Report - ConsoleApplication6.exe

Generic Malware Malicious Library Downloader UPX PE File PE64 OS Processor Check
ScreenShot
Created 2024.08.19 14:07 Machine s1_win7_x6401
Filename ConsoleApplication6.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
3
Behavior Score
2.8
ZERO API file : clean
VT API (file) 10 detected (AIDetectMalware, malicious, high confidence, score, NetLoader, Static AI, Suspicious PE, confidence, 100%)
md5 e3454ebec6c620ea8547121080a4634e
sha256 d4ff3691a8f6e2e3d5dc2dbc23d222f1547e4addf2b8b7f598b213cd7559d5fd
ssdeep 6144:r6U8gPcMcHsSB6+1zrXsEvKXchoQfaSEX:O8cHsSB6IzzsHshoTX
imphash aaa962afcd2ab125e1039491af99cc68
impfuzzy 48:J3S1YtCgG1c+p6nwX3MFSY/goCKX0WnB/KAlJVZS9:J3S1YtCgG1c+p6ZKahjc
  Network IP location

Signature (9cnts)

Level Description
watch File has been identified by 10 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates executable files on the filesystem
notice Performs some HTTP requests
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Network_Downloader File Downloader binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://exploit-elite.pro/build.exe US CLOUDFLARENET 172.67.204.99 clean
exploit-elite.pro US CLOUDFLARENET 104.21.22.108 clean
172.67.204.99 US CLOUDFLARENET 172.67.204.99 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x140047028 CreateFileW
 0x140047030 GetConsoleMode
 0x140047038 GetConsoleOutputCP
 0x140047040 FlushFileBuffers
 0x140047048 WriteConsoleW
 0x140047050 HeapSize
 0x140047058 SetFilePointerEx
 0x140047060 GetProcessHeap
 0x140047068 GetStringTypeW
 0x140047070 SetStdHandle
 0x140047078 LoadLibraryW
 0x140047080 GetProcAddress
 0x140047088 FreeLibrary
 0x140047090 HeapReAlloc
 0x140047098 VirtualProtect
 0x1400470a0 SetEnvironmentVariableW
 0x1400470a8 FreeEnvironmentStringsW
 0x1400470b0 GetEnvironmentStringsW
 0x1400470b8 WideCharToMultiByte
 0x1400470c0 MultiByteToWideChar
 0x1400470c8 QueryPerformanceCounter
 0x1400470d0 GetCurrentProcessId
 0x1400470d8 GetCurrentThreadId
 0x1400470e0 GetSystemTimeAsFileTime
 0x1400470e8 InitializeSListHead
 0x1400470f0 RtlCaptureContext
 0x1400470f8 RtlLookupFunctionEntry
 0x140047100 RtlVirtualUnwind
 0x140047108 IsDebuggerPresent
 0x140047110 UnhandledExceptionFilter
 0x140047118 SetUnhandledExceptionFilter
 0x140047120 GetStartupInfoW
 0x140047128 IsProcessorFeaturePresent
 0x140047130 GetModuleHandleW
 0x140047138 RtlPcToFileHeader
 0x140047140 RaiseException
 0x140047148 RtlUnwindEx
 0x140047150 GetLastError
 0x140047158 SetLastError
 0x140047160 EncodePointer
 0x140047168 EnterCriticalSection
 0x140047170 LeaveCriticalSection
 0x140047178 DeleteCriticalSection
 0x140047180 InitializeCriticalSectionAndSpinCount
 0x140047188 TlsAlloc
 0x140047190 TlsGetValue
 0x140047198 TlsSetValue
 0x1400471a0 TlsFree
 0x1400471a8 LoadLibraryExW
 0x1400471b0 GetCurrentProcess
 0x1400471b8 TerminateProcess
 0x1400471c0 GetStdHandle
 0x1400471c8 WriteFile
 0x1400471d0 GetModuleFileNameW
 0x1400471d8 ExitProcess
 0x1400471e0 GetModuleHandleExW
 0x1400471e8 HeapFree
 0x1400471f0 CloseHandle
 0x1400471f8 WaitForSingleObject
 0x140047200 GetExitCodeProcess
 0x140047208 CreateProcessW
 0x140047210 GetFileAttributesExW
 0x140047218 HeapAlloc
 0x140047220 GetFileType
 0x140047228 FlsAlloc
 0x140047230 FlsGetValue
 0x140047238 FlsSetValue
 0x140047240 FlsFree
 0x140047248 CompareStringW
 0x140047250 LCMapStringW
 0x140047258 FindClose
 0x140047260 FindFirstFileExW
 0x140047268 FindNextFileW
 0x140047270 IsValidCodePage
 0x140047278 GetACP
 0x140047280 GetOEMCP
 0x140047288 GetCPInfo
 0x140047290 GetCommandLineA
 0x140047298 GetCommandLineW
USER32.dll
 0x1400472c0 GetMessageW
 0x1400472c8 LoadIconW
 0x1400472d0 MessageBoxW
 0x1400472d8 GetClientRect
 0x1400472e0 UpdateWindow
 0x1400472e8 ShowWindow
 0x1400472f0 CreateWindowExW
 0x1400472f8 RegisterClassW
 0x140047300 PostQuitMessage
 0x140047308 DefWindowProcW
 0x140047310 SendMessageW
 0x140047318 DispatchMessageW
 0x140047320 TranslateMessage
GDI32.dll
 0x140047000 SetBkColor
 0x140047008 CreateSolidBrush
 0x140047010 CreateFontW
 0x140047018 SetTextColor
SHELL32.dll
 0x1400472a8 SHGetFolderPathW
 0x1400472b0 ShellExecuteW
urlmon.dll
 0x140047330 URLDownloadToFileW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure