Report - 111.exe

PE File PE64
ScreenShot
Created 2024.08.05 07:49 Machine s1_win7_x6403
Filename 111.exe
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
AI Score
9
Behavior Score
4.0
ZERO API file : clean
VT API (file)
md5 89b20c121c799ab935bca4ce11e94b5b
sha256 5d21f768784b90fb7cd102077b0119af94acc15e57664a6b5372b67997792364
ssdeep 384:va7YyEUQnBxYA1lq3VWFdhZVG0UgqGFNi:vFUaxYnkFfZVr
imphash 3f071605b6b25d4e24602be1c4df49b5
impfuzzy 24:8fg1JlDzncJ8a0men0MG95XGDZykoDqx2ZC:8fg1jcJLe0RJGVykoqv
  Network IP location

Signature (7cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch Found potential shellcode being written to a memory region previously marked executable following DEP bypass in the process 111.exe
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
info Checks amount of memory in system
info One or more processes crashed

Rules (2cnts)

Level Name Description Collection
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
124.221.120.25 Unknown 124.221.120.25 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x40c218 DeleteCriticalSection
 0x40c220 EnterCriticalSection
 0x40c228 GetCurrentProcess
 0x40c230 GetCurrentProcessId
 0x40c238 GetCurrentThreadId
 0x40c240 GetLastError
 0x40c248 GetModuleHandleA
 0x40c250 GetProcAddress
 0x40c258 GetStartupInfoA
 0x40c260 GetSystemTimeAsFileTime
 0x40c268 GetTickCount
 0x40c270 InitializeCriticalSection
 0x40c278 LeaveCriticalSection
 0x40c280 QueryPerformanceCounter
 0x40c288 RtlAddFunctionTable
 0x40c290 RtlCaptureContext
 0x40c298 RtlLookupFunctionEntry
 0x40c2a0 RtlVirtualUnwind
 0x40c2a8 SetUnhandledExceptionFilter
 0x40c2b0 Sleep
 0x40c2b8 TerminateProcess
 0x40c2c0 TlsGetValue
 0x40c2c8 UnhandledExceptionFilter
 0x40c2d0 VirtualProtect
 0x40c2d8 VirtualQuery
msvcrt.dll
 0x40c2e8 __C_specific_handler
 0x40c2f0 __getmainargs
 0x40c2f8 __initenv
 0x40c300 __iob_func
 0x40c308 __lconv_init
 0x40c310 __set_app_type
 0x40c318 __setusermatherr
 0x40c320 _acmdln
 0x40c328 _amsg_exit
 0x40c330 _cexit
 0x40c338 _fmode
 0x40c340 _initterm
 0x40c348 _onexit
 0x40c350 abort
 0x40c358 calloc
 0x40c360 exit
 0x40c368 fprintf
 0x40c370 free
 0x40c378 fwrite
 0x40c380 malloc
 0x40c388 memcmp
 0x40c390 memcpy
 0x40c398 rand
 0x40c3a0 signal
 0x40c3a8 strlen
 0x40c3b0 strncmp
 0x40c3b8 vfprintf
 0x40c3c0 wcslen
RPCRT4.dll
 0x40c3d0 UuidFromStringA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure