Report - 베트남 녹지원 상춘재 행사 견적서.hwp .exe

Generic Malware Malicious Library UPX HWP PE File DllRegisterServer dll MSOffice File PE32 OS Processor Check DLL
ScreenShot
Created 2024.08.16 18:31 Machine s1_win7_x6401
Filename 베트남 녹지원 상춘재 행사 견적서.hwp .exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
5.6
ZERO API file : clean
VT API (file) 55 detected (RunDll, tr9E, malicious, high confidence, score, PUPXAF, 479232K, unsafe, GenericKD, Kimusky, Attribute, HighConfidence, Kimsuky, Artemis, acja, hcruhh, Generic@AI, RDML, K6Ty4w3M9JwFVXLyEX, Siggen2, KSDOORLDR, ZJGL, Detected, ai score=100, Malware@#37fplx3tp6d8, ABTrojan, JOPL, R302020, ZexaF, DuW@aOvXtLdO, BScope, Ekjl, +lEZb2zXVaM, susgen)
md5 35d60d2723c649c97b414b3cb701df1c
sha256 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab
ssdeep 3072:Gbd/5pl6sI/8EOoulXCjiaOOsJpAG9BU1cdvjbE:sdrI/XOlVaOO4zUM0
imphash dbb84ac19de4e93b0d617121bb8e25a8
impfuzzy 24:K1ct9FzSVvghavMucOovTsV3JekhcoXDnvelEu1EZjtNVcxjMKv2Gk:K4XzyNtL1cseeu10t7cJk
  Network IP location

Signature (15cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Foreign language identified in PE resource
notice Performs some HTTP requests
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (19cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (download)
info DllRegisterServer_Zero execute regsvr32.exe binaries (upload)
info HWP_file_format HWP Document File binaries (download)
info HWP_file_format HWP Document File binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://gaja79.com/link/fow-mh1004.html KR LG DACOM Corporation 182.162.73.77 clean
http://antichrist.or.kr/data/cheditor/dir1/lyric64 KR LG DACOM Corporation 182.162.73.77 clean
gaja79.com KR LG DACOM Corporation 182.162.73.77 clean
antichrist.or.kr KR LG DACOM Corporation 182.162.73.77 mailcious
182.162.73.77 KR LG DACOM Corporation 182.162.73.77 suspicious

Suricata ids

PE API

IAT(Import Address Table) Library

SHELL32.dll
 0x40a130 ShellExecuteA
 0x40a134 SHGetFolderPathA
 0x40a138 FindExecutableA
USER32.dll
 0x40a140 LoadStringA
KERNEL32.dll
 0x40a000 GetSystemTimeAsFileTime
 0x40a004 CreateFileW
 0x40a008 FlushFileBuffers
 0x40a00c LCMapStringEx
 0x40a010 CreateFileA
 0x40a014 FindResourceA
 0x40a018 LoadResource
 0x40a01c GetProcessHeap
 0x40a020 WriteFile
 0x40a024 SizeofResource
 0x40a028 lstrcatA
 0x40a02c SetCurrentDirectoryA
 0x40a030 GetLastError
 0x40a034 LockResource
 0x40a038 GetModuleFileNameA
 0x40a03c GetCurrentDirectoryA
 0x40a040 CloseHandle
 0x40a044 GetTempPathA
 0x40a048 lstrcpyA
 0x40a04c GetCommandLineA
 0x40a050 IsDebuggerPresent
 0x40a054 IsProcessorFeaturePresent
 0x40a058 EncodePointer
 0x40a05c DecodePointer
 0x40a060 HeapFree
 0x40a064 HeapAlloc
 0x40a068 RaiseException
 0x40a06c SetLastError
 0x40a070 InterlockedIncrement
 0x40a074 InterlockedDecrement
 0x40a078 GetCurrentThreadId
 0x40a07c ExitProcess
 0x40a080 GetModuleHandleExW
 0x40a084 GetProcAddress
 0x40a088 MultiByteToWideChar
 0x40a08c GetStdHandle
 0x40a090 GetModuleFileNameW
 0x40a094 GetFileType
 0x40a098 InitializeCriticalSectionAndSpinCount
 0x40a09c DeleteCriticalSection
 0x40a0a0 InitOnceExecuteOnce
 0x40a0a4 GetStartupInfoW
 0x40a0a8 QueryPerformanceCounter
 0x40a0ac GetTickCount64
 0x40a0b0 GetEnvironmentStringsW
 0x40a0b4 FreeEnvironmentStringsW
 0x40a0b8 WideCharToMultiByte
 0x40a0bc UnhandledExceptionFilter
 0x40a0c0 SetUnhandledExceptionFilter
 0x40a0c4 FlsAlloc
 0x40a0c8 FlsGetValue
 0x40a0cc FlsSetValue
 0x40a0d0 FlsFree
 0x40a0d4 GetCurrentProcess
 0x40a0d8 TerminateProcess
 0x40a0dc GetModuleHandleW
 0x40a0e0 EnterCriticalSection
 0x40a0e4 LeaveCriticalSection
 0x40a0e8 GetConsoleCP
 0x40a0ec GetConsoleMode
 0x40a0f0 SetFilePointerEx
 0x40a0f4 IsValidCodePage
 0x40a0f8 GetACP
 0x40a0fc GetOEMCP
 0x40a100 GetCPInfo
 0x40a104 Sleep
 0x40a108 LoadLibraryExW
 0x40a10c OutputDebugStringW
 0x40a110 LoadLibraryW
 0x40a114 RtlUnwind
 0x40a118 SetStdHandle
 0x40a11c WriteConsoleW
 0x40a120 GetStringTypeW
 0x40a124 HeapReAlloc
 0x40a128 HeapSize

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure