Report - neofetch.exe

Generic Malware UPX Antivirus PE File PE64 PowerShell
ScreenShot
Created 2024.10.15 14:20 Machine s1_win7_x6401
Filename neofetch.exe
Type PE32+ executable (console) x86-64, for MS Windows
AI Score
2
Behavior Score
8.4
ZERO API file : malware
VT API (file) 53 detected (AIDetectMalware, Malicious, score, Artemis, GenericKD, Unsafe, Vxws, confidence, Attribute, HighConfidence, high confidence, a variant of Generik, KRBHCYM, DropperX, xycxfp, CLOUD, Nekark, znxkz, MulDrop28, Detected, Multiverze, Chgt, R002H09J324, Gencirc, Dc3d6E3kNTY, susgen, PossibleThreat, PALLAS)
md5 d6b10fe0f03dc8bdf3cd5ec9e4e3d305
sha256 d0786c4c6c967ba28706f92402a6151fc509b010e1d2a18f19118548bbe40393
ssdeep 49152:y62fe9dW85/6/+w0u9RQHNgB5ikccS6C8MXDTQom15:86W85/6/+sIga8MXDTQom15
imphash 52dee48e9c20d673929d8b1b29a57a87
impfuzzy 48:mbDlUM39ymYeF4+2R4I9bnXiX1PnvKlJJGZq5gQ61vm/Ghyq1J6urz/:UD2M3omX4HR4I9bnXiX1PviJJGsyQM7R
  Network IP location

Signature (19cnts)

Level Description
danger File has been identified by 53 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Creates a suspicious Powershell process
watch Installs itself for autorun at Windows startup
watch The process powershell.exe wrote an executable file to disk
watch Uses Sysinternals tools in order to add additional command line functionality
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info Uses Windows APIs to generate a cryptographic key

Rules (6cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://130.61.181.50/ransomware/persistance.exe DE ORACLE-BMC-31898 130.61.181.50 malware
130.61.181.50 DE ORACLE-BMC-31898 130.61.181.50 malware

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x1400ef500 GetTokenInformation
 0x1400ef508 OpenProcessToken
KERNEL32.dll
 0x1400ef518 AddVectoredExceptionHandler
 0x1400ef520 CloseHandle
 0x1400ef528 CreateEventA
 0x1400ef530 CreateSemaphoreA
 0x1400ef538 DeleteCriticalSection
 0x1400ef540 DuplicateHandle
 0x1400ef548 EnterCriticalSection
 0x1400ef550 FormatMessageA
 0x1400ef558 GetComputerNameA
 0x1400ef560 GetCurrentProcess
 0x1400ef568 GetCurrentProcessId
 0x1400ef570 GetCurrentThread
 0x1400ef578 GetCurrentThreadId
 0x1400ef580 GetHandleInformation
 0x1400ef588 GetLastError
 0x1400ef590 GetModuleHandleW
 0x1400ef598 GetProcAddress
 0x1400ef5a0 GetProcessAffinityMask
 0x1400ef5a8 GetSystemTimeAsFileTime
 0x1400ef5b0 GetThreadContext
 0x1400ef5b8 GetThreadPriority
 0x1400ef5c0 GetTickCount64
 0x1400ef5c8 GlobalMemoryStatusEx
 0x1400ef5d0 InitializeCriticalSection
 0x1400ef5d8 IsDBCSLeadByteEx
 0x1400ef5e0 IsDebuggerPresent
 0x1400ef5e8 LeaveCriticalSection
 0x1400ef5f0 LoadLibraryW
 0x1400ef5f8 LocalFree
 0x1400ef600 MultiByteToWideChar
 0x1400ef608 OpenProcess
 0x1400ef610 OutputDebugStringA
 0x1400ef618 RaiseException
 0x1400ef620 ReleaseSemaphore
 0x1400ef628 RemoveVectoredExceptionHandler
 0x1400ef630 ResetEvent
 0x1400ef638 ResumeThread
 0x1400ef640 RtlCaptureContext
 0x1400ef648 RtlLookupFunctionEntry
 0x1400ef650 RtlUnwindEx
 0x1400ef658 RtlVirtualUnwind
 0x1400ef660 SetEvent
 0x1400ef668 SetLastError
 0x1400ef670 SetProcessAffinityMask
 0x1400ef678 SetThreadContext
 0x1400ef680 SetThreadPriority
 0x1400ef688 SetUnhandledExceptionFilter
 0x1400ef690 Sleep
 0x1400ef698 SuspendThread
 0x1400ef6a0 TlsAlloc
 0x1400ef6a8 TlsGetValue
 0x1400ef6b0 TlsSetValue
 0x1400ef6b8 TryEnterCriticalSection
 0x1400ef6c0 VirtualProtect
 0x1400ef6c8 VirtualQuery
 0x1400ef6d0 WaitForMultipleObjects
 0x1400ef6d8 WaitForSingleObject
 0x1400ef6e0 WideCharToMultiByte
 0x1400ef6e8 __C_specific_handler
msvcrt.dll
 0x1400ef6f8 ___lc_codepage_func
 0x1400ef700 ___mb_cur_max_func
 0x1400ef708 __getmainargs
 0x1400ef710 __initenv
 0x1400ef718 __iob_func
 0x1400ef720 __set_app_type
 0x1400ef728 __setusermatherr
 0x1400ef730 _amsg_exit
 0x1400ef738 _beginthreadex
 0x1400ef740 _cexit
 0x1400ef748 _commode
 0x1400ef750 _errno
 0x1400ef758 _endthreadex
 0x1400ef760 _filelengthi64
 0x1400ef768 _fileno
 0x1400ef770 _fmode
 0x1400ef778 _fstat64
 0x1400ef780 _initterm
 0x1400ef788 _lseeki64
 0x1400ef790 fread
 0x1400ef798 free
 0x1400ef7a0 fsetpos
 0x1400ef7a8 memchr
 0x1400ef7b0 memcmp
 0x1400ef7b8 memcpy
 0x1400ef7c0 memmove
 0x1400ef7c8 memset
 0x1400ef7d0 printf
 0x1400ef7d8 _onexit
 0x1400ef7e0 _ultoa
 0x1400ef7e8 _setjmp
 0x1400ef7f0 _wfopen
 0x1400ef7f8 abort
 0x1400ef800 calloc
 0x1400ef808 exit
 0x1400ef810 fclose
 0x1400ef818 fflush
 0x1400ef820 fgetpos
 0x1400ef828 fopen
 0x1400ef830 fprintf
 0x1400ef838 fputc
 0x1400ef840 fputs
 0x1400ef848 fwrite
 0x1400ef850 getc
 0x1400ef858 getenv
 0x1400ef860 getwc
 0x1400ef868 iswctype
 0x1400ef870 localeconv
 0x1400ef878 longjmp
 0x1400ef880 malloc
 0x1400ef888 putc
 0x1400ef890 putwc
 0x1400ef898 realloc
 0x1400ef8a0 setlocale
 0x1400ef8a8 setvbuf
 0x1400ef8b0 signal
 0x1400ef8b8 strchr
 0x1400ef8c0 strcmp
 0x1400ef8c8 strcoll
 0x1400ef8d0 strerror
 0x1400ef8d8 strftime
 0x1400ef8e0 strlen
 0x1400ef8e8 strncmp
 0x1400ef8f0 strtoul
 0x1400ef8f8 strxfrm
 0x1400ef900 system
 0x1400ef908 towlower
 0x1400ef910 towupper
 0x1400ef918 ungetc
 0x1400ef920 ungetwc
 0x1400ef928 vfprintf
 0x1400ef930 wcscoll
 0x1400ef938 wcsftime
 0x1400ef940 wcslen
 0x1400ef948 wcsxfrm
 0x1400ef950 _write
 0x1400ef958 _strdup
 0x1400ef960 _read
 0x1400ef968 _fileno
 0x1400ef970 _fdopen
USER32.dll
 0x1400ef980 GetDesktopWindow
 0x1400ef988 GetWindowRect

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure