Report - 66dfd447dcd00_lyla.exe#lyla3

Generic Malware Admin Tool (Sysinternals etc ...) UPX PE File PE32 DLL
ScreenShot
Created 2024.09.11 10:47 Machine s1_win7_x6403
Filename 66dfd447dcd00_lyla.exe#lyla3
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
3
Behavior Score
3.6
ZERO API file : malware
VT API (file) 50 detected (CryptBot, malicious, high confidence, TrojanPWS, Dacic, Unsafe, Vi76, Attribute, HighConfidence, Barys, Cryptnot, TrojanPSW, du8Y4XG1zuF, yngzz, PRIVATELOADER, YXEIJZ, Detected, ai score=87, CCJD, 17KK2SY, Eldorado, R661185, Artemis, Genetic, confidence, 3DGW)
md5 b36f21ca653ea179246c98cda2373879
sha256 ce083654b6506740c3a45c15e4fb24dcd05cd39e6509bdeeeedd330750a9511a
ssdeep 49152:LZQCY6KFqjMJ9nFpnRmTH4S3dvxqydZMuhLpR+mXsU4AXe8BRDWOvryIkAw3W:2C6R4BdvsydZrzZsU4AXNrDcIrgW
imphash 92a00f4d0a4448266e9c638fdb1341b9
impfuzzy 24:8fiFCDcn+kLEGTX5XG0bhkNJl6vlbDcqxZ96HGXZQ:8fiJ+k4GTXJG0bhkNJl6vRwqt6HGG
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Resolves a suspicious Top Level Domain (TLD)
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (9cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://tventyv20pn.top/v1/upload.php Unknown 194.87.248.136 clean
tventyv20pn.top Unknown 194.87.248.136 clean
194.87.248.136 Unknown 194.87.248.136 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0xf331e0 DeleteCriticalSection
 0xf331e4 EnterCriticalSection
 0xf331e8 FreeLibrary
 0xf331ec GetLastError
 0xf331f0 GetModuleHandleA
 0xf331f4 GetModuleHandleW
 0xf331f8 GetProcAddress
 0xf331fc GetStartupInfoA
 0xf33200 GetTempPathA
 0xf33204 InitializeCriticalSection
 0xf33208 IsDBCSLeadByteEx
 0xf3320c LeaveCriticalSection
 0xf33210 LoadLibraryA
 0xf33214 MultiByteToWideChar
 0xf33218 SetUnhandledExceptionFilter
 0xf3321c Sleep
 0xf33220 TlsGetValue
 0xf33224 VirtualProtect
 0xf33228 VirtualQuery
 0xf3322c WideCharToMultiByte
 0xf33230 lstrlenA
msvcrt.dll
 0xf33238 __getmainargs
 0xf3323c __initenv
 0xf33240 __lconv_init
 0xf33244 __mb_cur_max
 0xf33248 __p__acmdln
 0xf3324c __p__commode
 0xf33250 __p__fmode
 0xf33254 __set_app_type
 0xf33258 __setusermatherr
 0xf3325c _amsg_exit
 0xf33260 _assert
 0xf33264 _cexit
 0xf33268 _errno
 0xf3326c _chsize
 0xf33270 _filelengthi64
 0xf33274 _fileno
 0xf33278 _initterm
 0xf3327c _iob
 0xf33280 _lock
 0xf33284 _onexit
 0xf33288 _unlock
 0xf3328c abort
 0xf33290 atoi
 0xf33294 calloc
 0xf33298 exit
 0xf3329c fclose
 0xf332a0 fflush
 0xf332a4 fgetpos
 0xf332a8 fopen
 0xf332ac fputc
 0xf332b0 fread
 0xf332b4 free
 0xf332b8 freopen
 0xf332bc fsetpos
 0xf332c0 fwrite
 0xf332c4 getc
 0xf332c8 islower
 0xf332cc isspace
 0xf332d0 isupper
 0xf332d4 isxdigit
 0xf332d8 localeconv
 0xf332dc malloc
 0xf332e0 memcmp
 0xf332e4 memcpy
 0xf332e8 memmove
 0xf332ec memset
 0xf332f0 mktime
 0xf332f4 localtime
 0xf332f8 difftime
 0xf332fc _mkdir
 0xf33300 perror
 0xf33304 puts
 0xf33308 realloc
 0xf3330c remove
 0xf33310 setlocale
 0xf33314 signal
 0xf33318 strchr
 0xf3331c strcmp
 0xf33320 strcpy
 0xf33324 strerror
 0xf33328 strlen
 0xf3332c strncmp
 0xf33330 strncpy
 0xf33334 strtol
 0xf33338 strtoul
 0xf3333c tolower
 0xf33340 ungetc
 0xf33344 vfprintf
 0xf33348 time
 0xf3334c wcslen
 0xf33350 wcstombs
 0xf33354 _stat
 0xf33358 _utime
 0xf3335c _fileno
 0xf33360 _chmod
SHELL32.dll
 0xf33368 ShellExecuteA

EAT(Export Address Table) Library

0x4ea29d main


Similarity measure (PE file only) - Checking for service failure