Report - b2c2c1.exe

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.06.17 13:31 Machine s1_win7_x6403
Filename b2c2c1.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
5
Behavior Score
3.2
ZERO API file : malware
VT API (file) 51 detected (AIDetectMalware, Convagent, malicious, high confidence, score, Stop, Lockbit, GenericKD, Unsafe, Save, Attribute, HighConfidence, GenKryptik, GYTZ, Artemis, BotX, Injuke, FalDesc, MulDrop27, AMADEY, YXEFPZ, high, Outbreak, Detected, ai score=86, Sabsik, Kryptik, BPT99E, ZexaF, Cq0@aiWOoomG, Chgt, Obfuscated, Static AI, Malicious PE, MxResIcn, PossibleThreat, confidence, 100%)
md5 f8ec725e4b969f157fd70166e73a56a3
sha256 eb74efaf4832a80809815051fc97704819fbc4b1d57f07faf39746a02ed1dd10
ssdeep 12288:DDFoUhzIra7duGLyU99EsNOt44wvprxZD3d//:eUhzoaR1Np4w75N3
imphash 038fd82a29b15c409ae8a61e434d0fd1
impfuzzy 24:VYykbrjx0fcMulJcDYpEdQBoYC7yOf7oOu1lEcfjtDhIuHRyv0SJyU:8rjifXa6dBpOOTnoecfjtN40SJyU
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 51 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
172.67.198.131 US CLOUDFLARENET 172.67.198.131 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x445000 LoadLibraryExW
 0x445004 GetComputerNameW
 0x445008 GetTickCount
 0x44500c GetNumberFormatA
 0x445010 GetWindowsDirectoryA
 0x445014 GetUserDefaultLangID
 0x445018 SetProcessPriorityBoost
 0x44501c TlsSetValue
 0x445020 GlobalAlloc
 0x445024 LoadLibraryW
 0x445028 AssignProcessToJobObject
 0x44502c GetACP
 0x445030 IsBadStringPtrA
 0x445034 OpenMutexW
 0x445038 GetLastError
 0x44503c SetLastError
 0x445040 GetProcAddress
 0x445044 BuildCommDCBW
 0x445048 LoadLibraryA
 0x44504c InterlockedExchangeAdd
 0x445050 GetDiskFreeSpaceA
 0x445054 FoldStringA
 0x445058 GetModuleFileNameA
 0x44505c FindFirstVolumeMountPointA
 0x445060 lstrcatW
 0x445064 OutputDebugStringA
 0x445068 WriteProcessMemory
 0x44506c HeapFree
 0x445070 HeapReAlloc
 0x445074 GetModuleHandleW
 0x445078 ExitProcess
 0x44507c DecodePointer
 0x445080 GetCommandLineW
 0x445084 HeapSetInformation
 0x445088 GetStartupInfoW
 0x44508c HeapAlloc
 0x445090 HeapCreate
 0x445094 EncodePointer
 0x445098 InitializeCriticalSectionAndSpinCount
 0x44509c DeleteCriticalSection
 0x4450a0 LeaveCriticalSection
 0x4450a4 EnterCriticalSection
 0x4450a8 UnhandledExceptionFilter
 0x4450ac SetUnhandledExceptionFilter
 0x4450b0 IsDebuggerPresent
 0x4450b4 TerminateProcess
 0x4450b8 GetCurrentProcess
 0x4450bc TlsAlloc
 0x4450c0 TlsGetValue
 0x4450c4 TlsFree
 0x4450c8 InterlockedIncrement
 0x4450cc GetCurrentThreadId
 0x4450d0 InterlockedDecrement
 0x4450d4 WriteFile
 0x4450d8 GetStdHandle
 0x4450dc GetModuleFileNameW
 0x4450e0 FreeEnvironmentStringsW
 0x4450e4 GetEnvironmentStringsW
 0x4450e8 SetHandleCount
 0x4450ec GetFileType
 0x4450f0 QueryPerformanceCounter
 0x4450f4 GetCurrentProcessId
 0x4450f8 GetSystemTimeAsFileTime
 0x4450fc RtlUnwind
 0x445100 Sleep
 0x445104 WideCharToMultiByte
 0x445108 GetCPInfo
 0x44510c GetOEMCP
 0x445110 IsValidCodePage
 0x445114 HeapSize
 0x445118 RaiseException
 0x44511c IsProcessorFeaturePresent
 0x445120 LCMapStringW
 0x445124 MultiByteToWideChar
 0x445128 GetStringTypeW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure