Report - WezoAutoUP.exe

CoinMiner Emotet AutoIt Generic Malware Suspicious_Script_Bin UPX Malicious Library Malicious Packer MPRESS PE File PE32 DLL MSOffice File OS Processor Check PE64
ScreenShot
Created 2024.06.21 09:50 Machine s1_win7_x6403
Filename WezoAutoUP.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
AI Score
5
Behavior Score
9.4
ZERO API file : clean
VT API (file) 51 detected (AIDetectMalware, lrP4, malicious, moderate confidence, score, AutoitDropper, Unsafe, V6xa, multiple detections, YahLover, AutoIt, Siggen5, R002C0PET24, high, Detected, CoinMiner, Hider, REXR@5364l6, Casdet, R2WKDE, IJBN, IMWorm, Sohanad, Chgt, Gajl, GenAsa, i9rai7w7, susgen, confidence, 100%)
md5 46748aff6fcab034d0affddc99c6d876
sha256 82a9537d99a9ccc5c534dd87f642a7e77b594f7554c2ed7a32a1a9518634a42c
ssdeep 6144:m68oipnnK9jqXEX52Ums+Tbxzbx9SmIqQyPodMUf8Dkzel6R8zHe1IH:WfnnK9zABs+TbFx9SXOPCf8DkqAR8zHB
imphash 6058ac660564f64af764bdf1e4fe5d2b
impfuzzy 12:VA/DzqYOZkKDD75maKxLAkcOcTQQnd3mxCHXT:V0DBaPD7VKxLAkcOs2k3T
  Network IP location

Signature (22cnts)

Level Description
danger File has been identified by 51 AntiVirus engines on VirusTotal as malicious
watch Creates an executable file in a user folder
watch Deletes executed files from disk
watch Installs itself for autorun at Windows startup
watch Uses Sysinternals tools in order to add additional command line functionality
notice An executable file was downloaded by the process wezoautoup.exe
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Expresses interest in specific running processes
notice Performs some HTTP requests
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info The executable uses a known packer

Rules (21cnts)

Level Name Description Collection
danger CoinMiner_IN CoinMiner binaries (download)
danger CoinMiner_IN CoinMiner binaries (upload)
danger Win32_Trojan_Emotet_2_Zero Win32 Trojan Emotet binaries (download)
warning AutoIt autoit binaries (download)
warning AutoIt autoit binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
warning Suspicious_Obfuscation_Script_2 Suspicious obfuscation script (e.g. executable files) binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch MPRESS_Zero MPRESS packed file binaries (download)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (17cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://wieie.cn:8765/wzoptBmp.exe CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
http://wieie.cn:8765/DelHosts.exe CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
http://dl-cn.verysync.com/releases/ US CLOUDFLARENET 104.21.52.166 clean
http://wieie.cn:8765/changezuhaolnk.exe CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
http://wieie.cn:8765/dbzclientUpdate.exe CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
http://wieie.cn:8765/WezoEventUP.exe CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
http://wieie.cn:8765/sysup.exe CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
http://wieie.cn:8765/wzoptup.exe CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
http://wieie.cn:8765/arpwriteIni.exe CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
http://wieie.cn:8765/storyhosts.exe CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
http://wieie.cn:8765/Config.ini CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
http://dl-cn.verysync.com/releases/v2.15.0/verysync-windows-amd64-v2.15.0.zip US CLOUDFLARENET 172.67.201.86 clean
http://wieie.cn:8765/DownVerySync.exe CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
dl-cn.verysync.com US CLOUDFLARENET 104.21.52.166 clean
wieie.cn CN CHINA UNICOM China169 Backbone 58.23.215.23 clean
104.21.52.166 US CLOUDFLARENET 104.21.52.166 clean
58.23.215.23 CN CHINA UNICOM China169 Backbone 58.23.215.23 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x4cf18c LoadLibraryA
 0x4cf190 GetProcAddress
 0x4cf194 VirtualProtect
 0x4cf198 VirtualAlloc
 0x4cf19c VirtualFree
 0x4cf1a0 ExitProcess
ADVAPI32.dll
 0x4cf1a8 GetAce
COMCTL32.dll
 0x4cf1b0 ImageList_Remove
COMDLG32.dll
 0x4cf1b8 GetSaveFileNameW
GDI32.dll
 0x4cf1c0 LineTo
MPR.dll
 0x4cf1c8 WNetUseConnectionW
ole32.dll
 0x4cf1d0 CoInitialize
OLEAUT32.dll
 0x4cf1d8 SysFreeString
PSAPI.DLL
 0x4cf1e0 EnumProcesses
SHELL32.dll
 0x4cf1e8 DragFinish
USER32.dll
 0x4cf1f0 GetDC
USERENV.dll
 0x4cf1f8 LoadUserProfileW
VERSION.dll
 0x4cf200 VerQueryValueW
WININET.dll
 0x4cf208 FtpOpenFileW
WINMM.dll
 0x4cf210 timeGetTime
WSOCK32.dll
 0x4cf218 recv

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure