Report - IMG_8729.scr

Gen1 Generic Malware Malicious Library UPX Http API HTTP Code injection Internet API Anti_VM AntiDebug AntiVM PE File PE64 OS Processor Check
ScreenShot
Created 2024.08.02 09:35 Machine s1_win7_x6401
Filename IMG_8729.scr
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
1
Behavior Score
12.0
ZERO API file : clean
VT API (file) 15 detected (malicious, moderate confidence, Attribute, HighConfidence, FileRepMalware, Misc, Demp, bqcy, YzY0On3Q9DfmGSYK, Siggen29, Wacatac, Outbreak)
md5 7a9e91cd05bb23625354d0f46066904c
sha256 bbbfdf66e9c773bcad95c6cd2e89a596620f417175de712269689b08f2643a40
ssdeep 49152:BYyqyQ4SjTErF0JwHoLjhbi4zmkKm0W85GNLZLgKT/MNMNngOdTMnWAqkeKbr3kg:PgR2HoLtb
imphash 047d98f937ae32f3e871dba356d02464
impfuzzy 24:aYOKojb+DW1mDrc+WcJBlM0qteTS1VgGYro6SZMv1jMAkpOovbOPZS:aYODarc+HOteTS1VgG0mZGF3k
  Network IP location

Signature (28cnts)

Level Description
danger Executed a process and injected code into it
watch A command shell or script process was created by an unexpected parent process
watch Allocates execute permission to another process indicative of possible code injection
watch Communicates with host for which no DNS query was performed
watch Creates a thread using NtQueueApcThread in a remote process potentially indicative of process injection
watch File has been identified by 15 AntiVirus engines on VirusTotal as malicious
watch One or more non-whitelisted processes were created
watch One or more of the buffers contains an embedded PE file
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Potentially malicious URLs were found in the process memory dump
notice Searches running processes potentially to identify processes for sandbox evasion
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info Tries to locate where the browsers are installed

Rules (21cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
notice Code_injection Code injection with CreateRemoteThread in a remote process memory
notice Network_HTTP Communications over HTTP memory
notice Str_Win32_Http_API Match Windows Http API call memory
notice Str_Win32_Internet_API Match Windows Inet API call memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://91.92.255.73/v9/qlmz.php?mfgb=35&yjhl=a2VkYi5leGU%3D Unknown 91.92.255.73 clean
http://91.92.255.73/v9/qlmz.php?mfgb=6 Unknown 91.92.255.73 clean
http://91.92.255.73/v9/qlmz.php?mfgb=5 Unknown 91.92.255.73 clean
91.92.255.73 Unknown 91.92.255.73 clean

Suricata ids

PE API

IAT(Import Address Table) Library

SHELL32.dll
 0x1400e62c8 ShellExecuteExW
 0x1400e62d0 SHGetSpecialFolderPathW
 0x1400e62d8 SHGetFolderPathW
 0x1400e62e0 SHGetKnownFolderPath
 0x1400e62e8 ShellExecuteW
SHLWAPI.dll
 0x1400e62f8 PathFileExistsW
KERNEL32.dll
 0x1400e6000 IsProcessorFeaturePresent
 0x1400e6008 SetEndOfFile
 0x1400e6010 WriteConsoleW
 0x1400e6018 HeapSize
 0x1400e6020 CreateFileW
 0x1400e6028 SetStdHandle
 0x1400e6030 GetProcessHeap
 0x1400e6038 DeleteFileW
 0x1400e6040 CloseHandle
 0x1400e6048 GetLastError
 0x1400e6050 WaitForSingleObject
 0x1400e6058 CreateMutexA
 0x1400e6060 Sleep
 0x1400e6068 GetExitCodeProcess
 0x1400e6070 FreeLibrary
 0x1400e6078 GetModuleFileNameW
 0x1400e6080 GetProcAddress
 0x1400e6088 LoadResource
 0x1400e6090 LockResource
 0x1400e6098 SizeofResource
 0x1400e60a0 LoadLibraryA
 0x1400e60a8 FindResourceA
 0x1400e60b0 CopyFileW
 0x1400e60b8 MultiByteToWideChar
 0x1400e60c0 WideCharToMultiByte
 0x1400e60c8 EnterCriticalSection
 0x1400e60d0 LeaveCriticalSection
 0x1400e60d8 DeleteCriticalSection
 0x1400e60e0 EncodePointer
 0x1400e60e8 DecodePointer
 0x1400e60f0 SetLastError
 0x1400e60f8 InitializeCriticalSectionAndSpinCount
 0x1400e6100 TlsAlloc
 0x1400e6108 TlsGetValue
 0x1400e6110 TlsSetValue
 0x1400e6118 TlsFree
 0x1400e6120 GetSystemTimeAsFileTime
 0x1400e6128 GetModuleHandleW
 0x1400e6130 LCMapStringW
 0x1400e6138 GetLocaleInfoW
 0x1400e6140 GetStringTypeW
 0x1400e6148 GetCPInfo
 0x1400e6150 RtlCaptureContext
 0x1400e6158 RtlLookupFunctionEntry
 0x1400e6160 RtlVirtualUnwind
 0x1400e6168 IsDebuggerPresent
 0x1400e6170 UnhandledExceptionFilter
 0x1400e6178 SetUnhandledExceptionFilter
 0x1400e6180 GetStartupInfoW
 0x1400e6188 RtlUnwind
 0x1400e6190 GetCurrentProcess
 0x1400e6198 TerminateProcess
 0x1400e61a0 QueryPerformanceCounter
 0x1400e61a8 GetCurrentProcessId
 0x1400e61b0 GetCurrentThreadId
 0x1400e61b8 InitializeSListHead
 0x1400e61c0 RtlPcToFileHeader
 0x1400e61c8 RaiseException
 0x1400e61d0 RtlUnwindEx
 0x1400e61d8 LoadLibraryExW
 0x1400e61e0 ExitProcess
 0x1400e61e8 GetModuleHandleExW
 0x1400e61f0 GetStdHandle
 0x1400e61f8 WriteFile
 0x1400e6200 HeapFree
 0x1400e6208 HeapAlloc
 0x1400e6210 IsValidLocale
 0x1400e6218 GetUserDefaultLCID
 0x1400e6220 EnumSystemLocalesW
 0x1400e6228 GetFileType
 0x1400e6230 FlushFileBuffers
 0x1400e6238 GetConsoleCP
 0x1400e6240 GetConsoleMode
 0x1400e6248 ReadFile
 0x1400e6250 GetFileSizeEx
 0x1400e6258 SetFilePointerEx
 0x1400e6260 ReadConsoleW
 0x1400e6268 HeapReAlloc
 0x1400e6270 FindClose
 0x1400e6278 FindFirstFileExW
 0x1400e6280 FindNextFileW
 0x1400e6288 IsValidCodePage
 0x1400e6290 GetACP
 0x1400e6298 GetOEMCP
 0x1400e62a0 GetCommandLineA
 0x1400e62a8 GetCommandLineW
 0x1400e62b0 GetEnvironmentStringsW
 0x1400e62b8 FreeEnvironmentStringsW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure