ScreenShot
Created | 2024.05.31 08:18 | Machine | s1_win7_x6403 |
Filename | amers.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 41 detected (AIDetectMalware, malicious, high confidence, score, GenericKDZ, Themida, Attribute, HighConfidence, Generic@AI, RDML, XbIasFlFnAFTaDRvZjlizw, Real Protect, high, Generic ML PUA, Detected, Wacatac, R640651, ZexaF, 1DWaaGu9hAgi, TScope, Probably Heur, ExeHeaderL, Deyma, ai score=89, confidence, 100%) | ||
md5 | f55d40b74d38f0fcea654437183a7b1e | ||
sha256 | d107ed3dadd9d5544a569bd16e0c9eecee52f4f136e1def03c06de46267b4bec | ||
ssdeep | 24576:Nd/IWY2dGH6WZhJp44K5Yr7VeTpteCm5LpdldO9mnIBB3UEM98uEyoYudVFUNAZk:N9LY26bLJHrwptLm9avu8xTV+NiRy | ||
imphash | 2eabe9054cad5152567f0699947a2c5b | ||
impfuzzy | 3:sBv:A |
Network IP location
Signature (79cnts)
Level | Description |
---|---|
danger | Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | File has been identified by 41 AntiVirus engines on VirusTotal as malicious |
danger | Disables Windows Security features |
danger | Executed a process and injected code into it |
danger | Stops Windows services |
warning | Generates some ICMP traffic |
watch | A process attempted to delay the analysis task. |
watch | Allocates execute permission to another process indicative of possible code injection |
watch | Appends a known multi-family ransomware file extension to files that have been encrypted |
watch | Attempts to create or modify system certificates |
watch | Attempts to identify installed AV products by installation directory |
watch | Attempts to identify installed AV products by registry key |
watch | Checks for the presence of known devices from debuggers and forensic tools |
watch | Checks for the presence of known windows from debuggers and forensic tools |
watch | Checks the CPU name from registry |
watch | Checks the version of Bios |
watch | Code injection by writing an executable or DLL to the memory of another process |
watch | Collects information about installed applications |
watch | Communicates with host for which no DNS query was performed |
watch | Connects to an IRC server |
watch | Created a service where a service was also not started |
watch | Creates a suspicious Powershell process |
watch | Detects Virtual Machines through their custom firmware |
watch | Detects VirtualBox using WNetGetProviderName trick |
watch | Detects VMWare through the in instruction feature |
watch | Drops 196 unknown file mime types indicative of ransomware writing encrypted files back to disk |
watch | Executes one or more WMI queries |
watch | Harvests credentials from local FTP client softwares |
watch | Installs itself for autorun at Windows startup |
watch | Loads a driver |
watch | Network activity contains more than one unique useragent |
watch | One or more non-whitelisted processes were created |
watch | One or more of the buffers contains an embedded PE file |
watch | Operates on local firewall's policies and settings |
watch | Potential code injection by writing to the memory of another process |
watch | Powershell script adds registry entries |
watch | Queries information on disks |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
watch | Used NtSetContextThread to modify a thread in a remote process indicative of process injection |
watch | Zeus P2P (Banking Trojan) |
notice | A process created a hidden window |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An executable file was downloaded by the processes axplont.exe |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Checks adapter addresses which can be used to detect virtual network interfaces |
notice | Checks for known Chinese AV sofware registry keys |
notice | Checks for the Locally Unique Identifier on the system for a suspicious privilege |
notice | Checks whether any human activity is being performed by constantly checking whether the foreground window changed |
notice | Creates a shortcut to an executable file |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Creates hidden or system file |
notice | Drops a binary and executes it |
notice | Drops an executable to the user AppData folder |
notice | Executes one or more WMI queries which can be used to identify virtual machines |
notice | Expresses interest in specific running processes |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Looks up the external IP address |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Potentially malicious URLs were found in the process memory dump |
notice | Queries for potentially installed applications |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
notice | Repeatedly searches for a not-found process |
notice | Searches running processes potentially to identify processes for sandbox evasion |
notice | Sends data using the HTTP POST Method |
notice | Steals private information from local Internet browsers |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Collects information to fingerprint the system (MachineGuid |
info | Command line console output was observed |
info | One or more processes crashed |
info | Queries for the computername |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | Tries to locate where the browsers are installed |
info | Uses Windows APIs to generate a cryptographic key |
Rules (70cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | detect_Redline_Stealer_V2 | (no description) | binaries (download) |
danger | HermeticWiper_Zero | HermeticWiper | binaries (download) |
danger | NPKI_Zero | File included NPKI | binaries (download) |
danger | RedLine_Stealer_b_Zero | RedLine stealer | binaries (download) |
danger | Win32_Trojan_Emotet_1_Zero | Win32 Trojan Emotet | binaries (download) |
danger | Win32_Trojan_Emotet_2_Zero | Win32 Trojan Emotet | binaries (download) |
danger | Win32_Trojan_Emotet_RL_1_Zero | Win32 Trojan Emotet | binaries (download) |
danger | Win32_Trojan_Emotet_RL_2_Zero | Win32 Trojan Emotet | binaries (download) |
danger | Win32_Trojan_Emotet_RL_Gen_Zero | Win32 Trojan Emotet | binaries (download) |
danger | Win32_Trojan_Gen_1_0904B0_Zero | Win32 Trojan Emotet | binaries (download) |
danger | win_smokeloader_auto | Detects win.smokeloader. | binaries (download) |
warning | Buhtrap_Group_IN | Buhtrap Group | binaries (download) |
warning | EnigmaProtector_IN | EnigmaProtector | binaries (download) |
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
warning | Microsoft_Office_File_Downloader_Zero | Microsoft Office File Downloader | binaries (download) |
warning | NSIS_Installer | Null Soft Installer | binaries (download) |
warning | PhysicalDrive_20181001 | (no description) | binaries (download) |
warning | Suspicious_Obfuscation_Script_2 | Suspicious obfuscation script (e.g. executable files) | binaries (download) |
warning | UltraVNC_Zero | UltraVNC | binaries (download) |
watch | Admin_Tool_IN_Zero | Admin Tool Sysinternals | binaries (download) |
watch | Antivirus | Contains references to security software | binaries (download) |
watch | ASPack_Zero | ASPack packed file | binaries (download) |
watch | ConfuserEx_Zero | Confuser .NET | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (download) |
watch | Network_Downloader | File Downloader | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (download) |
watch | Win32_Trojan_PWS_Net_1_Zero | Win32 Trojan PWS .NET Azorult | binaries (download) |
notice | anti_vm_detect | Possibly employs anti-virtualization techniques | binaries (download) |
notice | Code_injection | Code injection with CreateRemoteThread in a remote process | memory |
notice | Create_Service | Create a windows service | memory |
notice | Escalate_priviledges | Escalate priviledges | memory |
notice | Generic_PWS_Memory_Zero | PWS Memory | memory |
notice | Javascript_Blob | use blob(Binary Large Objec) javascript | binaries (download) |
notice | local_credential_Steal | Steal credential | memory |
notice | Network_DGA | Communication using DGA | memory |
notice | Network_DNS | Communications use DNS | memory |
notice | Network_TCP_Socket | Communications over RAW Socket | memory |
notice | ScreenShot | Take ScreenShot | memory |
notice | Str_Win32_Http_API | Match Windows Http API call | memory |
notice | Str_Win32_Internet_API | Match Windows Inet API call | memory |
info | anti_dbg | Checks if being debugged | memory |
info | CAB_file_format | CAB archive file | binaries (download) |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerException__SetConsoleCtrl | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | DllRegisterServer_Zero | execute regsvr32.exe | binaries (download) |
info | ftp_command | ftp command | binaries (download) |
info | HWP_file_format | HWP Document File | binaries (download) |
info | icon_file_format | icon file format | binaries (download) |
info | Is_DotNET_EXE | (no description) | binaries (download) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | IsPE64 | (no description) | binaries (download) |
info | JPEG_Format_Zero | JPEG Format | binaries (download) |
info | lnk_file_format | Microsoft Windows Shortcut File Format | binaries (download) |
info | Lnk_Format_Zero | LNK Format | binaries (download) |
info | Microsoft_Office_File_Zero | Microsoft Office File | binaries (download) |
info | mzp_file_format | MZP(Delphi) file format | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
info | PowerShell | PowerShell script | scripts |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
info | zip_file_format | ZIP file format | binaries (download) |
Network (128cnts) ?
Suricata ids
ET DROP Spamhaus DROP Listed Traffic Inbound group 23
ET INFO Executable Download from dotted-quad Host
ET POLICY PE EXE or DLL Windows file download HTTP
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET DROP Spamhaus DROP Listed Traffic Inbound group 33
ET INFO Microsoft net.tcp Connection Initialization Activity
ET INFO Packed Executable Download
ET MALWARE Redline Stealer TCP CnC Activity
ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)
ET MALWARE Redline Stealer TCP CnC - Id1Response
ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)
ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET DROP Spamhaus DROP Listed Traffic Inbound group 1
ET INFO TLS Handshake Failure
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false)
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true)
ET MALWARE Amadey Bot Activity (POST)
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com)
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
ET POLICY Observed DNS Query to Coin Mining Domain (nanopool .org)
SURICATA Applayer Mismatch protocol both directions
ET MALWARE Private Loader Related Activity (GET)
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
ET INFO EXE - Served Attached HTTP
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (CoinMiner)
ET MALWARE Suspected PrivateLoader Activity (POST)
ET DROP Spamhaus DROP Listed Traffic Inbound group 14
ET INFO Executable Download from dotted-quad Host
ET POLICY PE EXE or DLL Windows file download HTTP
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET DROP Spamhaus DROP Listed Traffic Inbound group 33
ET INFO Microsoft net.tcp Connection Initialization Activity
ET INFO Packed Executable Download
ET MALWARE Redline Stealer TCP CnC Activity
ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)
ET MALWARE Redline Stealer TCP CnC - Id1Response
ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)
ET MALWARE Win32/Amadey Host Fingerprint Exfil (POST) M2
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET DROP Spamhaus DROP Listed Traffic Inbound group 1
ET INFO TLS Handshake Failure
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag true change port flag false)
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag true)
ET MALWARE Amadey Bot Activity (POST)
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
ET INFO Session Traversal Utilities for NAT (STUN Binding Request obsolete rfc 3489 CHANGE-REQUEST attribute change IP flag false change port flag false)
ET INFO Observed External IP Lookup Domain in TLS SNI (api .myip .com)
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
ET POLICY Observed DNS Query to Coin Mining Domain (nanopool .org)
SURICATA Applayer Mismatch protocol both directions
ET MALWARE Private Loader Related Activity (GET)
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
ET INFO EXE - Served Attached HTTP
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (CoinMiner)
ET MALWARE Suspected PrivateLoader Activity (POST)
ET DROP Spamhaus DROP Listed Traffic Inbound group 14
PE API
IAT(Import Address Table) Library
kernel32.dll
0x468034 lstrcpy
EAT(Export Address Table) is none
kernel32.dll
0x468034 lstrcpy
EAT(Export Address Table) is none