
 0x419114 GetFullPathNameA
 0x419118 CreateFileA
 0x41911c GlobalAlloc
 0x419120 GetCurrentDirectoryW
 0x419124 lstrcmpA
 0x419128 GetFileSize
 0x41912c FreeLibrary
 0x419130 SetDllDirectoryW
 0x419134 GetFileSizeEx
 0x419138 WaitForSingleObject
 0x41913c WaitForMultipleObjects
 0x419140 CreatePipe
 0x419144 PeekNamedPipe
 0x419148 DuplicateHandle
 0x41914c SetEvent
 0x419150 CreateProcessW
 0x419154 CreateEventA
 0x419158 GetModuleFileNameW
 0x41915c WideCharToMultiByte
 0x419160 LoadResource
 0x419164 FindResourceW
 0x419168 GetComputerNameW
 0x41916c GlobalMemoryStatusEx
 0x419170 LoadLibraryExW
 0x419174 FindFirstFileW
 0x419178 FindNextFileW
 0x41917c SetFilePointer
 0x419180 GetLogicalDriveStringsW
 0x419184 CopyFileW
 0x419188 GetDriveTypeW
 0x41918c EnterCriticalSection
 0x419190 LeaveCriticalSection
 0x419194 lstrlenA
 0x419198 DeleteCriticalSection
 0x41919c CreateMutexA
 0x4191a0 ReleaseMutex
 0x4191a4 TerminateProcess
 0x4191a8 K32GetModuleFileNameExW
 0x4191ac CreateToolhelp32Snapshot
 0x4191b0 Process32NextW
 0x4191b4 Process32FirstW
 0x4191b8 DeleteFileW
 0x4191bc SizeofResource
 0x4191c0 VirtualProtect
 0x4191c4 GetSystemDirectoryW
 0x4191c8 LockResource
 0x4191cc GetWindowsDirectoryW
 0x4191d0 Process32First
 0x4191d4 Process32Next
 0x4191d8 GetTempPathA
 0x4191dc ExpandEnvironmentStringsW
 0x4191e0 lstrlenW
 0x4191e4 lstrcmpW
 0x4191e8 CreateProcessA
 0x4191ec WinExec
 0x4191f0 ExitProcess
 0x4191f4 GetProcAddress
 0x4191f8 lstrcpyA
 0x4191fc CloseHandle
 0x419200 lstrcatW
 0x419204 LoadLibraryA
 0x419208 GetLastError
 0x41920c GetPrivateProfileStringW
 0x419210 GetModuleHandleA
 0x419214 GetTempPathW
 0x419218 VirtualFree
 0x41921c SetLastError
 0x419220 Sleep
 0x419224 GetModuleFileNameA
 0x419228 CreateDirectoryW
 0x41922c MultiByteToWideChar
 0x419230 lstrcatA
 0x419234 SetCurrentDirectoryW
 0x419238 InitializeCriticalSection
USER32.dll
 0x419298 GetKeyState
 0x41929c GetMessageA
 0x4192a0 DispatchMessageA
 0x4192a4 CreateWindowExW
 0x4192a8 CallNextHookEx
 0x4192ac GetAsyncKeyState
 0x4192b0 RegisterClassW
 0x4192b4 GetRawInputData
 0x4192b8 MapVirtualKeyA
 0x4192bc DefWindowProcA
 0x4192c0 RegisterRawInputDevices
 0x4192c4 TranslateMessage
 0x4192c8 ToUnicode
 0x4192cc wsprintfW
 0x4192d0 PostQuitMessage
 0x4192d4 GetLastInputInfo
 0x4192d8 GetForegroundWindow
 0x4192dc GetWindowTextW
 0x4192e0 wsprintfA
 0x4192e4 GetKeyNameTextW
 0x4192e8 CharLowerW
ADVAPI32.dll
 0x419000 RegDeleteValueW
 0x419004 LookupPrivilegeValueW
 0x419008 AdjustTokenPrivileges
 0x41900c AllocateAndInitializeSid
 0x419010 OpenProcessToken
 0x419014 FreeSid
 0x419018 LookupAccountSidW
 0x41901c RegCreateKeyExW
 0x419020 RegDeleteKeyW
 0x419024 InitializeSecurityDescriptor
 0x419028 RegDeleteKeyA
 0x41902c SetSecurityDescriptorDacl
 0x419030 RegQueryValueExW
 0x419034 RegOpenKeyExW
 0x419038 RegOpenKeyExA
 0x41903c RegEnumKeyExW
 0x419040 RegQueryValueExA
 0x419044 RegQueryInfoKeyW
 0x419048 RegCloseKey
 0x41904c OpenServiceW
 0x419050 ChangeServiceConfigW
 0x419054 QueryServiceConfigW
 0x419058 EnumServicesStatusExW
 0x41905c StartServiceW
 0x419060 RegSetValueExW
 0x419064 RegCreateKeyExA
 0x419068 OpenSCManagerW
 0x41906c CloseServiceHandle
 0x419070 GetTokenInformation
 0x419074 RegSetValueExA
SHELL32.dll
 0x419254 SHGetFolderPathW
 0x419258 ShellExecuteExA
 0x41925c None
 0x419260 SHGetKnownFolderPath
 0x419264 SHFileOperationW
 0x419268 SHGetSpecialFolderPathW
 0x41926c SHCreateDirectoryExW
 0x419270 ShellExecuteW
urlmon.dll
 0x419368 URLDownloadToFileW
WS2_32.dll
 0x4192f8 getaddrinfo
 0x4192fc setsockopt
 0x419300 freeaddrinfo
 0x419304 htons
 0x419308 recv
 0x41930c socket
 0x419310 send
 0x419314 WSAConnect
 0x419318 WSAStartup
 0x41931c shutdown
 0x419320 closesocket
 0x419324 WSACleanup
 0x419328 connect
 0x41932c InetNtopW
 0x419330 gethostbyname
 0x419334 inet_addr
ole32.dll
 0x419350 CoCreateInstance
 0x419354 CoInitialize
 0x419358 CoTaskMemFree
 0x41935c CoUninitialize
 0x419360 CoInitializeSecurity
SHLWAPI.dll
 0x419278 StrStrW
 0x41927c PathFindExtensionW
 0x419280 PathCombineA
 0x419284 PathFindFileNameW
 0x419288 StrStrA
 0x41928c PathRemoveFileSpecA
 0x419290 PathFileExistsW
NETAPI32.dll
 0x419240 NetUserAdd
 0x419244 NetLocalGroupAddMembers
OLEAUT32.dll
 0x41924c VariantInit
CRYPT32.dll
 0x41907c CryptUnprotectData
 0x419080 CryptStringToBinaryA
 0x419084 CryptStringToBinaryW
WININET.dll
 0x4192f0 InternetTimeToSystemTimeA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure