Report - Main.exe

Malicious Library Antivirus UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.06.25 07:57 Machine s1_win7_x6403
Filename Main.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
8
Behavior Score
6.2
ZERO API file : malware
VT API (file) 61 detected (AIDetectMalware, Vidar, Windows, Threat, Malicious, score, Fragtor, Unsafe, Vo0i, Attribute, HighConfidence, Artemis, CryptoStl, Trojanx, Stealerc, TrojanPSW, Redcap, kmdmfk, Cl4R3ucypxL, xvqpd, YXEDXZ, Real Protect, high, Detected, ai score=80, Malware@#hvhruuheed8l, StealC, ABRisk, IDZY, BScope, Mars, GdSda, Gencirc, Static AI, Suspicious PE, confidence, 100%)
md5 9ec7f08c85bfa1b267761f225b68ab0b
sha256 9f685df11e2b24e55ae610d8fe4f9ea005b8dba84d4de97be0cce7fc7ae3c5ca
ssdeep 3072:AZWAfSR9CehJX4rRUiAPukFhm8qfuDUM41wvnFsocOHYpk5GK+lGjCQYpY:WDEBbAUUkFhfDs1w/uFrYjCQYp
imphash 554d949fd335dd5958de0342706fbbec
impfuzzy 24:8sQ8yqvf9xfbbl9JzRNjlvt7Do8jaYHCtBlSfMDkYJlU2yDfT3wxbEOq1EQN:8d8yqv1Rbh95hojtB8fMHCMgwc
  Network IP location

Signature (11cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 61 AntiVirus engines on VirusTotal as malicious
watch Attempts to create or modify system certificates
watch Communicates with host for which no DNS query was performed
watch Network activity contains more than one unique useragent
notice Executes one or more WMI queries
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
info Collects information to fingerprint the system (MachineGuid
info One or more processes crashed
info Queries for the computername

Rules (6cnts)

Level Name Description Collection
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://steamcommunity.com/profiles/76561199677575543 US Akamai International B.V. 104.76.78.101 clean
t.me GB Telegram Messenger Inc 149.154.167.99 mailcious
steamcommunity.com US Akamai International B.V. 104.76.78.101 mailcious
149.154.167.99 GB Telegram Messenger Inc 149.154.167.99 mailcious
5.75.208.137 DE Hetzner Online GmbH 5.75.208.137 clean
104.76.78.101 US Akamai International B.V. 104.76.78.101 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

msvcrt.dll
 0x424108 strlen
 0x42410c __CxxFrameHandler3
 0x424110 memcmp
 0x424114 strcmp
 0x424118 ??_U@YAPAXI@Z
 0x42411c strncpy
 0x424120 malloc
 0x424124 _wtoi64
 0x424128 atexit
 0x42412c ??_V@YAXPAX@Z
 0x424130 memmove
 0x424134 memchr
 0x424138 strtok_s
 0x42413c strcpy_s
 0x424140 strchr
 0x424144 memcpy
 0x424148 memset
KERNEL32.dll
 0x424010 IsProcessorFeaturePresent
 0x424014 ExitProcess
 0x424018 GetCurrentProcess
 0x42401c LocalAlloc
 0x424020 ReadProcessMemory
 0x424024 VirtualQueryEx
 0x424028 OpenProcess
 0x42402c FileTimeToSystemTime
 0x424030 CloseHandle
 0x424034 CreateDirectoryA
 0x424038 WaitForSingleObject
 0x42403c CreateThread
 0x424040 GetDriveTypeA
 0x424044 GetLogicalDriveStringsA
 0x424048 GetProcAddress
 0x42404c LoadLibraryA
 0x424050 HeapAlloc
 0x424054 HeapFree
 0x424058 LoadLibraryW
 0x42405c GetStringTypeW
 0x424060 MultiByteToWideChar
 0x424064 LCMapStringW
 0x424068 WideCharToMultiByte
 0x42406c GetModuleFileNameW
 0x424070 GetStdHandle
 0x424074 WriteFile
 0x424078 Sleep
 0x42407c RaiseException
 0x424080 EncodePointer
 0x424084 GetLastError
 0x424088 DecodePointer
 0x42408c UnhandledExceptionFilter
 0x424090 SetUnhandledExceptionFilter
 0x424094 IsDebuggerPresent
 0x424098 TerminateProcess
 0x42409c InitializeCriticalSectionAndSpinCount
 0x4240a0 LeaveCriticalSection
 0x4240a4 EnterCriticalSection
 0x4240a8 RtlUnwind
 0x4240ac GetCPInfo
 0x4240b0 InterlockedIncrement
 0x4240b4 InterlockedDecrement
 0x4240b8 GetACP
 0x4240bc GetOEMCP
 0x4240c0 IsValidCodePage
 0x4240c4 TlsGetValue
 0x4240c8 TlsSetValue
 0x4240cc GetModuleHandleW
 0x4240d0 SetLastError
 0x4240d4 GetCurrentThreadId
USER32.dll
 0x424100 CharToOemA
ADVAPI32.dll
 0x424000 RegOpenKeyExA
 0x424004 RegGetValueA
 0x424008 GetCurrentHwProfileA
SHELL32.dll
 0x4240f0 SHFileOperationA
ole32.dll
 0x424150 CoInitializeSecurity
 0x424154 CoInitializeEx
 0x424158 CoSetProxyBlanket
 0x42415c CoCreateInstance
OLEAUT32.dll
 0x4240dc VariantInit
 0x4240e0 SysAllocString
 0x4240e4 SysFreeString
 0x4240e8 VariantClear
SHLWAPI.dll
 0x4240f8 None

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure