Report - Fiklaaaaaaa.exe

Generic Malware Malicious Library UPX PE File PE32 OS Processor Check
ScreenShot
Created 2024.08.19 14:10 Machine s1_win7_x6403
Filename Fiklaaaaaaa.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
1.2
ZERO API file : malware
VT API (file) 24 detected (AIDetectMalware, Fragtor, Unsafe, Attribute, HighConfidence, malicious, high confidence, Kryptik, HXOW, Stealerc, Kryptik@AI, RDML, OZkhS8+riFP75BqVUGlZGg, score, Static AI, Suspicious PE, ai score=85, Wacapew, Injection, ZexaF, 0qW@amSiZMh, confidence)
md5 b0ce25de19e62f77784bc90b6d90f8f2
sha256 3870870eeada5b88839f57be689728109b51d60044881df0da7f9b9392e51873
ssdeep 12288:nMUCn+iSACmAedduV9mC9Xrm1BDMbCOwkEE/o2E0/gMHyK+N:PCn+iNZddq9mC97m1BDSWEPYM1y
imphash b87fc3874fae7c2c4ec39758e7ba8890
impfuzzy 96:CEY1D7C7BcpVejXjtZnEhZqxN75J7sCtUB29usK/6:CEY1dhZqxN7n7sCv9usKy
  Network IP location

Signature (3cnts)

Level Description
warning File has been identified by 24 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed
info This executable has a PDB path

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
bitbucket.org US AMAZON-02 104.192.140.26 malware
104.192.140.24 US AMAZON-02 104.192.140.24 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x463040 K32EnumProcessModulesEx
 0x463044 CreateFileW
 0x463048 K32EnumProcessModules
 0x46304c K32EnumProcesses
 0x463050 LoadLibraryA
 0x463054 GetProcAddress
 0x463058 FreeLibrary
 0x46305c OpenProcess
 0x463060 GetCurrentProcessId
 0x463064 GetCurrentProcess
 0x463068 CloseHandle
 0x46306c K32GetModuleBaseNameW
 0x463070 HeapSize
 0x463074 GetProcessHeap
 0x463078 SetStdHandle
 0x46307c FreeEnvironmentStringsW
 0x463080 GetEnvironmentStringsW
 0x463084 GetCommandLineW
 0x463088 GetCommandLineA
 0x46308c GetOEMCP
 0x463090 GetACP
 0x463094 IsValidCodePage
 0x463098 FindNextFileW
 0x46309c FindFirstFileExW
 0x4630a0 FindClose
 0x4630a4 HeapReAlloc
 0x4630a8 ReadConsoleW
 0x4630ac SetFilePointerEx
 0x4630b0 GetFileSizeEx
 0x4630b4 ReadFile
 0x4630b8 GetConsoleMode
 0x4630bc GetConsoleOutputCP
 0x4630c0 FlushFileBuffers
 0x4630c4 EnumSystemLocalesW
 0x4630c8 GetUserDefaultLCID
 0x4630cc IsValidLocale
 0x4630d0 GetLocaleInfoW
 0x4630d4 LCMapStringW
 0x4630d8 GetFileType
 0x4630dc HeapAlloc
 0x4630e0 HeapFree
 0x4630e4 WideCharToMultiByte
 0x4630e8 MultiByteToWideChar
 0x4630ec GetStringTypeW
 0x4630f0 RaiseException
 0x4630f4 EnterCriticalSection
 0x4630f8 LeaveCriticalSection
 0x4630fc InitializeCriticalSectionEx
 0x463100 DeleteCriticalSection
 0x463104 EncodePointer
 0x463108 DecodePointer
 0x46310c LCMapStringEx
 0x463110 GetCPInfo
 0x463114 IsProcessorFeaturePresent
 0x463118 QueryPerformanceCounter
 0x46311c GetCurrentThreadId
 0x463120 GetSystemTimeAsFileTime
 0x463124 InitializeSListHead
 0x463128 IsDebuggerPresent
 0x46312c UnhandledExceptionFilter
 0x463130 SetUnhandledExceptionFilter
 0x463134 GetStartupInfoW
 0x463138 GetModuleHandleW
 0x46313c TerminateProcess
 0x463140 RtlUnwind
 0x463144 GetLastError
 0x463148 SetLastError
 0x46314c InitializeCriticalSectionAndSpinCount
 0x463150 TlsAlloc
 0x463154 TlsGetValue
 0x463158 TlsSetValue
 0x46315c TlsFree
 0x463160 LoadLibraryExW
 0x463164 ExitProcess
 0x463168 GetModuleHandleExW
 0x46316c GetStdHandle
 0x463170 WriteFile
 0x463174 GetModuleFileNameW
 0x463178 WriteConsoleW
COMDLG32.dll
 0x463000 CommDlgExtendedError
 0x463004 PrintDlgA
 0x463008 ChooseFontA
 0x46300c ReplaceTextW
 0x463010 ReplaceTextA
 0x463014 FindTextW
 0x463018 FindTextA
 0x46301c ChooseColorW
 0x463020 ChooseColorA
 0x463024 GetFileTitleW
 0x463028 GetFileTitleA
 0x46302c GetSaveFileNameW
 0x463030 GetSaveFileNameA
 0x463034 GetOpenFileNameW
 0x463038 GetOpenFileNameA
RPCRT4.dll
 0x463180 UuidToStringW
 0x463184 RpcEpRegisterNoReplaceA
 0x463188 RpcMgmtWaitServerListen
 0x46318c RpcMgmtStopServerListening
 0x463190 UuidFromStringA
 0x463194 UuidToStringA
 0x463198 RpcBindingFree
 0x46319c RpcBindingFromStringBindingA
 0x4631a0 RpcBindingReset
 0x4631a4 RpcStringBindingComposeA
 0x4631a8 RpcStringFreeA
 0x4631ac RpcStringFreeW
 0x4631b0 RpcServerListen
 0x4631b4 RpcServerRegisterIf
 0x4631b8 RpcServerUseProtseqEpA
 0x4631bc UuidCreate
WINTRUST.dll
 0x463204 WTHelperProvDataFromStateData
 0x463208 WTHelperGetProvCertFromChain
 0x46320c WTHelperGetProvSignerFromChain
VERSION.dll
 0x4631e0 GetFileVersionInfoW
 0x4631e4 VerQueryValueA
 0x4631e8 GetFileVersionInfoExW
 0x4631ec GetFileVersionInfoSizeA
 0x4631f0 GetFileVersionInfoSizeW
 0x4631f4 GetFileVersionInfoA
 0x4631f8 GetFileVersionInfoSizeExW
 0x4631fc VerQueryValueW
SHLWAPI.dll
 0x4631c4 PathRemoveFileSpecA
 0x4631c8 PathAppendA
 0x4631cc PathFileExistsA
 0x4631d0 PathFindFileNameA
 0x4631d4 PathIsURLA
 0x4631d8 PathAddBackslashA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure