Report - DOC.exe

Generic Malware Admin Tool (Sysinternals etc ...) UPX PE File PE32
ScreenShot
Created 2024.08.17 22:30 Machine s1_win7_x6401
Filename DOC.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
4.2
ZERO API file : malware
VT API (file) 50 detected (AIDetectMalware, Dacic, malicious, high confidence, score, Cryptnot, Unsafe, Zusy, Attribute, HighConfidence, Barys, TrojanPSW, rLw0cFpN2KM, fkjil, AMADEY, YXEHNZ, Real Protect, Detected, ai score=89, QYAA, Eldorado, CryptBot, R659955, ZexaF, Z@a86dO, PasswordStealer, GdSda, QQPass, QQRob, Swhl, QNZO3DGW)
md5 2dbdc645b9776239b18f772c30c1a626
sha256 2b92d1c34b7f0278703c98e9fd755e061d0f120eea327996b223dfc65610dfcd
ssdeep 49152:hhVSCIoIdMdFH/x0EtwDPbtjlEzVu0K64EiSADdUNigC:7Ivnq80bODdU6
imphash 196992c146062db84cbd73903ca4b0ad
impfuzzy 24:8fiFCDq+kLEGTX5XGKJkNJlkvlbDcq30GXZy:8fir+k4GTXJGKJkNJlkvpwq30GQ
  Network IP location

Signature (8cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
warning Generates some ICMP traffic
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Resolves a suspicious Top Level Domain (TLD)
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer
info Checks amount of memory in system

Rules (5cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://fivexc5vt.top/v1/upload.php US CLOUDFLARENET 172.67.161.137 clean
fivexc5vt.top US CLOUDFLARENET 104.21.15.43 clean
172.67.161.137 US CLOUDFLARENET 172.67.161.137 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0xbd6154 DeleteCriticalSection
 0xbd6158 EnterCriticalSection
 0xbd615c FreeLibrary
 0xbd6160 GetLastError
 0xbd6164 GetModuleHandleA
 0xbd6168 GetModuleHandleW
 0xbd616c GetProcAddress
 0xbd6170 GetStartupInfoA
 0xbd6174 InitializeCriticalSection
 0xbd6178 IsDBCSLeadByteEx
 0xbd617c LeaveCriticalSection
 0xbd6180 LoadLibraryA
 0xbd6184 MultiByteToWideChar
 0xbd6188 SetUnhandledExceptionFilter
 0xbd618c Sleep
 0xbd6190 TlsGetValue
 0xbd6194 VirtualProtect
 0xbd6198 VirtualQuery
 0xbd619c WideCharToMultiByte
 0xbd61a0 lstrlenA
msvcrt.dll
 0xbd61a8 __getmainargs
 0xbd61ac __initenv
 0xbd61b0 __lconv_init
 0xbd61b4 __mb_cur_max
 0xbd61b8 __p__acmdln
 0xbd61bc __p__commode
 0xbd61c0 __p__fmode
 0xbd61c4 __set_app_type
 0xbd61c8 __setusermatherr
 0xbd61cc _amsg_exit
 0xbd61d0 _cexit
 0xbd61d4 _errno
 0xbd61d8 _initterm
 0xbd61dc _iob
 0xbd61e0 _lock
 0xbd61e4 _onexit
 0xbd61e8 _unlock
 0xbd61ec abort
 0xbd61f0 atoi
 0xbd61f4 calloc
 0xbd61f8 exit
 0xbd61fc fputc
 0xbd6200 free
 0xbd6204 fwrite
 0xbd6208 getc
 0xbd620c islower
 0xbd6210 isspace
 0xbd6214 isupper
 0xbd6218 isxdigit
 0xbd621c localeconv
 0xbd6220 malloc
 0xbd6224 memcpy
 0xbd6228 memset
 0xbd622c perror
 0xbd6230 printf
 0xbd6234 realloc
 0xbd6238 setlocale
 0xbd623c signal
 0xbd6240 strchr
 0xbd6244 strerror
 0xbd6248 strlen
 0xbd624c strncmp
 0xbd6250 strtol
 0xbd6254 strtoul
 0xbd6258 tolower
 0xbd625c ungetc
 0xbd6260 vfprintf
 0xbd6264 wcslen

EAT(Export Address Table) Library

0x4d17fe main


Similarity measure (PE file only) - Checking for service failure