Report - NewKindR.exe

Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.06.17 13:37 Machine s1_win7_x6403
Filename NewKindR.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
3.0
ZERO API file : malware
VT API (file) 50 detected (AIDetectMalware, Tepfer, malicious, high confidence, score, Unsafe, Save, GenKryptik, GYST, Artemis, RATX, Fareit, Generic@AI, RDML, 8SqVc3u, QAKRFeabwXAg, Redcap, vrjeb, Steam, AMADEY, YXEFNZ, Real Protect, high, Krypt, Detected, ai score=80, ASGK, 8WHVJ3, R653711, ZexaF, Eu0@ay3SxmiG, BScope, Klubdepa, Static AI, Suspicious PE, Kryptik, HBBY, confidence, 100%)
md5 fdafb92fc1868e533daa18f318d8e322
sha256 20c1e1afe90bdcf0f52211ad57c0b44bf2657eee63057b503ca6f3efeeb9a828
ssdeep 6144:5pPjLfMHsP9QLw5bB4DOmfG6i2wGWPgEammKW4g0l6zkLL3QxWP1IIL4qb:5pbMHwIwt0XG6OPg/mmSFl6zk/gxoIv
imphash d9461cba2555202112b06a068732496e
impfuzzy 24:VbG2Akrk1kH6MTkkrvN9I71oOJHvCDYpiOIcsge+6MG/DRiQcfwj+yv5HuO2SBVZ:waIA19Ie+T0O/ZG/IQcfEHL2SBVBSm
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (5cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
121.254.136.18 KR LG DACOM Corporation 121.254.136.18 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x414000 SetVolumeLabelA
 0x414004 SetDefaultCommConfigA
 0x414008 GetConsoleAliasesLengthW
 0x41400c GetLocaleInfoA
 0x414010 GetStringTypeA
 0x414014 InterlockedDecrement
 0x414018 CreateJobObjectW
 0x41401c SetVolumeMountPointW
 0x414020 SetCommBreak
 0x414024 GetModuleHandleW
 0x414028 GetTickCount
 0x41402c EnumCalendarInfoExW
 0x414030 GetConsoleAliasesA
 0x414034 ReadConsoleOutputA
 0x414038 GlobalAlloc
 0x41403c LoadLibraryW
 0x414040 FormatMessageW
 0x414044 GetStringTypeExW
 0x414048 lstrcpynW
 0x41404c GetTimeFormatW
 0x414050 SetConsoleTitleA
 0x414054 CreateJobObjectA
 0x414058 GetNamedPipeHandleStateW
 0x41405c SetLastError
 0x414060 GetThreadLocale
 0x414064 GetProcAddress
 0x414068 BuildCommDCBW
 0x41406c LoadLibraryA
 0x414070 WriteConsoleA
 0x414074 UnhandledExceptionFilter
 0x414078 RegisterWaitForSingleObject
 0x41407c SetFileApisToANSI
 0x414080 OpenJobObjectW
 0x414084 FindAtomA
 0x414088 GetModuleFileNameA
 0x41408c lstrcatW
 0x414090 OpenFileMappingW
 0x414094 SetCalendarInfoA
 0x414098 GlobalAddAtomW
 0x41409c FindNextVolumeA
 0x4140a0 LocalFileTimeToFileTime
 0x4140a4 MultiByteToWideChar
 0x4140a8 HeapAlloc
 0x4140ac GetLastError
 0x4140b0 HeapReAlloc
 0x4140b4 GetStartupInfoW
 0x4140b8 RaiseException
 0x4140bc RtlUnwind
 0x4140c0 TerminateProcess
 0x4140c4 GetCurrentProcess
 0x4140c8 SetUnhandledExceptionFilter
 0x4140cc IsDebuggerPresent
 0x4140d0 HeapFree
 0x4140d4 GetCPInfo
 0x4140d8 InterlockedIncrement
 0x4140dc GetACP
 0x4140e0 GetOEMCP
 0x4140e4 IsValidCodePage
 0x4140e8 TlsGetValue
 0x4140ec TlsAlloc
 0x4140f0 TlsSetValue
 0x4140f4 TlsFree
 0x4140f8 GetCurrentThreadId
 0x4140fc DeleteCriticalSection
 0x414100 LeaveCriticalSection
 0x414104 EnterCriticalSection
 0x414108 VirtualFree
 0x41410c VirtualAlloc
 0x414110 HeapCreate
 0x414114 Sleep
 0x414118 ExitProcess
 0x41411c WriteFile
 0x414120 GetStdHandle
 0x414124 SetHandleCount
 0x414128 GetFileType
 0x41412c GetStartupInfoA
 0x414130 GetModuleFileNameW
 0x414134 FreeEnvironmentStringsW
 0x414138 GetEnvironmentStringsW
 0x41413c GetCommandLineW
 0x414140 QueryPerformanceCounter
 0x414144 GetCurrentProcessId
 0x414148 GetSystemTimeAsFileTime
 0x41414c LCMapStringA
 0x414150 WideCharToMultiByte
 0x414154 LCMapStringW
 0x414158 GetStringTypeW
 0x41415c InitializeCriticalSectionAndSpinCount
 0x414160 ReadFile
 0x414164 HeapSize
 0x414168 GetConsoleCP
 0x41416c GetConsoleMode
 0x414170 FlushFileBuffers
 0x414174 SetFilePointer
 0x414178 SetStdHandle
 0x41417c CloseHandle
 0x414180 GetConsoleOutputCP
 0x414184 WriteConsoleW
 0x414188 CreateFileA
 0x41418c GetModuleHandleA
USER32.dll
 0x414194 LoadIconW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure