Report - javumarfirst.exe

Generic Malware UPX PE File PE32 DLL
ScreenShot
Created 2024.10.04 11:19 Machine s1_win7_x6403
Filename javumarfirst.exe
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
AI Score
2
Behavior Score
3.0
ZERO API file : malware
VT API (file) 11 detected (AIDetectMalware, malicious, confidence, high confidence, GenKryptik, HBZR, CrypterX, Kryptik, 25KWoxie6RB, CryptBot, Ckjl)
md5 506f20dc6d2d9a4bd2725a726679b74e
sha256 9259b00bb10494cb883a4999ea33ff59452df9e09d2c30beafae09fd980b8baf
ssdeep 49152:o18FBWG6cBjNOL/SoDUVs7dxzg57AEgPQhaYkOr74oBxBRO+uaXHMEUs9N+qaKDJ:RBDBpi/SoDUVshx03wQA
imphash 41db2083dac89343aef584a51a80b293
impfuzzy 24:QT/gfiFAD1vOBoIkLyJdfpTX5XG0bEKkxJgr6vlbDcqSZ9FZGXZ2:9fiIooIk0xTXJG0bNkxJgr6vRwqoFZGM
  Network IP location

Signature (7cnts)

Level Description
watch File has been identified by 11 AntiVirus engines on VirusTotal as malicious
notice Drops an executable to the user AppData folder
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Resolves a suspicious Top Level Domain (TLD)
notice Sends data using the HTTP POST Method
notice The binary likely contains encrypted or compressed data indicative of a packer

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://sevtvx17ht.top/v1/upload.php RU Chernyshov Aleksandr Aleksandrovich 80.66.81.78 clean
sevtvx17ht.top RU Chernyshov Aleksandr Aleksandrovich 80.66.81.78 clean
80.66.81.78 RU Chernyshov Aleksandr Aleksandrovich 80.66.81.78 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0xa9921c CryptAcquireContextA
 0xa99220 CryptGenRandom
 0xa99224 CryptReleaseContext
KERNEL32.dll
 0xa9922c DeleteCriticalSection
 0xa99230 EnterCriticalSection
 0xa99234 FreeLibrary
 0xa99238 GetLastError
 0xa9923c GetModuleHandleA
 0xa99240 GetModuleHandleW
 0xa99244 GetNativeSystemInfo
 0xa99248 GetProcAddress
 0xa9924c GetProcessHeap
 0xa99250 GetStartupInfoA
 0xa99254 GetThreadLocale
 0xa99258 HeapAlloc
 0xa9925c HeapFree
 0xa99260 InitializeCriticalSection
 0xa99264 IsBadReadPtr
 0xa99268 IsDBCSLeadByteEx
 0xa9926c LeaveCriticalSection
 0xa99270 LoadLibraryA
 0xa99274 MultiByteToWideChar
 0xa99278 SetLastError
 0xa9927c SetUnhandledExceptionFilter
 0xa99280 Sleep
 0xa99284 TlsGetValue
 0xa99288 VirtualAlloc
 0xa9928c VirtualFree
 0xa99290 VirtualProtect
 0xa99294 VirtualQuery
 0xa99298 WideCharToMultiByte
 0xa9929c lstrlenA
msvcrt.dll
 0xa992a4 __getmainargs
 0xa992a8 __initenv
 0xa992ac __mb_cur_max
 0xa992b0 __p__acmdln
 0xa992b4 __p__commode
 0xa992b8 __p__fmode
 0xa992bc __set_app_type
 0xa992c0 __setusermatherr
 0xa992c4 _amsg_exit
 0xa992c8 _assert
 0xa992cc _cexit
 0xa992d0 _errno
 0xa992d4 _chsize
 0xa992d8 _exit
 0xa992dc _filelengthi64
 0xa992e0 _fileno
 0xa992e4 _initterm
 0xa992e8 _iob
 0xa992ec _lock
 0xa992f0 _onexit
 0xa992f4 _unlock
 0xa992f8 _wcsnicmp
 0xa992fc abort
 0xa99300 atoi
 0xa99304 search
 0xa99308 calloc
 0xa9930c exit
 0xa99310 fclose
 0xa99314 fflush
 0xa99318 fgetpos
 0xa9931c fopen
 0xa99320 fputc
 0xa99324 fread
 0xa99328 free
 0xa9932c freopen
 0xa99330 fsetpos
 0xa99334 fwrite
 0xa99338 getc
 0xa9933c islower
 0xa99340 isspace
 0xa99344 isupper
 0xa99348 isxdigit
 0xa9934c localeconv
 0xa99350 malloc
 0xa99354 mbstowcs
 0xa99358 memcmp
 0xa9935c memcpy
 0xa99360 memmove
 0xa99364 memset
 0xa99368 mktime
 0xa9936c localtime
 0xa99370 difftime
 0xa99374 _mkdir
 0xa99378 perror
 0xa9937c qsort
 0xa99380 realloc
 0xa99384 remove
 0xa99388 setlocale
 0xa9938c signal
 0xa99390 strchr
 0xa99394 strcmp
 0xa99398 strerror
 0xa9939c strlen
 0xa993a0 strncmp
 0xa993a4 strncpy
 0xa993a8 strtol
 0xa993ac strtoul
 0xa993b0 tolower
 0xa993b4 ungetc
 0xa993b8 vfprintf
 0xa993bc time
 0xa993c0 wcslen
 0xa993c4 wcstombs
 0xa993c8 _stat
 0xa993cc _write
 0xa993d0 _utime
 0xa993d4 _open
 0xa993d8 _fileno
 0xa993dc _close
 0xa993e0 _chmod

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure