ScreenShot
Created | 2024.07.16 11:01 | Machine | s1_win7_x6401 |
Filename | pei.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 57 detected (AIDetectMalware, Phorpiex, malicious, high confidence, score, Artemis, Unsafe, Mint, Zard, Vou2, Attribute, HighConfidence, GenKryptik, GPGJ, CrypterX, ClipBanker, TrojanBanker, knavfq, CLASSIC, hesfh, DownLoader46, DLDER, Detected, ai score=86, HeurC, KVMH017, Eldorado, ZexaCO, auW@aSv79Qii, BScope, Caynamer, GdSda, Gencirc, lKXkZXT+0Hk, Static AI, Malicious PE, susgen, confidence, RK8PHU) | ||
md5 | 8d8e6c7952a9dc7c0c73911c4dbc5518 | ||
sha256 | feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278 | ||
ssdeep | 96:zMn7AN23D0TXraYgnY1dTNDiIp+BYA8vrcVO15uJxGE9YUBz2qh3C7tCEkC:A7ANUYhUYPtp+OFMJxTmUBzthckC | ||
imphash | 7fda7734b056db13fe95f35927509e47 | ||
impfuzzy | 12:I4sspNKR4yAaw1DGZ4GnXf3D1FW297t7xCmQLIMLjubw6LYrSjPXJYQAEsy2uORq:BGqaNnv5FFCmoLrSLTN/2uOnX8+hUdbL |
Network IP location
Signature (20cnts)
Level | Description |
---|---|
danger | Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | File has been identified by 57 AntiVirus engines on VirusTotal as malicious |
danger | Disables Windows Security features |
danger | Stops Windows services |
warning | Generates some ICMP traffic |
watch | Attempts to disable Windows Auto Updates |
watch | Attempts to remove evidence of file being downloaded from the Internet |
watch | Communicates with host for which no DNS query was performed |
watch | Installs itself for autorun at Windows startup |
watch | Modifies security center warnings |
watch | Network activity contains more than one unique useragent |
notice | A process attempted to delay the analysis task. |
notice | An executable file was downloaded by the process pei.exe |
notice | Communication to multiple IPs on high port numbers possibly indicative of a peer-to-peer (P2P) or non-standard command and control protocol |
notice | Creates executable files on the filesystem |
notice | Creates hidden or system file |
notice | Drops an executable to the user AppData folder |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
info | Checks if process is being debugged by a debugger |
Rules (13cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
watch | Admin_Tool_IN_Zero | Admin Tool Sysinternals | binaries (download) |
watch | Admin_Tool_IN_Zero | Admin Tool Sysinternals | binaries (upload) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | Malicious_Packer_Zero | Malicious Packer | binaries (download) |
watch | Network_Downloader | File Downloader | binaries (download) |
watch | Network_Downloader | File Downloader | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (download) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Network (21cnts) ?
Suricata ids
ET DROP Spamhaus DROP Listed Traffic Inbound group 33
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
ET POLICY PE EXE or DLL Windows file download HTTP
ET MALWARE Win32/Phorpiex UDP Peer-to-Peer CnC
ET POLICY PE EXE or DLL Windows file download HTTP
PE API
IAT(Import Address Table) Library
SHLWAPI.dll
0x4020d0 PathFileExistsW
MSVCR90.dll
0x402054 __set_app_type
0x402058 ?terminate@@YAXXZ
0x40205c _unlock
0x402060 _encode_pointer
0x402064 _lock
0x402068 _onexit
0x40206c _decode_pointer
0x402070 _except_handler4_common
0x402074 _invoke_watson
0x402078 _controlfp_s
0x40207c __p__fmode
0x402080 __p__commode
0x402084 _adjust_fdiv
0x402088 __setusermatherr
0x40208c _configthreadlocale
0x402090 _initterm_e
0x402094 _initterm
0x402098 _acmdln
0x40209c exit
0x4020a0 _ismbblead
0x4020a4 _XcptFilter
0x4020a8 _exit
0x4020ac _cexit
0x4020b0 __getmainargs
0x4020b4 _amsg_exit
0x4020b8 srand
0x4020bc rand
0x4020c0 memset
0x4020c4 __dllonexit
0x4020c8 _crt_debugger_hook
WININET.dll
0x4020e0 InternetOpenA
0x4020e4 InternetOpenUrlA
0x4020e8 InternetOpenW
0x4020ec InternetOpenUrlW
0x4020f0 InternetReadFile
0x4020f4 InternetCloseHandle
urlmon.dll
0x4020fc URLDownloadToFileW
KERNEL32.dll
0x402000 SetUnhandledExceptionFilter
0x402004 GetStartupInfoA
0x402008 GetTickCount
0x40200c ExpandEnvironmentStringsW
0x402010 CreateFileW
0x402014 WriteFile
0x402018 CloseHandle
0x40201c DeleteFileW
0x402020 CreateProcessW
0x402024 Sleep
0x402028 QueryPerformanceCounter
0x40202c GetCurrentThreadId
0x402030 GetCurrentProcessId
0x402034 GetSystemTimeAsFileTime
0x402038 TerminateProcess
0x40203c GetCurrentProcess
0x402040 UnhandledExceptionFilter
0x402044 IsDebuggerPresent
0x402048 InterlockedCompareExchange
0x40204c InterlockedExchange
USER32.dll
0x4020d8 wsprintfW
EAT(Export Address Table) is none
SHLWAPI.dll
0x4020d0 PathFileExistsW
MSVCR90.dll
0x402054 __set_app_type
0x402058 ?terminate@@YAXXZ
0x40205c _unlock
0x402060 _encode_pointer
0x402064 _lock
0x402068 _onexit
0x40206c _decode_pointer
0x402070 _except_handler4_common
0x402074 _invoke_watson
0x402078 _controlfp_s
0x40207c __p__fmode
0x402080 __p__commode
0x402084 _adjust_fdiv
0x402088 __setusermatherr
0x40208c _configthreadlocale
0x402090 _initterm_e
0x402094 _initterm
0x402098 _acmdln
0x40209c exit
0x4020a0 _ismbblead
0x4020a4 _XcptFilter
0x4020a8 _exit
0x4020ac _cexit
0x4020b0 __getmainargs
0x4020b4 _amsg_exit
0x4020b8 srand
0x4020bc rand
0x4020c0 memset
0x4020c4 __dllonexit
0x4020c8 _crt_debugger_hook
WININET.dll
0x4020e0 InternetOpenA
0x4020e4 InternetOpenUrlA
0x4020e8 InternetOpenW
0x4020ec InternetOpenUrlW
0x4020f0 InternetReadFile
0x4020f4 InternetCloseHandle
urlmon.dll
0x4020fc URLDownloadToFileW
KERNEL32.dll
0x402000 SetUnhandledExceptionFilter
0x402004 GetStartupInfoA
0x402008 GetTickCount
0x40200c ExpandEnvironmentStringsW
0x402010 CreateFileW
0x402014 WriteFile
0x402018 CloseHandle
0x40201c DeleteFileW
0x402020 CreateProcessW
0x402024 Sleep
0x402028 QueryPerformanceCounter
0x40202c GetCurrentThreadId
0x402030 GetCurrentProcessId
0x402034 GetSystemTimeAsFileTime
0x402038 TerminateProcess
0x40203c GetCurrentProcess
0x402040 UnhandledExceptionFilter
0x402044 IsDebuggerPresent
0x402048 InterlockedCompareExchange
0x40204c InterlockedExchange
USER32.dll
0x4020d8 wsprintfW
EAT(Export Address Table) is none