Report - buildz.exe

Suspicious_Script_Bin Malicious Library UPX Socket DGA Http API ScreenShot PWS DNS Internet API AntiDebug AntiVM PE File PE32 OS Processor Check
ScreenShot
Created 2024.08.09 07:53 Machine s1_win7_x6403
Filename buildz.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
9
Behavior Score
4.8
ZERO API file : malware
VT API (file)
md5 b7cb7f2b5cd9bd047710650295dc88f7
sha256 e01c0429a58b33013305aab35ef863cd2b88962e479e39566a687ca37c68510f
ssdeep 12288:9CwgCcyMy1Nncixi2NWXCAcrIQBjljKsFKfFDKZNF:9cCp9KGiAAcUwjljKAK8ZNF
imphash 8476d457b634f13fb056aaafe72c2253
impfuzzy 24:9LFkrePMDo6lklUYtJulRe2cfUcHuOZyv4hvT4QjMFluo3gvE:EkAClUYGvcfUMuyvcdsE3
  Network IP location

Signature (11cnts)

Level Description
watch Attempts to create or modify system certificates
watch Installs itself for autorun at Windows startup
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch Uses suspicious command line tools or Windows utilities
notice Foreign language identified in PE resource
notice Performs some HTTP requests
notice Potentially malicious URLs were found in the process memory dump
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (22cnts)

Level Name Description Collection
warning Suspicious_Obfuscation_Script_2 Suspicious obfuscation script (e.g. executable files) binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice Generic_PWS_Memory_Zero PWS Memory memory
notice Network_DGA Communication using DGA memory
notice Network_DNS Communications use DNS memory
notice Network_TCP_Socket Communications over RAW Socket memory
notice ScreenShot Take ScreenShot memory
notice Str_Win32_Http_API Match Windows Http API call memory
notice Str_Win32_Internet_API Match Windows Inet API call memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://cajgtus.com/lancer/get.php?pid=06280D9CD13939E9B7E95CDCAA6A83CC&first=true KR Korea Telecom 183.100.39.16 41241 mailcious
https://api.2ip.ua/geo.json US CLOUDFLARENET 104.21.65.24 clean
cajgtus.com EC Eliana Vanessa Morocho Ona 200.63.106.141 malware
api.2ip.ua US CLOUDFLARENET 104.21.65.24 clean
104.21.65.24 US CLOUDFLARENET 104.21.65.24 clean
2.185.214.11 IR Iran Telecommunication Company PJS 2.185.214.11 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x49e008 OpenJobObjectA
 0x49e00c InterlockedDecrement
 0x49e010 ZombifyActCtx
 0x49e014 FreeEnvironmentStringsA
 0x49e018 GetModuleHandleW
 0x49e01c GetConsoleAliasesA
 0x49e020 LoadLibraryW
 0x49e024 SetVolumeMountPointA
 0x49e028 WriteConsoleW
 0x49e02c GetAtomNameW
 0x49e030 SetUnhandledExceptionFilter
 0x49e034 GetProcAddress
 0x49e038 LoadLibraryA
 0x49e03c OpenWaitableTimerW
 0x49e040 LocalAlloc
 0x49e044 GetCommMask
 0x49e048 EnumDateFormatsA
 0x49e04c CreateWaitableTimerW
 0x49e050 lstrcatW
 0x49e054 FindFirstVolumeW
 0x49e058 AreFileApisANSI
 0x49e05c SetLastError
 0x49e060 GetNumaProcessorNode
 0x49e064 GetLastError
 0x49e068 HeapFree
 0x49e06c GetStartupInfoW
 0x49e070 TerminateProcess
 0x49e074 GetCurrentProcess
 0x49e078 UnhandledExceptionFilter
 0x49e07c IsDebuggerPresent
 0x49e080 HeapCreate
 0x49e084 VirtualFree
 0x49e088 DeleteCriticalSection
 0x49e08c LeaveCriticalSection
 0x49e090 EnterCriticalSection
 0x49e094 HeapAlloc
 0x49e098 VirtualAlloc
 0x49e09c HeapReAlloc
 0x49e0a0 Sleep
 0x49e0a4 ExitProcess
 0x49e0a8 WriteFile
 0x49e0ac GetStdHandle
 0x49e0b0 GetModuleFileNameA
 0x49e0b4 GetModuleFileNameW
 0x49e0b8 FreeEnvironmentStringsW
 0x49e0bc GetEnvironmentStringsW
 0x49e0c0 GetCommandLineW
 0x49e0c4 SetHandleCount
 0x49e0c8 GetFileType
 0x49e0cc GetStartupInfoA
 0x49e0d0 TlsGetValue
 0x49e0d4 TlsAlloc
 0x49e0d8 TlsSetValue
 0x49e0dc TlsFree
 0x49e0e0 InterlockedIncrement
 0x49e0e4 GetCurrentThreadId
 0x49e0e8 QueryPerformanceCounter
 0x49e0ec GetTickCount
 0x49e0f0 GetCurrentProcessId
 0x49e0f4 GetSystemTimeAsFileTime
 0x49e0f8 SetFilePointer
 0x49e0fc WideCharToMultiByte
 0x49e100 GetConsoleCP
 0x49e104 GetConsoleMode
 0x49e108 GetCPInfo
 0x49e10c GetACP
 0x49e110 GetOEMCP
 0x49e114 IsValidCodePage
 0x49e118 InitializeCriticalSectionAndSpinCount
 0x49e11c RtlUnwind
 0x49e120 MultiByteToWideChar
 0x49e124 SetStdHandle
 0x49e128 WriteConsoleA
 0x49e12c GetConsoleOutputCP
 0x49e130 LCMapStringA
 0x49e134 LCMapStringW
 0x49e138 GetStringTypeA
 0x49e13c GetStringTypeW
 0x49e140 GetLocaleInfoA
 0x49e144 FlushFileBuffers
 0x49e148 ReadFile
 0x49e14c HeapSize
 0x49e150 CreateFileA
 0x49e154 CloseHandle
ADVAPI32.dll
 0x49e000 ReadEventLogA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure