ScreenShot
Created | 2024.08.24 18:59 | Machine | s1_win7_x6403 |
Filename | Setup1.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 41 detected (malicious, moderate confidence, Zusy, Cryptbot, V734, Attribute, HighConfidence, Barys, TrojanPSW, du8Y4XG1zuF, Detected, ai score=87, CCJD, ZexaF, @@Z@aGMcLBe, Outbreak, Genetic, confidence, 3DGW) | ||
md5 | 2f62bde469827dbadc9cb1281d8f3d9b | ||
sha256 | 92a1a931ac548d3aa9affb099a4f75cb0c1282da0a1600712c9166700504c126 | ||
ssdeep | 98304:JQDtllF5J43Rojfw8td264B9eidD4PzfZVc:JQDPlF5J43qjfw0dAeG8hVc | ||
imphash | 92a00f4d0a4448266e9c638fdb1341b9 | ||
impfuzzy | 24:8fiFCDcn+kLEGTX5XG0bhkNJl6vlbDcqxZ96HGXZQ:8fiJ+k4GTXJG0bhkNJl6vRwqt6HGG |
Network IP location
Signature (16cnts)
Level | Description |
---|---|
danger | File has been identified by 41 AntiVirus engines on VirusTotal as malicious |
watch | Checks the CPU name from registry |
watch | Collects information about installed applications |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | One or more potentially interesting buffers were extracted |
notice | Performs some HTTP requests |
notice | Queries for potentially installed applications |
notice | Resolves a suspicious Top Level Domain (TLD) |
notice | Sends data using the HTTP POST Method |
notice | Steals private information from local Internet browsers |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | Checks amount of memory in system |
info | One or more processes crashed |
info | Queries for the computername |
info | Tries to locate where the browsers are installed |
Rules (5cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Generic_Malware_Zero | Generic Malware | binaries (upload) |
watch | Admin_Tool_IN_Zero | Admin Tool Sysinternals | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
Suricata ids
ET DNS Query to a *.top domain - Likely Hostile
ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4
ET INFO HTTP Request to a *.top domain
ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4
ET INFO HTTP Request to a *.top domain
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0xf371e0 DeleteCriticalSection
0xf371e4 EnterCriticalSection
0xf371e8 FreeLibrary
0xf371ec GetLastError
0xf371f0 GetModuleHandleA
0xf371f4 GetModuleHandleW
0xf371f8 GetProcAddress
0xf371fc GetStartupInfoA
0xf37200 GetTempPathA
0xf37204 InitializeCriticalSection
0xf37208 IsDBCSLeadByteEx
0xf3720c LeaveCriticalSection
0xf37210 LoadLibraryA
0xf37214 MultiByteToWideChar
0xf37218 SetUnhandledExceptionFilter
0xf3721c Sleep
0xf37220 TlsGetValue
0xf37224 VirtualProtect
0xf37228 VirtualQuery
0xf3722c WideCharToMultiByte
0xf37230 lstrlenA
msvcrt.dll
0xf37238 __getmainargs
0xf3723c __initenv
0xf37240 __lconv_init
0xf37244 __mb_cur_max
0xf37248 __p__acmdln
0xf3724c __p__commode
0xf37250 __p__fmode
0xf37254 __set_app_type
0xf37258 __setusermatherr
0xf3725c _amsg_exit
0xf37260 _assert
0xf37264 _cexit
0xf37268 _errno
0xf3726c _chsize
0xf37270 _filelengthi64
0xf37274 _fileno
0xf37278 _initterm
0xf3727c _iob
0xf37280 _lock
0xf37284 _onexit
0xf37288 _unlock
0xf3728c abort
0xf37290 atoi
0xf37294 calloc
0xf37298 exit
0xf3729c fclose
0xf372a0 fflush
0xf372a4 fgetpos
0xf372a8 fopen
0xf372ac fputc
0xf372b0 fread
0xf372b4 free
0xf372b8 freopen
0xf372bc fsetpos
0xf372c0 fwrite
0xf372c4 getc
0xf372c8 islower
0xf372cc isspace
0xf372d0 isupper
0xf372d4 isxdigit
0xf372d8 localeconv
0xf372dc malloc
0xf372e0 memcmp
0xf372e4 memcpy
0xf372e8 memmove
0xf372ec memset
0xf372f0 mktime
0xf372f4 localtime
0xf372f8 difftime
0xf372fc _mkdir
0xf37300 perror
0xf37304 puts
0xf37308 realloc
0xf3730c remove
0xf37310 setlocale
0xf37314 signal
0xf37318 strchr
0xf3731c strcmp
0xf37320 strcpy
0xf37324 strerror
0xf37328 strlen
0xf3732c strncmp
0xf37330 strncpy
0xf37334 strtol
0xf37338 strtoul
0xf3733c tolower
0xf37340 ungetc
0xf37344 vfprintf
0xf37348 time
0xf3734c wcslen
0xf37350 wcstombs
0xf37354 _stat
0xf37358 _utime
0xf3735c _fileno
0xf37360 _chmod
SHELL32.dll
0xf37368 ShellExecuteA
EAT(Export Address Table) Library
0x4f6621 main
KERNEL32.dll
0xf371e0 DeleteCriticalSection
0xf371e4 EnterCriticalSection
0xf371e8 FreeLibrary
0xf371ec GetLastError
0xf371f0 GetModuleHandleA
0xf371f4 GetModuleHandleW
0xf371f8 GetProcAddress
0xf371fc GetStartupInfoA
0xf37200 GetTempPathA
0xf37204 InitializeCriticalSection
0xf37208 IsDBCSLeadByteEx
0xf3720c LeaveCriticalSection
0xf37210 LoadLibraryA
0xf37214 MultiByteToWideChar
0xf37218 SetUnhandledExceptionFilter
0xf3721c Sleep
0xf37220 TlsGetValue
0xf37224 VirtualProtect
0xf37228 VirtualQuery
0xf3722c WideCharToMultiByte
0xf37230 lstrlenA
msvcrt.dll
0xf37238 __getmainargs
0xf3723c __initenv
0xf37240 __lconv_init
0xf37244 __mb_cur_max
0xf37248 __p__acmdln
0xf3724c __p__commode
0xf37250 __p__fmode
0xf37254 __set_app_type
0xf37258 __setusermatherr
0xf3725c _amsg_exit
0xf37260 _assert
0xf37264 _cexit
0xf37268 _errno
0xf3726c _chsize
0xf37270 _filelengthi64
0xf37274 _fileno
0xf37278 _initterm
0xf3727c _iob
0xf37280 _lock
0xf37284 _onexit
0xf37288 _unlock
0xf3728c abort
0xf37290 atoi
0xf37294 calloc
0xf37298 exit
0xf3729c fclose
0xf372a0 fflush
0xf372a4 fgetpos
0xf372a8 fopen
0xf372ac fputc
0xf372b0 fread
0xf372b4 free
0xf372b8 freopen
0xf372bc fsetpos
0xf372c0 fwrite
0xf372c4 getc
0xf372c8 islower
0xf372cc isspace
0xf372d0 isupper
0xf372d4 isxdigit
0xf372d8 localeconv
0xf372dc malloc
0xf372e0 memcmp
0xf372e4 memcpy
0xf372e8 memmove
0xf372ec memset
0xf372f0 mktime
0xf372f4 localtime
0xf372f8 difftime
0xf372fc _mkdir
0xf37300 perror
0xf37304 puts
0xf37308 realloc
0xf3730c remove
0xf37310 setlocale
0xf37314 signal
0xf37318 strchr
0xf3731c strcmp
0xf37320 strcpy
0xf37324 strerror
0xf37328 strlen
0xf3732c strncmp
0xf37330 strncpy
0xf37334 strtol
0xf37338 strtoul
0xf3733c tolower
0xf37340 ungetc
0xf37344 vfprintf
0xf37348 time
0xf3734c wcslen
0xf37350 wcstombs
0xf37354 _stat
0xf37358 _utime
0xf3735c _fileno
0xf37360 _chmod
SHELL32.dll
0xf37368 ShellExecuteA
EAT(Export Address Table) Library
0x4f6621 main