Report - seo_cr1.exe

Generic Malware UPX Malicious Library PE32 PE File OS Processor Check
ScreenShot
Created 2024.06.12 07:36 Machine s1_win7_x6401
Filename seo_cr1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
5.6
ZERO API file : malware
VT API (file) 27 detected (AIDetectMalware, malicious, high confidence, score, Lockbit, Unsafe, Save, Attribute, HighConfidence, GenKryptik, GYPG, Artemis, Generic@AI, RDML, mtgATTehqFjXmF2jeIW, Real Protect, high, Outbreak, Casdet, ZexaF, ZBW@a0DnfThi, Static AI, Suspicious PE, confidence, 100%)
md5 b2d33941295f236bebee0d3c389a8549
sha256 cfa0a176bad0046bd498a5a7f5140ca92734b096c541a54acd1b002f228ec47c
ssdeep 24576:VUFFAjGxqL+VD3crlj8XR2GN19yK9fbxjSXIQ8j0b4qsfQ9Mrm94+CJWMD/NXChu:NKUo3klIXhNryuI2j0sVf9
imphash cbe5fc5e7bee4b0be15ed00994864f05
impfuzzy 24:fOovEIN+jvxvwZ46tMlJFDnDIl49hc+9MG9jMv:Wc2wZ46tF2jc+eGw
  Network IP location

Signature (15cnts)

Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Executes one or more WMI queries
notice Executes one or more WMI queries which can be used to identify virtual machines
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
info Checks if process is being debugged by a debugger
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (11cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://dr-networks.com/ US Cherniy Tetyana Borysivna 45.11.59.130 clean
dr-networks.com US Cherniy Tetyana Borysivna 45.11.59.130 clean
45.11.59.130 US Cherniy Tetyana Borysivna 45.11.59.130 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x41f000 GetProcessHeap
 0x41f004 CreateFileA
 0x41f008 CloseHandle
 0x41f00c GetCommandLineA
 0x41f010 ConvertThreadToFiber
 0x41f014 CreateFiber
 0x41f018 SwitchToFiber
 0x41f01c OpenThread
 0x41f020 GetCurrentProcessId
 0x41f024 GetTempPathA
 0x41f028 WaitForSingleObject
 0x41f02c GetFileSize
 0x41f030 OpenFileMappingA
 0x41f034 CreateNamedPipeA
 0x41f038 CallNamedPipeA
 0x41f03c ExitProcess
 0x41f040 VirtualAlloc
 0x41f044 GetNamedPipeHandleStateA
 0x41f048 HeapLock
 0x41f04c IsDebuggerPresent
 0x41f050 UnhandledExceptionFilter
 0x41f054 SetUnhandledExceptionFilter
 0x41f058 GetCurrentProcess
 0x41f05c TerminateProcess
 0x41f060 IsProcessorFeaturePresent
 0x41f064 GetStringTypeW
 0x41f068 GetLastError
 0x41f06c SetLastError
 0x41f070 MultiByteToWideChar
 0x41f074 GetACP
 0x41f078 EncodePointer
 0x41f07c DecodePointer
 0x41f080 HeapAlloc
 0x41f084 HeapFree
 0x41f088 GetModuleHandleW
 0x41f08c GetProcAddress
 0x41f090 InitializeCriticalSectionAndSpinCount
 0x41f094 TlsGetValue
 0x41f098 TlsSetValue
 0x41f09c FreeLibrary
 0x41f0a0 LoadLibraryExW
 0x41f0a4 LCMapStringW
 0x41f0a8 EnterCriticalSection
 0x41f0ac LeaveCriticalSection
 0x41f0b0 DeleteCriticalSection
 0x41f0b4 IsValidCodePage
 0x41f0b8 GetOEMCP
 0x41f0bc GetCPInfo
 0x41f0c0 GetModuleHandleExW
 0x41f0c4 WideCharToMultiByte
 0x41f0c8 RaiseException
 0x41f0cc RtlUnwind
 0x41f0d0 SetStdHandle
 0x41f0d4 WriteFile
 0x41f0d8 GetConsoleCP
 0x41f0dc GetConsoleMode
 0x41f0e0 SetFilePointerEx
 0x41f0e4 FlushFileBuffers
 0x41f0e8 WriteConsoleW
 0x41f0ec CreateFileW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure