Report - ax.exe

Generic Malware Malicious Library Malicious Packer ASPack Antivirus UPX Anti_VM PE File DllRegisterServer dll PE32 OS Processor Check PE64
ScreenShot
Created 2024.10.17 11:11 Machine s1_win7_x6403
Filename ax.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
10
Behavior Score
11.0
ZERO API file : mailcious
VT API (file) 65 detected (AIDetectMalware, lx2b, Malicious, score, Mauvaise, GenericKDZ, Unsafe, SilverFox, swkah, confidence, 100%, Attribute, HighConfidence, Windows, Threat, FlyStudio, RATX, Barys, Farfli, ejlmmx, CLASSIC, ValleyRAT, lyquj, R002C0DIB24, Real Protect, moderate, AutoG, Static AI, Malicious PE, cakkw, Tiggre, Detected, RA@1qraug, 10ODIJ9, Eldorado, Hupigon, GenericRXAA, Siscos, Genetic, GenAsa, y0qT6qoG8CA, susgen)
md5 431c75b491aa7535b92c5d9c00e23675
sha256 66efd841fe3f48cba194688551284c8b7b775d8dd7401b813fd879bf7b366e7f
ssdeep 49152:6X4uXjo0Zdx+3M7TF5D2n+H5cOoUao+vib4rMw:e4uTo0Zdxzs9Oobo+q8Mw
imphash bb9d495821e6e730a7a07045d899c977
impfuzzy 192:jJPXc0rIUqT0/QTzStseTYycjcnciADMSQOE:Bc82Ton4aGE
  Network IP location

Signature (23cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 65 AntiVirus engines on VirusTotal as malicious
watch Checks the CPU name from registry
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Created a process named as a common system process
notice Creates a service
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops a binary and executes it
notice Drops an executable to the user AppData folder
notice Expresses interest in specific running processes
notice Foreign language identified in PE resource
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
notice Repeatedly searches for a not-found process
notice Searches running processes potentially to identify processes for sandbox evasion
info Checks amount of memory in system
info One or more processes crashed
info The executable uses a known packer
info The file contains an unknown PE resource name possibly indicative of a packer

Rules (20cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Antivirus Contains references to security software binaries (upload)
watch ASPack_Zero ASPack packed file binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (download)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (download)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info DllRegisterServer_Zero execute regsvr32.exe binaries (upload)
info IsPE32 (no description) binaries (download)
info IsPE32 (no description) binaries (upload)
info IsPE64 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (download)
info PE_Header_Zero PE File Signature binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
iamasbcx.asuscomm.com Unknown clean
110.40.45.163 Unknown 110.40.45.163 clean
106.52.15.123 CN Shenzhen Tencent Computer Systems Company Limited 106.52.15.123 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x47d170 FreeEnvironmentStringsA
 0x47d174 UnhandledExceptionFilter
 0x47d178 GetACP
 0x47d17c HeapSize
 0x47d180 TerminateProcess
 0x47d184 GetLocalTime
 0x47d188 GetSystemTime
 0x47d18c GetTimeZoneInformation
 0x47d190 RaiseException
 0x47d194 RtlUnwind
 0x47d198 GetStartupInfoA
 0x47d19c GetOEMCP
 0x47d1a0 GetCPInfo
 0x47d1a4 GetProcessVersion
 0x47d1a8 SetErrorMode
 0x47d1ac GlobalFlags
 0x47d1b0 FreeEnvironmentStringsW
 0x47d1b4 GetFileTime
 0x47d1b8 GetFileSize
 0x47d1bc TlsGetValue
 0x47d1c0 LocalReAlloc
 0x47d1c4 TlsSetValue
 0x47d1c8 TlsFree
 0x47d1cc GlobalHandle
 0x47d1d0 TlsAlloc
 0x47d1d4 LocalAlloc
 0x47d1d8 lstrcmpA
 0x47d1dc GetVersion
 0x47d1e0 GlobalGetAtomNameA
 0x47d1e4 GlobalAddAtomA
 0x47d1e8 GlobalFindAtomA
 0x47d1ec GlobalDeleteAtom
 0x47d1f0 lstrcmpiA
 0x47d1f4 SetEndOfFile
 0x47d1f8 UnlockFile
 0x47d1fc LockFile
 0x47d200 FlushFileBuffers
 0x47d204 SetFilePointer
 0x47d208 DuplicateHandle
 0x47d20c lstrcpynA
 0x47d210 SetLastError
 0x47d214 FileTimeToLocalFileTime
 0x47d218 FileTimeToSystemTime
 0x47d21c LocalFree
 0x47d220 InterlockedDecrement
 0x47d224 InterlockedIncrement
 0x47d228 GetEnvironmentStrings
 0x47d22c GetEnvironmentStringsW
 0x47d230 SetHandleCount
 0x47d234 GetStdHandle
 0x47d238 GetFileType
 0x47d23c GetEnvironmentVariableA
 0x47d240 HeapDestroy
 0x47d244 HeapCreate
 0x47d248 VirtualFree
 0x47d24c SetEnvironmentVariableA
 0x47d250 LCMapStringA
 0x47d254 LCMapStringW
 0x47d258 VirtualAlloc
 0x47d25c IsBadWritePtr
 0x47d260 GetStringTypeA
 0x47d264 GetStringTypeW
 0x47d268 SetUnhandledExceptionFilter
 0x47d26c CompareStringA
 0x47d270 CompareStringW
 0x47d274 IsBadReadPtr
 0x47d278 IsBadCodePtr
 0x47d27c SetStdHandle
 0x47d280 WideCharToMultiByte
 0x47d284 MultiByteToWideChar
 0x47d288 GetCurrentProcess
 0x47d28c GetWindowsDirectoryA
 0x47d290 GetSystemDirectoryA
 0x47d294 CreateSemaphoreA
 0x47d298 ResumeThread
 0x47d29c ReleaseSemaphore
 0x47d2a0 EnterCriticalSection
 0x47d2a4 LeaveCriticalSection
 0x47d2a8 GetProfileStringA
 0x47d2ac WriteFile
 0x47d2b0 ReadFile
 0x47d2b4 WaitForMultipleObjects
 0x47d2b8 CreateFileA
 0x47d2bc SetEvent
 0x47d2c0 FindResourceA
 0x47d2c4 LoadResource
 0x47d2c8 LockResource
 0x47d2cc GetModuleFileNameA
 0x47d2d0 GetCurrentThreadId
 0x47d2d4 ExitProcess
 0x47d2d8 GlobalSize
 0x47d2dc GlobalFree
 0x47d2e0 DeleteCriticalSection
 0x47d2e4 InitializeCriticalSection
 0x47d2e8 lstrcatA
 0x47d2ec lstrlenA
 0x47d2f0 WinExec
 0x47d2f4 lstrcpyA
 0x47d2f8 FindNextFileA
 0x47d2fc CloseHandle
 0x47d300 GlobalReAlloc
 0x47d304 HeapFree
 0x47d308 HeapReAlloc
 0x47d30c GetProcessHeap
 0x47d310 HeapAlloc
 0x47d314 GetFullPathNameA
 0x47d318 FreeLibrary
 0x47d31c LoadLibraryA
 0x47d320 GetLastError
 0x47d324 GetVersionExA
 0x47d328 WritePrivateProfileStringA
 0x47d32c CreateThread
 0x47d330 CreateEventA
 0x47d334 Sleep
 0x47d338 GlobalAlloc
 0x47d33c GlobalLock
 0x47d340 GlobalUnlock
 0x47d344 GetTempPathA
 0x47d348 FindFirstFileA
 0x47d34c FindClose
 0x47d350 GetFileAttributesA
 0x47d354 DeleteFileA
 0x47d358 SetCurrentDirectoryA
 0x47d35c GetVolumeInformationA
 0x47d360 GetModuleHandleA
 0x47d364 GetProcAddress
 0x47d368 MulDiv
 0x47d36c GetCommandLineA
 0x47d370 GetTickCount
 0x47d374 WaitForSingleObject
 0x47d378 GetCurrentThread
USER32.dll
 0x47d3a0 GetForegroundWindow
 0x47d3a4 LoadIconA
 0x47d3a8 TranslateMessage
 0x47d3ac DrawFrameControl
 0x47d3b0 DrawEdge
 0x47d3b4 DrawFocusRect
 0x47d3b8 WindowFromPoint
 0x47d3bc GetMessageA
 0x47d3c0 DispatchMessageA
 0x47d3c4 SetRectEmpty
 0x47d3c8 RegisterClipboardFormatA
 0x47d3cc CreateIconFromResourceEx
 0x47d3d0 CreateIconFromResource
 0x47d3d4 DrawIconEx
 0x47d3d8 CreatePopupMenu
 0x47d3dc AppendMenuA
 0x47d3e0 ModifyMenuA
 0x47d3e4 CreateMenu
 0x47d3e8 CreateAcceleratorTableA
 0x47d3ec GetDlgCtrlID
 0x47d3f0 GetSubMenu
 0x47d3f4 EnableMenuItem
 0x47d3f8 ClientToScreen
 0x47d3fc EnumDisplaySettingsA
 0x47d400 LoadImageA
 0x47d404 SystemParametersInfoA
 0x47d408 ShowWindow
 0x47d40c IsWindowEnabled
 0x47d410 TranslateAcceleratorA
 0x47d414 GetKeyState
 0x47d418 CopyAcceleratorTableA
 0x47d41c PostQuitMessage
 0x47d420 IsZoomed
 0x47d424 GetClassInfoA
 0x47d428 DefWindowProcA
 0x47d42c GetMenu
 0x47d430 SetMenu
 0x47d434 PeekMessageA
 0x47d438 IsIconic
 0x47d43c SetFocus
 0x47d440 GetActiveWindow
 0x47d444 GetWindow
 0x47d448 DestroyAcceleratorTable
 0x47d44c SetWindowRgn
 0x47d450 GetMessagePos
 0x47d454 ScreenToClient
 0x47d458 ChildWindowFromPointEx
 0x47d45c CopyRect
 0x47d460 LoadBitmapA
 0x47d464 WinHelpA
 0x47d468 KillTimer
 0x47d46c SetTimer
 0x47d470 ReleaseCapture
 0x47d474 GetCapture
 0x47d478 SetCapture
 0x47d47c GetScrollRange
 0x47d480 SetScrollRange
 0x47d484 SetScrollPos
 0x47d488 SetRect
 0x47d48c InflateRect
 0x47d490 IntersectRect
 0x47d494 DestroyIcon
 0x47d498 UnregisterClassA
 0x47d49c OffsetRect
 0x47d4a0 IsWindowVisible
 0x47d4a4 EnableWindow
 0x47d4a8 RedrawWindow
 0x47d4ac GetWindowLongA
 0x47d4b0 SetWindowLongA
 0x47d4b4 GetSysColor
 0x47d4b8 SetActiveWindow
 0x47d4bc SetCursorPos
 0x47d4c0 LoadCursorA
 0x47d4c4 SetCursor
 0x47d4c8 GetDC
 0x47d4cc FillRect
 0x47d4d0 IsRectEmpty
 0x47d4d4 ReleaseDC
 0x47d4d8 IsChild
 0x47d4dc DestroyMenu
 0x47d4e0 SetForegroundWindow
 0x47d4e4 GetWindowRect
 0x47d4e8 EqualRect
 0x47d4ec UpdateWindow
 0x47d4f0 ValidateRect
 0x47d4f4 InvalidateRect
 0x47d4f8 GetClientRect
 0x47d4fc GetFocus
 0x47d500 GetWindowTextA
 0x47d504 GetWindowTextLengthA
 0x47d508 CharUpperA
 0x47d50c GetWindowDC
 0x47d510 BeginPaint
 0x47d514 EndPaint
 0x47d518 TabbedTextOutA
 0x47d51c DrawTextA
 0x47d520 GrayStringA
 0x47d524 GetDlgItem
 0x47d528 DestroyWindow
 0x47d52c CreateDialogIndirectParamA
 0x47d530 EndDialog
 0x47d534 GetNextDlgTabItem
 0x47d538 GetWindowPlacement
 0x47d53c RegisterWindowMessageA
 0x47d540 GetLastActivePopup
 0x47d544 GetMessageTime
 0x47d548 RemovePropA
 0x47d54c CallWindowProcA
 0x47d550 GetPropA
 0x47d554 UnhookWindowsHookEx
 0x47d558 SetPropA
 0x47d55c GetClassLongA
 0x47d560 CallNextHookEx
 0x47d564 SetWindowsHookExA
 0x47d568 CreateWindowExA
 0x47d56c GetMenuItemID
 0x47d570 GetMenuItemCount
 0x47d574 RegisterClassA
 0x47d578 GetScrollPos
 0x47d57c AdjustWindowRectEx
 0x47d580 MapWindowPoints
 0x47d584 SendDlgItemMessageA
 0x47d588 ScrollWindowEx
 0x47d58c IsDialogMessageA
 0x47d590 SetWindowTextA
 0x47d594 MoveWindow
 0x47d598 CheckMenuItem
 0x47d59c SetMenuItemBitmaps
 0x47d5a0 GetMenuState
 0x47d5a4 GetMenuCheckMarkDimensions
 0x47d5a8 GetClassNameA
 0x47d5ac GetDesktopWindow
 0x47d5b0 LoadStringA
 0x47d5b4 GetSysColorBrush
 0x47d5b8 GetParent
 0x47d5bc GetTopWindow
 0x47d5c0 PostMessageA
 0x47d5c4 IsWindow
 0x47d5c8 SetParent
 0x47d5cc DestroyCursor
 0x47d5d0 SendMessageA
 0x47d5d4 SetWindowPos
 0x47d5d8 MessageBoxA
 0x47d5dc GetCursorPos
 0x47d5e0 GetSystemMetrics
 0x47d5e4 EmptyClipboard
 0x47d5e8 SetClipboardData
 0x47d5ec OpenClipboard
 0x47d5f0 GetClipboardData
 0x47d5f4 CloseClipboard
 0x47d5f8 wsprintfA
 0x47d5fc PtInRect
GDI32.dll
 0x47d024 GetTextMetricsA
 0x47d028 LineTo
 0x47d02c Escape
 0x47d030 ExtTextOutA
 0x47d034 TextOutA
 0x47d038 RectVisible
 0x47d03c PtVisible
 0x47d040 GetViewportExtEx
 0x47d044 ExtSelectClipRgn
 0x47d048 SetBkColor
 0x47d04c CreateRectRgnIndirect
 0x47d050 SetStretchBltMode
 0x47d054 GetClipRgn
 0x47d058 CreatePolygonRgn
 0x47d05c SelectClipRgn
 0x47d060 DeleteObject
 0x47d064 CreateDIBitmap
 0x47d068 GetSystemPaletteEntries
 0x47d06c CreatePalette
 0x47d070 StretchBlt
 0x47d074 SelectPalette
 0x47d078 RealizePalette
 0x47d07c GetDIBits
 0x47d080 GetWindowExtEx
 0x47d084 GetViewportOrgEx
 0x47d088 GetWindowOrgEx
 0x47d08c BeginPath
 0x47d090 EndPath
 0x47d094 PathToRegion
 0x47d098 CreateEllipticRgn
 0x47d09c CreateRoundRectRgn
 0x47d0a0 GetTextColor
 0x47d0a4 GetBkMode
 0x47d0a8 GetBkColor
 0x47d0ac GetROP2
 0x47d0b0 GetStretchBltMode
 0x47d0b4 GetPolyFillMode
 0x47d0b8 CreateCompatibleBitmap
 0x47d0bc CreateDCA
 0x47d0c0 CreateBitmap
 0x47d0c4 SelectObject
 0x47d0c8 GetObjectA
 0x47d0cc CreatePen
 0x47d0d0 PatBlt
 0x47d0d4 CombineRgn
 0x47d0d8 CreateRectRgn
 0x47d0dc FillRgn
 0x47d0e0 CreateSolidBrush
 0x47d0e4 MoveToEx
 0x47d0e8 ExcludeClipRect
 0x47d0ec GetClipBox
 0x47d0f0 ScaleWindowExtEx
 0x47d0f4 SetWindowExtEx
 0x47d0f8 SetWindowOrgEx
 0x47d0fc ScaleViewportExtEx
 0x47d100 SetViewportExtEx
 0x47d104 OffsetViewportOrgEx
 0x47d108 SetViewportOrgEx
 0x47d10c SetMapMode
 0x47d110 SetTextColor
 0x47d114 SetROP2
 0x47d118 SetPolyFillMode
 0x47d11c SetBkMode
 0x47d120 RestoreDC
 0x47d124 SaveDC
 0x47d128 GetStockObject
 0x47d12c CreateFontIndirectA
 0x47d130 EndPage
 0x47d134 EndDoc
 0x47d138 DeleteDC
 0x47d13c StartDocA
 0x47d140 StartPage
 0x47d144 BitBlt
 0x47d148 CreateCompatibleDC
 0x47d14c Ellipse
 0x47d150 Rectangle
 0x47d154 LPtoDP
 0x47d158 DPtoLP
 0x47d15c GetCurrentObject
 0x47d160 RoundRect
 0x47d164 GetTextExtentPoint32A
 0x47d168 GetDeviceCaps
WINMM.dll
 0x47d604 midiOutReset
 0x47d608 midiStreamRestart
 0x47d60c midiStreamStop
 0x47d610 midiStreamOut
 0x47d614 waveOutUnprepareHeader
 0x47d618 waveOutPrepareHeader
 0x47d61c waveOutWrite
 0x47d620 waveOutPause
 0x47d624 midiOutPrepareHeader
 0x47d628 midiStreamProperty
 0x47d62c waveOutReset
 0x47d630 waveOutClose
 0x47d634 waveOutGetNumDevs
 0x47d638 waveOutOpen
 0x47d63c midiOutUnprepareHeader
 0x47d640 midiStreamOpen
 0x47d644 midiStreamClose
WINSPOOL.DRV
 0x47d64c ClosePrinter
 0x47d650 DocumentPropertiesA
 0x47d654 OpenPrinterA
ADVAPI32.dll
 0x47d000 RegOpenKeyExA
 0x47d004 RegCreateKeyExA
 0x47d008 RegCloseKey
 0x47d00c RegSetValueExA
 0x47d010 RegQueryValueA
SHELL32.dll
 0x47d390 ShellExecuteA
 0x47d394 Shell_NotifyIconA
 0x47d398 SHGetSpecialFolderPathA
ole32.dll
 0x47d698 OleUninitialize
 0x47d69c OleInitialize
 0x47d6a0 CLSIDFromString
OLEAUT32.dll
 0x47d380 UnRegisterTypeLib
 0x47d384 RegisterTypeLib
 0x47d388 LoadTypeLib
COMCTL32.dll
 0x47d018 ImageList_Destroy
 0x47d01c None
WS2_32.dll
 0x47d65c inet_ntoa
 0x47d660 WSACleanup
 0x47d664 closesocket
 0x47d668 WSAAsyncSelect
 0x47d66c recvfrom
 0x47d670 ioctlsocket
 0x47d674 recv
 0x47d678 getpeername
 0x47d67c accept
comdlg32.dll
 0x47d684 GetFileTitleA
 0x47d688 GetSaveFileNameA
 0x47d68c GetOpenFileNameA
 0x47d690 ChooseColorA

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure