Report - 4.exe

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.06.15 08:21 Machine s1_win7_x6403
Filename 4.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
11
Behavior Score
3.4
ZERO API file : malware
VT API (file)
md5 24981658666a4f40f07f37bfb48d1372
sha256 7b84f0641444a8e39e14f6a9f3f9363ee142acbe6fcb6dcd046d0ae2c463cf77
ssdeep 768:SkqlrK5isV2AKTVV15bRjeK3gRJg6Dm/u5HfqyaVwsaVwCx:xKIYApC6C/4//aVwsaVwCx
imphash b417d74ecba642ca8eceadf01d18afc0
impfuzzy 48:F7/Htu/eQYtjbyMXmLg7b02G3qFn7yeL3Cd:F7/H6JUbRXms7HG3qB7XL3S
  Network IP location

Signature (5cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice Creates a service
info The executable uses a known packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
164.155.205.99 US IKGUL-26484 164.155.205.99 clean
94.177.131.249 PL JDS Systems Jacek Dresler 94.177.131.249 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x406044 MoveFileA
 0x406048 GetTempPathA
 0x40604c GetModuleFileNameA
 0x406050 lstrlenA
 0x406054 MoveFileExA
 0x406058 GlobalMemoryStatus
 0x40605c GetModuleHandleA
 0x406060 GetStartupInfoA
 0x406064 WaitForSingleObject
 0x406068 GetSystemInfo
 0x40606c CreateThread
 0x406070 CreateProcessA
 0x406074 GetFileAttributesA
 0x406078 GetLastError
 0x40607c LoadLibraryA
 0x406080 GetProcAddress
 0x406084 FreeLibrary
 0x406088 CreateFileA
 0x40608c WriteFile
 0x406090 CloseHandle
 0x406094 ExitThread
 0x406098 Sleep
 0x40609c GetCurrentProcessId
 0x4060a0 CopyFileA
 0x4060a4 GetTickCount
USER32.dll
 0x40612c MessageBoxA
 0x406130 wsprintfA
ADVAPI32.dll
 0x406000 CreateServiceA
 0x406004 ChangeServiceConfig2A
 0x406008 UnlockServiceDatabase
 0x40600c OpenServiceA
 0x406010 StartServiceA
 0x406014 RegSetValueExA
 0x406018 CloseServiceHandle
 0x40601c StartServiceCtrlDispatcherA
 0x406020 RegisterServiceCtrlHandlerA
 0x406024 SetServiceStatus
 0x406028 RegOpenKeyExA
 0x40602c RegOpenKeyA
 0x406030 RegQueryValueExA
 0x406034 RegCloseKey
 0x406038 OpenSCManagerA
 0x40603c LockServiceDatabase
WS2_32.dll
 0x406138 select
 0x40613c __WSAFDIsSet
 0x406140 recv
 0x406144 WSAIoctl
 0x406148 send
 0x40614c WSAStartup
 0x406150 WSASocketA
 0x406154 WSAGetLastError
 0x406158 setsockopt
 0x40615c htonl
 0x406160 sendto
 0x406164 WSACleanup
 0x406168 gethostbyname
 0x40616c socket
 0x406170 htons
 0x406174 connect
 0x406178 closesocket
 0x40617c inet_addr
MSVCRT.dll
 0x4060ac strlen
 0x4060b0 strcat
 0x4060b4 _controlfp
 0x4060b8 __set_app_type
 0x4060bc strcpy
 0x4060c0 __p__fmode
 0x4060c4 __p__commode
 0x4060c8 _adjust_fdiv
 0x4060cc __setusermatherr
 0x4060d0 _initterm
 0x4060d4 __getmainargs
 0x4060d8 _acmdln
 0x4060dc exit
 0x4060e0 _XcptFilter
 0x4060e4 _exit
 0x4060e8 _iob
 0x4060ec malloc
 0x4060f0 free
 0x4060f4 rand
 0x4060f8 sprintf
 0x4060fc memset
 0x406100 printf
 0x406104 fprintf
 0x406108 memcpy
 0x40610c _except_handler3
 0x406110 _local_unwind2
 0x406114 strstr
 0x406118 ??3@YAXPAX@Z
 0x40611c strrchr
 0x406120 ??2@YAPAXI@Z
 0x406124 strncmp
iphlpapi.dll
 0x406184 GetIfTable

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure