Report - asec.exe

Generic Malware UPX Antivirus PE File PE32 PowerShell
ScreenShot
Created 2024.07.26 12:03 Machine s1_win7_x6403
Filename asec.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
7.8
ZERO API file : malware
VT API (file)
md5 132609f10f23a5a1fc5653ae7e91bdb2
sha256 9a53a95b0c1288c8e723030c47029455cb2c15ab69732f2a9fc2aad6b418a200
ssdeep 192:B2Zxy66nOB3ZC3S+42V+GyEG9malsDfxuCnJx3ptpJ+fl:B2Zxy66nOB3g3c2EQG9blsD885Q
imphash 22c0c61660a8e80d6f4e2f4b1206b0d6
impfuzzy 12:mD1ixKJNKF6GZ4GnXf3D1FWqj7UAa5XJwdqzTZBzhPPXJYsTd9wd9szudRgFRq2L:eixKktNnv5FQ71Bz9vUdKzudMk2L
  Network IP location

Signature (17cnts)

Level Description
danger Disables Windows Security features
danger Stops Windows services
watch Attempts to disable Windows Auto Updates
watch Attempts to stop active services
watch Communicates with host for which no DNS query was performed
watch Modifies security center warnings
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info Uses Windows APIs to generate a cryptographic key

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
144.160.159.21 US AMERITECH-AS 144.160.159.21 clean
144.160.235.143 US AMERITECH-AS 144.160.235.143 clean
67.195.204.80 US YAHOO-3 67.195.204.80 clean

Suricata ids

PE API

IAT(Import Address Table) Library

MSVCR90.dll
 0x402054 _onexit
 0x402058 _decode_pointer
 0x40205c _except_handler4_common
 0x402060 _lock
 0x402064 _controlfp_s
 0x402068 _crt_debugger_hook
 0x40206c __dllonexit
 0x402070 _unlock
 0x402074 ?terminate@@YAXXZ
 0x402078 __set_app_type
 0x40207c _encode_pointer
 0x402080 __p__fmode
 0x402084 __p__commode
 0x402088 _adjust_fdiv
 0x40208c __setusermatherr
 0x402090 _configthreadlocale
 0x402094 _initterm_e
 0x402098 _initterm
 0x40209c _acmdln
 0x4020a0 _ismbblead
 0x4020a4 exit
 0x4020a8 _XcptFilter
 0x4020ac _exit
 0x4020b0 _cexit
 0x4020b4 __getmainargs
 0x4020b8 _invoke_watson
 0x4020bc _amsg_exit
KERNEL32.dll
 0x402018 UnhandledExceptionFilter
 0x40201c GetCurrentProcess
 0x402020 TerminateProcess
 0x402024 GetSystemTimeAsFileTime
 0x402028 GetCurrentProcessId
 0x40202c GetCurrentThreadId
 0x402030 GetTickCount
 0x402034 QueryPerformanceCounter
 0x402038 SetUnhandledExceptionFilter
 0x40203c GetStartupInfoA
 0x402040 InterlockedCompareExchange
 0x402044 InterlockedExchange
 0x402048 Sleep
 0x40204c IsDebuggerPresent
ADVAPI32.dll
 0x402000 RegSetValueExA
 0x402004 RegCloseKey
 0x402008 RegCreateKeyExW
 0x40200c RegOpenKeyExA
 0x402010 RegOpenKeyExW
SHELL32.dll
 0x4020c4 ShellExecuteW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure