Report - @DDRI2_2.exe

Gen1 Generic Malware Malicious Library UPX PE File PE32 OS Processor Check DLL ZIP Format
ScreenShot
Created 2024.06.03 07:35 Machine s1_win7_x6403
Filename @DDRI2_2.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
2.6
ZERO API file : mailcious
VT API (file) 21 detected (AIDetectMalware, trqf, malicious, moderate confidence, Unsafe, Vj0s, Redcap, ltrvm, Wacatac, Python, Pytr, ZexaF, @B3@aSKES0di, PossibleThreat)
md5 1cfa70c1b2f1eb15d9f6b0d502095360
sha256 139b21a0ba2e1d6e45cc7ce3494b25b57cb2d5405abe851c1086b24f7d7d2619
ssdeep 98304:7e+bdwNF5kcwoPllMWHubXkTZONq0d6NlPf9//KJ+PUxY7xFY5cjaNCSsxCfTL:C+K4oP1HOXfZ8bntw+KY7xFY5csCSsQ
imphash e72c3bfcbb77a361abf35cfdb2b95db2
impfuzzy 24:SkgwXaDaODu9Wu9T/2Op9UOjntMS1hbJnc+pl3rOovbKlv/LTNUTlONoEqMo6iMp:VgLkj9ptMS1hlc+ppaRN/LT0ONfiQ71b
  Network IP location

Signature (7cnts)

Level Description
warning File has been identified by 21 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
info Checks amount of memory in system
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (16cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info zip_file_format ZIP file format binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

USER32.dll
 0x420180 MessageBoxW
 0x420184 MessageBoxA
KERNEL32.dll
 0x420008 GetLastError
 0x42000c SetDllDirectoryW
 0x420010 GetModuleFileNameW
 0x420014 GetProcAddress
 0x420018 GetCommandLineW
 0x42001c GetEnvironmentVariableW
 0x420020 SetEnvironmentVariableW
 0x420024 ExpandEnvironmentStringsW
 0x420028 GetTempPathW
 0x42002c DecodePointer
 0x420030 Sleep
 0x420034 GetExitCodeProcess
 0x420038 CreateProcessW
 0x42003c GetStartupInfoW
 0x420040 LoadLibraryExW
 0x420044 CreateDirectoryW
 0x420048 GetShortPathNameW
 0x42004c FormatMessageW
 0x420050 LoadLibraryA
 0x420054 MultiByteToWideChar
 0x420058 WideCharToMultiByte
 0x42005c WaitForSingleObject
 0x420060 CloseHandle
 0x420064 SetEndOfFile
 0x420068 HeapReAlloc
 0x42006c UnhandledExceptionFilter
 0x420070 SetUnhandledExceptionFilter
 0x420074 GetCurrentProcess
 0x420078 TerminateProcess
 0x42007c IsProcessorFeaturePresent
 0x420080 QueryPerformanceCounter
 0x420084 GetCurrentProcessId
 0x420088 GetCurrentThreadId
 0x42008c GetSystemTimeAsFileTime
 0x420090 InitializeSListHead
 0x420094 IsDebuggerPresent
 0x420098 GetModuleHandleW
 0x42009c RtlUnwind
 0x4200a0 SetLastError
 0x4200a4 EnterCriticalSection
 0x4200a8 LeaveCriticalSection
 0x4200ac DeleteCriticalSection
 0x4200b0 InitializeCriticalSectionAndSpinCount
 0x4200b4 TlsAlloc
 0x4200b8 TlsGetValue
 0x4200bc TlsSetValue
 0x4200c0 TlsFree
 0x4200c4 FreeLibrary
 0x4200c8 GetCommandLineA
 0x4200cc ReadFile
 0x4200d0 CreateFileW
 0x4200d4 GetDriveTypeW
 0x4200d8 GetFileType
 0x4200dc RaiseException
 0x4200e0 PeekNamedPipe
 0x4200e4 SystemTimeToTzSpecificLocalTime
 0x4200e8 FileTimeToSystemTime
 0x4200ec GetFullPathNameW
 0x4200f0 GetFullPathNameA
 0x4200f4 RemoveDirectoryW
 0x4200f8 FindClose
 0x4200fc FindFirstFileExW
 0x420100 FindNextFileW
 0x420104 SetStdHandle
 0x420108 SetConsoleCtrlHandler
 0x42010c DeleteFileW
 0x420110 GetStdHandle
 0x420114 WriteFile
 0x420118 ExitProcess
 0x42011c GetModuleHandleExW
 0x420120 GetACP
 0x420124 HeapFree
 0x420128 HeapAlloc
 0x42012c GetConsoleMode
 0x420130 ReadConsoleW
 0x420134 SetFilePointerEx
 0x420138 GetConsoleCP
 0x42013c CompareStringW
 0x420140 LCMapStringW
 0x420144 GetCurrentDirectoryW
 0x420148 FlushFileBuffers
 0x42014c SetEnvironmentVariableA
 0x420150 GetFileAttributesExW
 0x420154 IsValidCodePage
 0x420158 GetOEMCP
 0x42015c GetCPInfo
 0x420160 GetEnvironmentStringsW
 0x420164 FreeEnvironmentStringsW
 0x420168 GetStringTypeW
 0x42016c GetProcessHeap
 0x420170 WriteConsoleW
 0x420174 GetTimeZoneInformation
 0x420178 HeapSize
ADVAPI32.dll
 0x420000 ConvertStringSecurityDescriptorToSecurityDescriptorW
WS2_32.dll
 0x42018c ntohl

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure