Report - RingQ.exe

UPX PE File PE64 OS Processor Check
ScreenShot
Created 2024.08.05 09:34 Machine s1_win7_x6401
Filename RingQ.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
5
Behavior Score
2.4
ZERO API file : mailcious
VT API (file) 43 detected (AIDetectMalware, Windows, Hacktool, RingQ, Malicious, score, Unsafe, GenericKD, V0lh, Attribute, HighConfidence, DropperX, MalwareX, SjRX8iBEshN, ynwlh, R002C0DH124, Detected, ai score=81, GrayWare, Wacapew, Graftor, ABTrojan, NJBI, GdSda, Gencirc, confidence)
md5 37dee1de8dfc6871a92f48937810af37
sha256 c5004bdf7845cddf0075a993b6f8ea8103c6d8fc76ccedc973e2a2bbf465bf9c
ssdeep 6144:hQoiDwTbrIZWpyboi2E79IX28mAQmFpPuNftHG0CLipmdRR8A/RRcdSd9JwjmXfV:hIDctycgIX/PuNFwLPJwmfLY/
imphash a1c7e2ca2d789f3f7ea35f0e2afce0c9
impfuzzy 48:hWMroQCcOh1rDhC0xQxoIDmQpmJlL6exz9zJhHkM/2zoaqgbZK:hWmoQCcOh1rDhC0xQxoICvJx6exZtlk4
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 43 AntiVirus engines on VirusTotal as malicious
notice A process attempted to delay the analysis task.
notice Foreign language identified in PE resource
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (4cnts)

Level Name Description Collection
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x14001de68 AcquireSRWLockExclusive
 0x14001de70 CloseHandle
 0x14001de78 CompareStringEx
 0x14001de80 CreateFileA
 0x14001de88 DecodePointer
 0x14001de90 DeleteCriticalSection
 0x14001de98 EncodePointer
 0x14001dea0 EnterCriticalSection
 0x14001dea8 ExitProcess
 0x14001deb0 FreeLibrary
 0x14001deb8 GetCPInfo
 0x14001dec0 GetCurrentDirectoryA
 0x14001dec8 GetCurrentProcess
 0x14001ded0 GetCurrentProcessId
 0x14001ded8 GetCurrentThreadId
 0x14001dee0 GetLocaleInfoEx
 0x14001dee8 GetModuleHandleA
 0x14001def0 GetModuleHandleExW
 0x14001def8 GetModuleHandleW
 0x14001df00 GetProcAddress
 0x14001df08 GetSystemTimeAsFileTime
 0x14001df10 InitializeCriticalSectionEx
 0x14001df18 InitializeSListHead
 0x14001df20 IsDebuggerPresent
 0x14001df28 IsProcessorFeaturePresent
 0x14001df30 LCIDToLocaleName
 0x14001df38 LCMapStringEx
 0x14001df40 LeaveCriticalSection
 0x14001df48 LoadLibraryA
 0x14001df50 MultiByteToWideChar
 0x14001df58 QueryPerformanceCounter
 0x14001df60 QueryPerformanceFrequency
 0x14001df68 RaiseException
 0x14001df70 ReleaseSRWLockExclusive
 0x14001df78 RtlCaptureContext
 0x14001df80 RtlLookupFunctionEntry
 0x14001df88 RtlUnwindEx
 0x14001df90 RtlVirtualUnwind
 0x14001df98 SetUnhandledExceptionFilter
 0x14001dfa0 Sleep
 0x14001dfa8 SleepConditionVariableSRW
 0x14001dfb0 TerminateProcess
 0x14001dfb8 UnhandledExceptionFilter
 0x14001dfc0 VirtualProtect
 0x14001dfc8 VirtualQuery
 0x14001dfd0 WakeAllConditionVariable
 0x14001dfd8 WideCharToMultiByte
 0x14001dfe0 WriteFile
 0x14001dfe8 WriteProcessMemory
USER32.dll
 0x14001dff8 LoadStringW
WININET.dll
 0x14001e008 InternetCloseHandle
 0x14001e010 InternetOpenUrlA
 0x14001e018 InternetOpenW
 0x14001e020 InternetReadFile
msvcrt.dll
 0x14001e030 ?_set_new_mode@@YAHH@Z
 0x14001e038 ?terminate@@YAXXZ
 0x14001e040 _CxxThrowException
 0x14001e048 _XcptFilter
 0x14001e050 __C_specific_handler
 0x14001e058 __CxxFrameHandler3
 0x14001e060 __DestructExceptionObject
 0x14001e068 ___lc_codepage_func
 0x14001e070 ___lc_collate_cp_func
 0x14001e078 ___lc_handle_func
 0x14001e080 __argc
 0x14001e088 __argv
 0x14001e090 __getmainargs
 0x14001e098 __pctype_func
 0x14001e0a0 __set_app_type
 0x14001e0a8 __strncnt
 0x14001e0b0 __uncaught_exception
 0x14001e0b8 _amsg_exit
 0x14001e0c0 _callnewh
 0x14001e0c8 _commode
 0x14001e0d0 _environ
 0x14001e0d8 _errno
 0x14001e0e0 _fileno
 0x14001e0e8 _fseeki64
 0x14001e0f0 _fsopen
 0x14001e0f8 _initterm
 0x14001e100 _initterm_e
 0x14001e108 _iob
 0x14001e110 _isatty
 0x14001e118 _local_unwind
 0x14001e120 _lock
 0x14001e128 _msize
 0x14001e130 _set_fmode
 0x14001e138 _time64
 0x14001e140 _unlock
 0x14001e148 _wcsdup
 0x14001e150 abort
 0x14001e158 calloc
 0x14001e160 fclose
 0x14001e168 fflush
 0x14001e170 fgetc
 0x14001e178 fgetpos
 0x14001e180 fread
 0x14001e188 free
 0x14001e190 fseek
 0x14001e198 fsetpos
 0x14001e1a0 islower
 0x14001e1a8 isupper
 0x14001e1b0 malloc
 0x14001e1b8 memchr
 0x14001e1c0 memcmp
 0x14001e1c8 memcpy
 0x14001e1d0 memmove
 0x14001e1d8 memset
 0x14001e1e0 rand
 0x14001e1e8 realloc
 0x14001e1f0 setvbuf
 0x14001e1f8 srand
 0x14001e200 strchr
 0x14001e208 strcpy_s
 0x14001e210 strlen
 0x14001e218 ungetc
 0x14001e220 wcslen
 0x14001e228 wcsrchr

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure