Report - %E5%85%AC%E7%9B%8A%E4%BC%A0%E5%A5%87.exe

Malicious Library Malicious Packer UPX PE File DllRegisterServer dll PE32 MZP Format
ScreenShot
Created 2024.09.22 17:56 Machine s1_win7_x6403
Filename %E5%85%AC%E7%9B%8A%E4%BC%A0%E5%A5%87.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
3.2
ZERO API file : mailcious
VT API (file) 47 detected (AIDetectMalware, Malicious, score, HLLP, Unsafe, Ak5j, confidence, Attribute, HighConfidence, high confidence, MultiPacked, TrojanX, Poison, p3IKYqeDVWH, PEPM, DownLoader44, high, EncPk, Static AI, Malicious PE, Detected, SGeneric, HeurC, KVMH008, Sabsik, Bladabindi, GenericRXVS, TScope, Gencirc, susgen)
md5 27f9ee956e01f9e39de89aa138e26c8b
sha256 a2987bc0cc4061ecb6be4ca1a1fe9055ca449a3c03e885229dfac0a471327b03
ssdeep 98304:Yrbc0dxOfbCIYflBduQn8LjGQrOsnVLMwbnRu14:YrbcQWb8flBdm26pnVLln/
imphash 2f727a975c44a2925ace416e4a5ad2d8
impfuzzy 96:8cfp95YU3A0MJ44Xc4Ue5zzgU83ck1C/XZqUL9DwPOQT:33+wL1CfZBaPOQT
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 47 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (7cnts)

Level Name Description Collection
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (upload)
info IsPE32 (no description) binaries (upload)
info mzp_file_format MZP(Delphi) file format binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
85.159.66.93 TR Cizgi Telekomunikasyon Anonim Sirketi 85.159.66.93 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

kernel32.dll
 0xa89168 DeleteCriticalSection
 0xa8916c LeaveCriticalSection
 0xa89170 EnterCriticalSection
 0xa89174 InitializeCriticalSection
 0xa89178 VirtualFree
 0xa8917c VirtualAlloc
 0xa89180 LocalFree
 0xa89184 LocalAlloc
 0xa89188 GetTickCount
 0xa8918c QueryPerformanceCounter
 0xa89190 GetVersion
 0xa89194 GetCurrentThreadId
 0xa89198 InterlockedDecrement
 0xa8919c InterlockedIncrement
 0xa891a0 VirtualQuery
 0xa891a4 WideCharToMultiByte
 0xa891a8 MultiByteToWideChar
 0xa891ac lstrlenA
 0xa891b0 lstrcpynA
 0xa891b4 LoadLibraryExA
 0xa891b8 GetThreadLocale
 0xa891bc GetStartupInfoA
 0xa891c0 GetProcAddress
 0xa891c4 GetModuleHandleA
 0xa891c8 GetModuleFileNameA
 0xa891cc GetLocaleInfoA
 0xa891d0 GetCommandLineA
 0xa891d4 FreeLibrary
 0xa891d8 FindFirstFileA
 0xa891dc FindClose
 0xa891e0 ExitProcess
 0xa891e4 ExitThread
 0xa891e8 WriteFile
 0xa891ec UnhandledExceptionFilter
 0xa891f0 RtlUnwind
 0xa891f4 RaiseException
 0xa891f8 GetStdHandle
user32.dll
 0xa89200 GetKeyboardType
 0xa89204 LoadStringA
 0xa89208 MessageBoxA
 0xa8920c CharNextA
advapi32.dll
 0xa89214 RegQueryValueExA
 0xa89218 RegOpenKeyExA
 0xa8921c RegCloseKey
oleaut32.dll
 0xa89224 SysFreeString
 0xa89228 SysReAllocStringLen
 0xa8922c SysAllocStringLen
kernel32.dll
 0xa89234 TlsSetValue
 0xa89238 TlsGetValue
 0xa8923c TlsFree
 0xa89240 TlsAlloc
 0xa89244 LocalFree
 0xa89248 LocalAlloc
advapi32.dll
 0xa89250 RegOpenKeyA
kernel32.dll
 0xa89258 WriteProcessMemory
 0xa8925c WriteFile
 0xa89260 WideCharToMultiByte
 0xa89264 WaitForSingleObject
 0xa89268 VirtualQuery
 0xa8926c VirtualProtectEx
 0xa89270 VirtualProtect
 0xa89274 VirtualFree
 0xa89278 VirtualAllocEx
 0xa8927c VirtualAlloc
 0xa89280 SystemTimeToFileTime
 0xa89284 SizeofResource
 0xa89288 SetThreadContext
 0xa8928c SetLastError
 0xa89290 SetFilePointer
 0xa89294 SetFileAttributesW
 0xa89298 SetFileAttributesA
 0xa8929c SetEvent
 0xa892a0 SetErrorMode
 0xa892a4 SetEndOfFile
 0xa892a8 SetCurrentDirectoryW
 0xa892ac SetCurrentDirectoryA
 0xa892b0 ResetEvent
 0xa892b4 RemoveDirectoryW
 0xa892b8 RemoveDirectoryA
 0xa892bc ReadProcessMemory
 0xa892c0 ReadFile
 0xa892c4 RaiseException
 0xa892c8 QueryDosDeviceW
 0xa892cc PostQueuedCompletionStatus
 0xa892d0 MultiByteToWideChar
 0xa892d4 LockResource
 0xa892d8 LoadResource
 0xa892dc LoadLibraryW
 0xa892e0 LoadLibraryA
 0xa892e4 LeaveCriticalSection
 0xa892e8 IsBadWritePtr
 0xa892ec IsBadStringPtrW
 0xa892f0 IsBadReadPtr
 0xa892f4 InitializeCriticalSection
 0xa892f8 GetWindowsDirectoryW
 0xa892fc GetWindowsDirectoryA
 0xa89300 GetVersionExA
 0xa89304 GetVersion
 0xa89308 GetThreadLocale
 0xa8930c GetThreadContext
 0xa89310 GetTempPathW
 0xa89314 GetTempPathA
 0xa89318 GetTempFileNameW
 0xa8931c GetTempFileNameA
 0xa89320 GetSystemDirectoryW
 0xa89324 GetSystemDirectoryA
 0xa89328 GetStringTypeExW
 0xa8932c GetStringTypeExA
 0xa89330 GetStdHandle
 0xa89334 GetProcAddress
 0xa89338 GetModuleHandleA
 0xa8933c GetModuleFileNameW
 0xa89340 GetModuleFileNameA
 0xa89344 GetLogicalDriveStringsW
 0xa89348 GetLocaleInfoW
 0xa8934c GetLocaleInfoA
 0xa89350 GetLocalTime
 0xa89354 GetLastError
 0xa89358 GetFullPathNameW
 0xa8935c GetFullPathNameA
 0xa89360 GetFileSize
 0xa89364 GetFileAttributesW
 0xa89368 GetFileAttributesA
 0xa8936c GetDiskFreeSpaceA
 0xa89370 GetDateFormatA
 0xa89374 GetCurrentThreadId
 0xa89378 GetCurrentProcessId
 0xa8937c GetCurrentProcess
 0xa89380 GetCurrentDirectoryW
 0xa89384 GetCurrentDirectoryA
 0xa89388 GetCPInfo
 0xa8938c GetACP
 0xa89390 FreeResource
 0xa89394 FreeLibrary
 0xa89398 FormatMessageA
 0xa8939c FlushInstructionCache
 0xa893a0 FlushFileBuffers
 0xa893a4 FindResourceW
 0xa893a8 FindNextFileW
 0xa893ac FindNextFileA
 0xa893b0 FindFirstFileW
 0xa893b4 FindFirstFileA
 0xa893b8 FindClose
 0xa893bc FileTimeToLocalFileTime
 0xa893c0 FileTimeToDosDateTime
 0xa893c4 ExitProcess
 0xa893c8 EnumCalendarInfoA
 0xa893cc EnterCriticalSection
 0xa893d0 DeleteFileW
 0xa893d4 DeleteFileA
 0xa893d8 DeleteCriticalSection
 0xa893dc CreateRemoteThread
 0xa893e0 CreateFileW
 0xa893e4 CreateFileA
 0xa893e8 CreateEventA
 0xa893ec CreateDirectoryW
 0xa893f0 CreateDirectoryA
 0xa893f4 CompareStringW
 0xa893f8 CompareStringA
 0xa893fc CloseHandle
user32.dll
 0xa89404 MessageBoxW
 0xa89408 MessageBoxA
 0xa8940c LoadStringA
 0xa89410 GetSystemMetrics
 0xa89414 CharUpperBuffW
 0xa89418 CharUpperW
 0xa8941c CharLowerBuffW
 0xa89420 CharLowerW
 0xa89424 CharNextA
 0xa89428 CharLowerA
 0xa8942c CharUpperA
 0xa89430 CharToOemA
kernel32.dll
 0xa89438 Sleep
kernel32.dll
 0xa89440 QueryDosDeviceW
 0xa89444 GetModuleHandleA
 0xa89448 GetProcAddress
ole32.dll
 0xa89450 CreateStreamOnHGlobal
 0xa89454 CoUninitialize
 0xa89458 CoInitialize
oleaut32.dll
 0xa89460 GetErrorInfo
 0xa89464 SysFreeString
oleaut32.dll
 0xa8946c SafeArrayPtrOfIndex
 0xa89470 SafeArrayGetUBound
 0xa89474 SafeArrayGetLBound
 0xa89478 SafeArrayCreate
 0xa8947c VariantChangeType
 0xa89480 VariantCopy
 0xa89484 VariantClear
 0xa89488 VariantInit
ntdll.dll
 0xa89490 RtlInitUnicodeString
 0xa89494 RtlFreeUnicodeString
 0xa89498 RtlFormatCurrentUserKeyPath
 0xa8949c RtlDosPathNameToNtPathName_U
SHFolder.dll
 0xa894a4 SHGetFolderPathW
 0xa894a8 SHGetFolderPathA
ntdll.dll
 0xa894b0 ZwProtectVirtualMemory
shlwapi.dll
 0xa894b8 PathMatchSpecW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure