Report - Channel1.exe

Generic Malware Malicious Library Malicious Packer Antivirus UPX AntiDebug AntiVM PE File PE64 OS Processor Check PowerShell PE32
ScreenShot
Created 2024.08.18 14:17 Machine s1_win7_x6403
Filename Channel1.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
2
Behavior Score
19.4
ZERO API file : clean
VT API (file) 11 detected (AIDetectMalware, malicious, high confidence, CLASSIC, Detected, Wacapew, GenKryptik, MAGC)
md5 c0b1bacf44892b96abd3564716a2b4ee
sha256 63d9319414c01f4172c4fdb53645cfd848f380bdc08ed3c1cb83bacb715b6770
ssdeep 49152:DI/0Xh92X3FAOkoQgcK1geVBOHpwIf0bOtW1sLjSRg:QO2X33DQp98bObLI
imphash 9e02808def02e999c496dcaa4fcfd6ba
impfuzzy 96:C6K0zXQsSuzqJcxL/eQUKP5ja9OmHTXrR9X1fa2Rq+PIXeQky0uGdLKayWf:CFQgsSJOST7R9FfaqnIuDapayWf
  Network IP location

Signature (42cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
danger Disables Windows Security features
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch Attempts to create or modify system certificates
watch Checks the version of Bios
watch Communicates with host for which no DNS query was performed
watch Creates a suspicious Powershell process
watch Detects VirtualBox using WNetGetProviderName trick
watch File has been identified by 11 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
watch Looks for the Windows Idle Time to determine the uptime
watch One or more non-whitelisted processes were created
watch Powershell script adds registry entries
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An executable file was downloaded by the process caspol.exe
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Potentially malicious URLs were found in the process memory dump
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Uses Windows utilities for basic Windows functionality
notice WaitFor has been invoked (possibly to delay malicious activity)
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Uses Windows APIs to generate a cryptographic key

Rules (24cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerException__SetConsoleCtrl (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE32 (no description) binaries (download)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (18cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://58yongzhe.com/parts/setup1.exe RU Perviy TSOD LLC 62.133.62.93 42034 malware
http://194.58.114.223/d/385104 RU Domain names registrar REG.RU, Ltd 194.58.114.223 41929 mailcious
https://pastebin.com/raw/E0rY26ni US CLOUDFLARENET 104.20.3.235 37702 mailcious
https://yip.su/RNWPd.exe US CLOUDFLARENET 172.67.169.89 37623 malware
https://cdn.discordapp.com/attachments/1272578305203110022/1274580536710533180/setup.exe?ex=66c2c520&is=66c173a0&hm=d51a22ade8522653a2cc6588cb150f567c8f96756a3cdd3065c4669a4c08ed1f& Unknown 162.159.130.233 clean
https://iplogger.com/1lyxz US CLOUDFLARENET 172.67.188.178 41935 mailcious
iplogger.com US CLOUDFLARENET 172.67.188.178 mailcious
58yongzhe.com RU Perviy TSOD LLC 62.133.62.93 malware
pastebin.com US CLOUDFLARENET 104.20.4.235 mailcious
yip.su US CLOUDFLARENET 172.67.169.89 mailcious
cdn.discordapp.com Unknown 162.159.133.233 malware
104.20.3.235 US CLOUDFLARENET 104.20.3.235 malware
91.121.59.207 FR OVH SAS 91.121.59.207 clean
162.159.130.233 Unknown 162.159.130.233 malware
172.67.188.178 US CLOUDFLARENET 172.67.188.178 mailcious
62.133.62.93 RU Perviy TSOD LLC 62.133.62.93 clean
194.58.114.223 RU Domain names registrar REG.RU, Ltd 194.58.114.223 mailcious
172.67.169.89 US CLOUDFLARENET 172.67.169.89 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x1401a7000 RegCloseKey
 0x1401a7008 RegEnumValueW
 0x1401a7010 RegOpenKeyExW
 0x1401a7018 RegQueryValueExW
 0x1401a7020 RegCreateKeyExW
 0x1401a7028 RegDeleteKeyExW
 0x1401a7030 RegDeleteValueW
 0x1401a7038 RegEnumKeyExW
 0x1401a7040 RegFlushKey
 0x1401a7048 RegQueryInfoKeyW
 0x1401a7050 RegSetValueExW
 0x1401a7058 OpenProcessToken
 0x1401a7060 LookupPrivilegeValueW
 0x1401a7068 AdjustTokenPrivileges
 0x1401a7070 CreateWellKnownSid
 0x1401a7078 GetWindowsAccountDomainSid
 0x1401a7080 RevertToSelf
 0x1401a7088 OpenThreadToken
 0x1401a7090 SetThreadToken
 0x1401a7098 DuplicateTokenEx
 0x1401a70a0 GetSecurityDescriptorLength
 0x1401a70a8 EventWrite
 0x1401a70b0 EventRegister
 0x1401a70b8 EventEnabled
crypt.dll
 0x1401a76c0 BCryptDestroyKey
 0x1401a76c8 BCryptGenerateSymmetricKey
 0x1401a76d0 BCryptOpenAlgorithmProvider
 0x1401a76d8 BCryptGenRandom
 0x1401a76e0 BCryptCloseAlgorithmProvider
KERNEL32.dll
 0x1401a70c8 TlsFree
 0x1401a70d0 TlsSetValue
 0x1401a70d8 TlsGetValue
 0x1401a70e0 TlsAlloc
 0x1401a70e8 InitializeCriticalSectionAndSpinCount
 0x1401a70f0 EncodePointer
 0x1401a70f8 CloseThreadpoolIo
 0x1401a7100 GetCurrentProcessId
 0x1401a7108 MultiByteToWideChar
 0x1401a7110 GetStdHandle
 0x1401a7118 GetCalendarInfoEx
 0x1401a7120 CompareStringOrdinal
 0x1401a7128 CompareStringEx
 0x1401a7130 FindNLSStringEx
 0x1401a7138 GetLocaleInfoEx
 0x1401a7140 ResolveLocaleName
 0x1401a7148 FindStringOrdinal
 0x1401a7150 GetTickCount64
 0x1401a7158 GetCurrentProcess
 0x1401a7160 GetCurrentThread
 0x1401a7168 Sleep
 0x1401a7170 InitializeCriticalSection
 0x1401a7178 InitializeConditionVariable
 0x1401a7180 DeleteCriticalSection
 0x1401a7188 LocalFree
 0x1401a7190 EnterCriticalSection
 0x1401a7198 SleepConditionVariableCS
 0x1401a71a0 LeaveCriticalSection
 0x1401a71a8 WakeConditionVariable
 0x1401a71b0 QueryPerformanceCounter
 0x1401a71b8 WaitForMultipleObjectsEx
 0x1401a71c0 GetLastError
 0x1401a71c8 QueryPerformanceFrequency
 0x1401a71d0 SetLastError
 0x1401a71d8 GetFullPathNameW
 0x1401a71e0 GetLongPathNameW
 0x1401a71e8 LocalAlloc
 0x1401a71f0 GetConsoleOutputCP
 0x1401a71f8 WideCharToMultiByte
 0x1401a7200 GetProcAddress
 0x1401a7208 RaiseFailFastException
 0x1401a7210 CreateThreadpoolIo
 0x1401a7218 StartThreadpoolIo
 0x1401a7220 CancelThreadpoolIo
 0x1401a7228 LocaleNameToLCID
 0x1401a7230 LCMapStringEx
 0x1401a7238 EnumTimeFormatsEx
 0x1401a7240 EnumCalendarInfoExEx
 0x1401a7248 CreateFileW
 0x1401a7250 DeleteFileW
 0x1401a7258 DeviceIoControl
 0x1401a7260 ExpandEnvironmentStringsW
 0x1401a7268 FindClose
 0x1401a7270 FindFirstFileExW
 0x1401a7278 FlushFileBuffers
 0x1401a7280 FreeLibrary
 0x1401a7288 GetFileAttributesExW
 0x1401a7290 GetFileInformationByHandleEx
 0x1401a7298 GetFileType
 0x1401a72a0 GetModuleFileNameW
 0x1401a72a8 GetOverlappedResult
 0x1401a72b0 LoadLibraryExW
 0x1401a72b8 ReadFile
 0x1401a72c0 SetFileInformationByHandle
 0x1401a72c8 SetThreadErrorMode
 0x1401a72d0 WriteFile
 0x1401a72d8 GetCurrentProcessorNumberEx
 0x1401a72e0 CloseHandle
 0x1401a72e8 SetEvent
 0x1401a72f0 ResetEvent
 0x1401a72f8 CreateEventExW
 0x1401a7300 GetEnvironmentVariableW
 0x1401a7308 FormatMessageW
 0x1401a7310 DuplicateHandle
 0x1401a7318 GetThreadPriority
 0x1401a7320 SetThreadPriority
 0x1401a7328 GetConsoleWindow
 0x1401a7330 FreeConsole
 0x1401a7338 AllocConsole
 0x1401a7340 CreateProcessW
 0x1401a7348 GetThreadContext
 0x1401a7350 ExitProcess
 0x1401a7358 K32EnumProcessModulesEx
 0x1401a7360 IsWow64Process
 0x1401a7368 GetExitCodeProcess
 0x1401a7370 OpenProcess
 0x1401a7378 K32EnumProcesses
 0x1401a7380 K32GetModuleInformation
 0x1401a7388 K32GetModuleBaseNameW
 0x1401a7390 K32GetModuleFileNameExW
 0x1401a7398 GetProcessId
 0x1401a73a0 FlushProcessWriteBuffers
 0x1401a73a8 GetCurrentThreadId
 0x1401a73b0 WaitForSingleObjectEx
 0x1401a73b8 VirtualQuery
 0x1401a73c0 RtlRestoreContext
 0x1401a73c8 AddVectoredExceptionHandler
 0x1401a73d0 FlsAlloc
 0x1401a73d8 FlsGetValue
 0x1401a73e0 FlsSetValue
 0x1401a73e8 CreateEventW
 0x1401a73f0 TerminateProcess
 0x1401a73f8 SwitchToThread
 0x1401a7400 CreateThread
 0x1401a7408 SuspendThread
 0x1401a7410 ResumeThread
 0x1401a7418 SetThreadContext
 0x1401a7420 FlushInstructionCache
 0x1401a7428 VirtualAlloc
 0x1401a7430 VirtualProtect
 0x1401a7438 VirtualFree
 0x1401a7440 QueryInformationJobObject
 0x1401a7448 GetModuleHandleW
 0x1401a7450 GetModuleHandleExW
 0x1401a7458 GetProcessAffinityMask
 0x1401a7460 InitializeContext
 0x1401a7468 GetEnabledXStateFeatures
 0x1401a7470 SetXStateFeaturesMask
 0x1401a7478 InitializeCriticalSectionEx
 0x1401a7480 GetSystemTimeAsFileTime
 0x1401a7488 DebugBreak
 0x1401a7490 WaitForSingleObject
 0x1401a7498 SleepEx
 0x1401a74a0 GlobalMemoryStatusEx
 0x1401a74a8 GetSystemInfo
 0x1401a74b0 GetLogicalProcessorInformation
 0x1401a74b8 GetLogicalProcessorInformationEx
 0x1401a74c0 GetLargePageMinimum
 0x1401a74c8 VirtualUnlock
 0x1401a74d0 VirtualAllocExNuma
 0x1401a74d8 IsProcessInJob
 0x1401a74e0 GetNumaHighestNodeNumber
 0x1401a74e8 GetProcessGroupAffinity
 0x1401a74f0 K32GetProcessMemoryInfo
 0x1401a74f8 RaiseException
 0x1401a7500 RtlPcToFileHeader
 0x1401a7508 RtlUnwindEx
 0x1401a7510 IsProcessorFeaturePresent
 0x1401a7518 SetUnhandledExceptionFilter
 0x1401a7520 UnhandledExceptionFilter
 0x1401a7528 IsDebuggerPresent
 0x1401a7530 RtlVirtualUnwind
 0x1401a7538 RtlLookupFunctionEntry
 0x1401a7540 RtlCaptureContext
 0x1401a7548 InitializeSListHead
ole32.dll
 0x1401a76f0 CoGetApartmentType
 0x1401a76f8 CoUninitialize
 0x1401a7700 CoInitializeEx
 0x1401a7708 CoCreateGuid
 0x1401a7710 CoWaitForMultipleHandles
api-ms-win-crt-math-l1-1-0.dll
 0x1401a7598 ceil
 0x1401a75a0 __setusermatherr
api-ms-win-crt-heap-l1-1-0.dll
 0x1401a7558 free
 0x1401a7560 _callnewh
 0x1401a7568 calloc
 0x1401a7570 _set_new_mode
 0x1401a7578 malloc
api-ms-win-crt-string-l1-1-0.dll
 0x1401a7688 _stricmp
 0x1401a7690 strcpy_s
 0x1401a7698 strcmp
 0x1401a76a0 _wcsicmp
 0x1401a76a8 wcsncmp
 0x1401a76b0 strncpy_s
api-ms-win-crt-runtime-l1-1-0.dll
 0x1401a75b0 __p___wargv
 0x1401a75b8 _cexit
 0x1401a75c0 exit
 0x1401a75c8 terminate
 0x1401a75d0 _crt_atexit
 0x1401a75d8 _register_onexit_function
 0x1401a75e0 _initialize_onexit_table
 0x1401a75e8 __p___argc
 0x1401a75f0 _exit
 0x1401a75f8 abort
 0x1401a7600 _initterm_e
 0x1401a7608 _c_exit
 0x1401a7610 _register_thread_local_exe_atexit_callback
 0x1401a7618 _seh_filter_exe
 0x1401a7620 _set_app_type
 0x1401a7628 _initterm
 0x1401a7630 _configure_wide_argv
 0x1401a7638 _initialize_wide_environment
 0x1401a7640 _get_initial_wide_environment
api-ms-win-crt-stdio-l1-1-0.dll
 0x1401a7650 __stdio_common_vsprintf_s
 0x1401a7658 __stdio_common_vfprintf
 0x1401a7660 __p__commode
 0x1401a7668 _set_fmode
 0x1401a7670 __stdio_common_vsscanf
 0x1401a7678 __acrt_iob_func
api-ms-win-crt-locale-l1-1-0.dll
 0x1401a7588 _configthreadlocale

EAT(Export Address Table) Library



Similarity measure (PE file only) - Checking for service failure