Report - svhostc.exe

Malicious Library UPX Http API HTTP Internet API AntiDebug AntiVM PE File PE32 OS Processor Check
ScreenShot
Created 2024.07.29 13:51 Machine s1_win7_x6401
Filename svhostc.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
8.2
ZERO API file : malware
VT API (file) 56 detected (AIDetectMalware, Injuke, malicious, high confidence, score, Lockbit, Jaik, Unsafe, Save, Midie, Attribute, HighConfidence, Kryptik, HXPN, Artemis, PWSX, SmokeLoader, CLASSIC, AceCrypter, ojldh, Inject5, AMADEY, YXEG2Z, Real Protect, moderate, Static AI, Malicious PE, Detected, ai score=88, Convagent, Sabsik, Multiverze, ABTrojan, OGWN, ZexaF, Ay0@amtYgpiG, Chgt, Obfuscated, GenKryptik, EWCW, confidence, 100%)
md5 ae3dd2f4488753b690ca17d555147aba
sha256 77bdb3c46654446f1edffd1a388e3f64d8ca4dc24acd9575b95e94c26b8b43fe
ssdeep 6144:aPvOGvTbPoC8lV5AdpKndv8w7UkvKw1SthsFLDXW7nX9TCR/QYZuWDv7ZNk:aPzv3PL8lV6IxV/Kmes1Dm5SQYZuWX
imphash 976b33a49b3619a38b3ab50dd40fd590
impfuzzy 24:lQu9zDjkrXDN9fn3mqICNTKr1PDiOXtUUncQIlyv9Mh0HE/J3IjS3Ml/AAQhcK6c:uXfnOr1pXtzcHK9e7MSE/AAQaK6T+Y6B
  Network IP location

Signature (16cnts)

Level Description
danger File has been identified by 56 AntiVirus engines on VirusTotal as malicious
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Installs itself for autorun at Windows startup
watch Potential code injection by writing to the memory of another process
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Used NtSetContextThread to modify a thread in a remote process indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates hidden or system file
notice Moves the original executable to a new location
notice One or more potentially interesting buffers were extracted
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks if process is being debugged by a debugger
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (16cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice Network_HTTP Communications over HTTP memory
notice Str_Win32_Http_API Match Windows Http API call memory
notice Str_Win32_Internet_API Match Windows Inet API call memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
api.telegram.org GB Telegram Messenger Inc 149.154.167.220 mailcious
149.154.167.220 GB Telegram Messenger Inc 149.154.167.220 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x44b010 LocalCompact
 0x44b014 EnumCalendarInfoW
 0x44b018 SetEnvironmentVariableW
 0x44b01c GetTickCount
 0x44b020 CreateNamedPipeW
 0x44b024 GetConsoleAliasesA
 0x44b028 EnumResourceTypesA
 0x44b02c GetConsoleCP
 0x44b030 GlobalAlloc
 0x44b034 SetFileShortNameW
 0x44b038 LoadLibraryW
 0x44b03c IsProcessInJob
 0x44b040 FatalAppExitW
 0x44b044 AssignProcessToJobObject
 0x44b048 IsBadCodePtr
 0x44b04c GetModuleFileNameW
 0x44b050 GetSystemDirectoryA
 0x44b054 ReplaceFileA
 0x44b058 GlobalUnlock
 0x44b05c CreateJobObjectA
 0x44b060 GetLastError
 0x44b064 WriteConsoleInputW
 0x44b068 VerLanguageNameW
 0x44b06c LoadLibraryA
 0x44b070 SetConsoleCtrlHandler
 0x44b074 AddAtomW
 0x44b078 HeapWalk
 0x44b07c GetOEMCP
 0x44b080 EnumDateFormatsA
 0x44b084 GetModuleHandleA
 0x44b088 GetProcessShutdownParameters
 0x44b08c EnumResourceNamesA
 0x44b090 GetFileTime
 0x44b094 PeekConsoleInputA
 0x44b098 GetDiskFreeSpaceExA
 0x44b09c LCMapStringW
 0x44b0a0 HeapSize
 0x44b0a4 GetStringTypeW
 0x44b0a8 WriteConsoleW
 0x44b0ac FindVolumeClose
 0x44b0b0 HeapCompact
 0x44b0b4 GetProcAddress
 0x44b0b8 CreateFileA
 0x44b0bc FlushFileBuffers
 0x44b0c0 HeapReAlloc
 0x44b0c4 GetCommandLineW
 0x44b0c8 HeapSetInformation
 0x44b0cc GetStartupInfoW
 0x44b0d0 DecodePointer
 0x44b0d4 UnhandledExceptionFilter
 0x44b0d8 SetUnhandledExceptionFilter
 0x44b0dc IsDebuggerPresent
 0x44b0e0 EncodePointer
 0x44b0e4 TerminateProcess
 0x44b0e8 GetCurrentProcess
 0x44b0ec HeapAlloc
 0x44b0f0 HeapFree
 0x44b0f4 EnterCriticalSection
 0x44b0f8 LeaveCriticalSection
 0x44b0fc SetHandleCount
 0x44b100 GetStdHandle
 0x44b104 InitializeCriticalSectionAndSpinCount
 0x44b108 GetFileType
 0x44b10c DeleteCriticalSection
 0x44b110 MultiByteToWideChar
 0x44b114 ReadFile
 0x44b118 GetModuleHandleW
 0x44b11c ExitProcess
 0x44b120 SetFilePointer
 0x44b124 HeapCreate
 0x44b128 CloseHandle
 0x44b12c WriteFile
 0x44b130 FreeEnvironmentStringsW
 0x44b134 GetEnvironmentStringsW
 0x44b138 TlsAlloc
 0x44b13c TlsGetValue
 0x44b140 TlsSetValue
 0x44b144 TlsFree
 0x44b148 InterlockedIncrement
 0x44b14c SetLastError
 0x44b150 GetCurrentThreadId
 0x44b154 InterlockedDecrement
 0x44b158 QueryPerformanceCounter
 0x44b15c GetCurrentProcessId
 0x44b160 GetSystemTimeAsFileTime
 0x44b164 WideCharToMultiByte
 0x44b168 GetConsoleMode
 0x44b16c GetCPInfo
 0x44b170 GetACP
 0x44b174 IsValidCodePage
 0x44b178 Sleep
 0x44b17c RtlUnwind
 0x44b180 SetStdHandle
 0x44b184 IsProcessorFeaturePresent
 0x44b188 CreateFileW
USER32.dll
 0x44b198 CharUpperBuffA
 0x44b19c GetMessageExtraInfo
 0x44b1a0 SetCaretPos
 0x44b1a4 GetMenu
 0x44b1a8 DrawStateW
 0x44b1ac GetSysColorBrush
GDI32.dll
 0x44b000 GetCharWidthI
 0x44b004 CreateDCA
 0x44b008 GetCharABCWidthsI
WINHTTP.dll
 0x44b1b4 WinHttpOpen
MSIMG32.dll
 0x44b190 AlphaBlend

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure