Report - 999.html

Generic Malware Malicious Library Malicious Packer Antivirus UPX PE File ftp PE64 OS Processor Check
ScreenShot
Created 2024.09.13 09:39 Machine s1_win7_x6403
Filename 999.html
Type MS-DOS executable, MZ for MS-DOS
AI Score Not founds Behavior Score
3.4
ZERO API file : clean
VT API (file) 44 detected (AIDetectMalware, Hacktool, Marte, malicious, high confidence, Revhell, Reversessh, Vuy3, Attribute, HighConfidence, a variant of WinGo, SuperShell, CLASSIC, Reverse, Swrort, Static AI, Suspicious PE, Detected, Patcher, ABApplication, NGBG, R664664, Artemis, Outbreak, R002H01IC24, Lcnw, uVlyNiGIejQ, susgen)
md5 e0b11d0fba0e8c49d4f268e831bccc7a
sha256 f313aa44ce787dc150571aa050ad76ab1773e5d71096e94ff92e78534eb25e23
ssdeep 98304:V3WBP9loEChXVFmEiZGZBRA5RACWNOxg:Vm9oFxiI/C5CLU
imphash f0ea7b7844bbc5bfa9bb32efdcea957c
impfuzzy 24:UbVjh9wO+VuT2oLtXOr6kwmDruMztxdEr6tP:GwO+VAXOmGx0oP
  Network IP location

Signature (6cnts)

Level Description
danger File has been identified by 44 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Detects the presence of Wine emulator
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Uses Windows utilities for basic Windows functionality
info Command line console output was observed

Rules (9cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info ftp_command ftp command binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
103.87.10.156 HK TOPWAY GLOBAL LIMITED 103.87.10.156 clean

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0xe93620 WriteFile
 0xe93628 WriteConsoleW
 0xe93630 WaitForMultipleObjects
 0xe93638 WaitForSingleObject
 0xe93640 VirtualQuery
 0xe93648 VirtualFree
 0xe93650 VirtualAlloc
 0xe93658 TlsAlloc
 0xe93660 SwitchToThread
 0xe93668 SuspendThread
 0xe93670 SetWaitableTimer
 0xe93678 SetUnhandledExceptionFilter
 0xe93680 SetProcessPriorityBoost
 0xe93688 SetEvent
 0xe93690 SetErrorMode
 0xe93698 SetConsoleCtrlHandler
 0xe936a0 ResumeThread
 0xe936a8 PostQueuedCompletionStatus
 0xe936b0 LoadLibraryA
 0xe936b8 LoadLibraryW
 0xe936c0 SetThreadContext
 0xe936c8 GetThreadContext
 0xe936d0 GetSystemInfo
 0xe936d8 GetSystemDirectoryA
 0xe936e0 GetStdHandle
 0xe936e8 GetQueuedCompletionStatusEx
 0xe936f0 GetProcessAffinityMask
 0xe936f8 GetProcAddress
 0xe93700 GetEnvironmentStringsW
 0xe93708 GetConsoleMode
 0xe93710 FreeEnvironmentStringsW
 0xe93718 ExitProcess
 0xe93720 DuplicateHandle
 0xe93728 CreateWaitableTimerExW
 0xe93730 CreateThread
 0xe93738 CreateIoCompletionPort
 0xe93740 CreateFileA
 0xe93748 CreateEventA
 0xe93750 CloseHandle
 0xe93758 AddVectoredExceptionHandler

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure