Report - RP.exe

Generic Malware Malicious Library UPX PE File PE64 OS Processor Check
ScreenShot
Created 2024.07.26 10:48 Machine s1_win7_x6403
Filename RP.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
2
Behavior Score
2.0
ZERO API file : mailcious
VT API (file) 57 detected (AIDetectMalware, RottenPotato, malicious, high confidence, score, Generic PUP, Unsafe, Vtxv, Hacktool, Rotpotato, JuicyPotato, Tool, ggktja, CLOUD, zdeuc, R002C0PH523, RPotato, Detected, Malware@#2gv803ec2hv58, Presenoker, Eldorado, R649243, Gencirc, GenAsa, Q0+kINxFBkI, Potato, susgen, confidence, 100%)
md5 3fc6176c962e7a70da7cc35fbdaf3fdc
sha256 0fb342f94f359c9f54205a979854b7a3a3910bb7e118f0fc44cead28ebd81f0d
ssdeep 6144:Ifb2qZR/Ir/fvq7PjtsDMoxyhluYOVI9/j5q2Bfui+tvvvvRtAQ:IT2qZR/ITf6rYrebjS
imphash 0705dbbe2c1de90903291dcc72a5d6a0
impfuzzy 96:wW3BIa9aXNyrteS1scg+CuBzIJ9lX174lnM+:wWRf9a9e0JbF7Uv
  Network IP location

Signature (4cnts)

Level Description
danger File has been identified by 57 AntiVirus engines on VirusTotal as malicious
notice Starts servers listening
info Collects information to fingerprint the system (MachineGuid
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

Secur32.dll
 0x140037390 AcquireCredentialsHandleW
 0x140037398 QuerySecurityContextToken
 0x1400373a0 AcceptSecurityContext
KERNEL32.dll
 0x140037028 CreateThread
 0x140037030 Sleep
 0x140037038 LoadLibraryW
 0x140037040 GetLastError
 0x140037048 GetCurrentProcess
 0x140037050 GetModuleFileNameA
 0x140037058 UnregisterWaitEx
 0x140037060 QueryDepthSList
 0x140037068 InterlockedPopEntrySList
 0x140037070 ReleaseSemaphore
 0x140037078 DuplicateHandle
 0x140037080 VirtualFree
 0x140037088 VirtualProtect
 0x140037090 VirtualAlloc
 0x140037098 GetVersionExW
 0x1400370a0 GetModuleHandleA
 0x1400370a8 FreeLibraryAndExitThread
 0x1400370b0 GetThreadTimes
 0x1400370b8 UnregisterWait
 0x1400370c0 RegisterWaitForSingleObject
 0x1400370c8 SetThreadAffinityMask
 0x1400370d0 GetProcessAffinityMask
 0x1400370d8 GetNumaHighestNodeNumber
 0x1400370e0 DeleteTimerQueueTimer
 0x1400370e8 ChangeTimerQueueTimer
 0x1400370f0 CreateTimerQueueTimer
 0x1400370f8 GetLogicalProcessorInformation
 0x140037100 RtlCaptureContext
 0x140037108 RtlLookupFunctionEntry
 0x140037110 RtlVirtualUnwind
 0x140037118 UnhandledExceptionFilter
 0x140037120 SetUnhandledExceptionFilter
 0x140037128 TerminateProcess
 0x140037130 IsProcessorFeaturePresent
 0x140037138 QueryPerformanceCounter
 0x140037140 GetCurrentProcessId
 0x140037148 GetCurrentThreadId
 0x140037150 GetSystemTimeAsFileTime
 0x140037158 InitializeSListHead
 0x140037160 IsDebuggerPresent
 0x140037168 GetStartupInfoW
 0x140037170 GetModuleHandleW
 0x140037178 EnterCriticalSection
 0x140037180 LeaveCriticalSection
 0x140037188 TryEnterCriticalSection
 0x140037190 DeleteCriticalSection
 0x140037198 WideCharToMultiByte
 0x1400371a0 SetLastError
 0x1400371a8 InitializeCriticalSectionAndSpinCount
 0x1400371b0 CreateEventW
 0x1400371b8 TlsAlloc
 0x1400371c0 TlsGetValue
 0x1400371c8 TlsSetValue
 0x1400371d0 TlsFree
 0x1400371d8 GetTickCount
 0x1400371e0 GetProcAddress
 0x1400371e8 RtlUnwindEx
 0x1400371f0 RtlPcToFileHeader
 0x1400371f8 EncodePointer
 0x140037200 RaiseException
 0x140037208 InterlockedPushEntrySList
 0x140037210 InterlockedFlushSList
 0x140037218 FreeLibrary
 0x140037220 LoadLibraryExW
 0x140037228 GetStdHandle
 0x140037230 WriteFile
 0x140037238 GetModuleFileNameW
 0x140037240 DecodePointer
 0x140037248 MultiByteToWideChar
 0x140037250 ExitProcess
 0x140037258 GetModuleHandleExW
 0x140037260 GetCommandLineA
 0x140037268 GetCommandLineW
 0x140037270 GetACP
 0x140037278 HeapAlloc
 0x140037280 HeapFree
 0x140037288 CompareStringW
 0x140037290 LCMapStringW
 0x140037298 GetFileType
 0x1400372a0 GetCurrentThread
 0x1400372a8 CloseHandle
 0x1400372b0 WaitForSingleObjectEx
 0x1400372b8 FindClose
 0x1400372c0 FindFirstFileExA
 0x1400372c8 FindNextFileA
 0x1400372d0 IsValidCodePage
 0x1400372d8 GetOEMCP
 0x1400372e0 GetCPInfo
 0x1400372e8 GetEnvironmentStringsW
 0x1400372f0 FreeEnvironmentStringsW
 0x1400372f8 SetEnvironmentVariableA
 0x140037300 SetStdHandle
 0x140037308 GetStringTypeW
 0x140037310 GetProcessHeap
 0x140037318 FlushFileBuffers
 0x140037320 GetConsoleCP
 0x140037328 GetConsoleMode
 0x140037330 HeapSize
 0x140037338 HeapReAlloc
 0x140037340 SetFilePointerEx
 0x140037348 WriteConsoleW
 0x140037350 CreateFileW
 0x140037358 CreateTimerQueue
 0x140037360 SetEvent
 0x140037368 SignalObjectAndWait
 0x140037370 SwitchToThread
 0x140037378 SetThreadPriority
 0x140037380 GetThreadPriority
ADVAPI32.dll
 0x140037000 AdjustTokenPrivileges
 0x140037008 LookupPrivilegeValueW
 0x140037010 OpenProcessToken
 0x140037018 CreateProcessWithTokenW
ole32.dll
 0x140037430 CoTaskMemAlloc
 0x140037438 CLSIDFromString
 0x140037440 StgCreateDocfileOnILockBytes
 0x140037448 CoGetInstanceFromIStorage
 0x140037450 CoInitialize
 0x140037458 CreateILockBytesOnHGlobal
WS2_32.dll
 0x1400373b0 shutdown
 0x1400373b8 recv
 0x1400373c0 send
 0x1400373c8 closesocket
 0x1400373d0 connect
 0x1400373d8 freeaddrinfo
 0x1400373e0 socket
 0x1400373e8 WSACleanup
 0x1400373f0 getaddrinfo
 0x1400373f8 WSAStartup
 0x140037400 accept
 0x140037408 select
 0x140037410 ind
 0x140037418 listen
 0x140037420 WSAGetLastError

EAT(Export Address Table) Library

0x1400018b0 ??0CMSFRottenPotato@@QEAA@XZ
0x140001870 ??4CMSFRottenPotato@@QEAAAEAV0@$$QEAV0@@Z
0x140001850 ??4CMSFRottenPotato@@QEAAAEAV0@AEBV0@@Z
0x140001890 ?__autoclassinit2@CMSFRottenPotato@@QEAAX_K@Z
0x140001ac0 ?findNTLMBytes@CMSFRottenPotato@@AEAAHPEADH@Z
0x140050810 ?newConnection@CMSFRottenPotato@@0HA
0x140001b20 ?processNtlmBytes@CMSFRottenPotato@@AEAAHPEADH@Z
0x140002140 ?startCOMListener@CMSFRottenPotato@@QEAAHXZ
0x140001a50 ?startCOMListenerThread@CMSFRottenPotato@@QEAAKXZ
0x140001db0 ?startRPCConnection@CMSFRottenPotato@@QEAAHXZ
0x140001a00 ?startRPCConnectionThread@CMSFRottenPotato@@QEAAKXZ
0x140001ab0 ?staticStartCOMListener@CMSFRottenPotato@@CAKPEAX@Z
0x140001aa0 ?staticStartRPCConnection@CMSFRottenPotato@@CAKPEAX@Z
0x140001c80 ?triggerDCOM@CMSFRottenPotato@@QEAAHXZ


Similarity measure (PE file only) - Checking for service failure