Report - 1188%E7%83%88%E7%84%B0.exe

PE File PE32 PNG Format JPEG Format
ScreenShot
Created 2024.08.30 18:15 Machine s1_win7_x6401
Filename 1188%E7%83%88%E7%84%B0.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
AI Score
5
Behavior Score
5.0
ZERO API file : clean
VT API (file) 17 detected (malicious, moderate confidence, Collected, APUS, Artemis, Perion, eieizd, CLOUD, PerionCRTD, Zeus, Detected, ApplicUnwnt@#3nz311z93b0l, PUADlManager, LTLogger, GenAsa, 4t2IKQiiCOQ, grayware, confidence)
md5 88783a57777926114b5c5c95af4c943c
sha256 94132d9dde2b730f4800ee383ddaa63d2e2f92264f07218295d2c5755a414b6a
ssdeep 12288:7Egn2EkLvTjotXsXsjo3sPnXMRJmV0nzJEdMNZ:7R2EkLvPotX5jo3EQFl
imphash 5b091649031f38ad86eb9061a77425fb
impfuzzy 3:swBJAEPwS9KTXzhAXwEQaxRAAbs1MO/IJjOSzLxaZSc8KSxAdX:dBJAEHGDzyRlbkZ/ItvxaZyxAdX
  Network IP location

Signature (12cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Disables proxy possibly for traffic interception
watch File has been identified by 17 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
notice The executable is compressed using UPX
info Checks amount of memory in system
info One or more processes crashed
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (4cnts)

Level Name Description Collection
info IsPE32 (no description) binaries (upload)
info JPEG_Format_Zero JPEG Format binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)
info PNG_Format_Zero PNG Format binaries (download)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
www.y2126.com Unknown clean
www.1188.com CN Guangdong 183.61.16.135 clean
183.61.16.135 CN Guangdong 183.61.16.135 clean

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.DLL
 0x5156a8 LoadLibraryA
 0x5156ac GetProcAddress
 0x5156b0 VirtualProtect
 0x5156b4 ExitProcess
MSVBVM60.DLL
 0x5156bc None
OLE32.DLL
 0x5156c4 IsEqualGUID
SHLWAPI.DLL
 0x5156cc PathFileExistsW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure