Report - QQ.exe

Generic Malware Malicious Library Malicious Packer UPX Anti_VM PE File PE32
ScreenShot
Created 2024.10.20 09:32 Machine s1_win7_x6403
Filename QQ.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
11
Behavior Score
6.6
ZERO API file : malware
VT API (file) 55 detected (AIDetectMalware, lIx9, Malicious, score, GenericKD, Unsafe, Noobyprotect, Vrg7, confidence, 100%, Attribute, HighConfidence, high confidence, M suspicious, RATX, Kryptik@AI, RDML, +YhEykvzG+XHISG, rAh6kg, AGEN, Real Protect, moderate, Static AI, Malicious PE, Detected, GrayWare, SafeGuard, Indus, @1qrzi1, Zegost, Eldorado, R102129, GenericRXAA, R002H07IB24, Gencirc, GenAsa, V9qRHIEA934, susgen, SSSE, Wacatac, B9nj)
md5 b36366f4a27987d6de47887b03f29c68
sha256 4cc1ab70e6fd0d4441c778d40212c6e3114e14d56da85717214f8498e1c1501b
ssdeep 24576:q4bDOphvGTO5+L0Un5cOoaPaoWXqEinqg4dNMBlqD9:HD2n+H5cOoUao+vib4rMu
imphash 3a8897c84eb41f36b4bbabcc617408b8
impfuzzy 3:sU9KTXzn/6yVcJUNQZn23S/KnA1MJuE9SX1Atd9C36YbW7uRAn:HGDL2WWZn2yILe1Iq36YbGeA
  Network IP location

Signature (12cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Installs itself for autorun at Windows startup
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a service
notice Creates executable files on the filesystem
notice Foreign language identified in PE resource
notice The binary likely contains encrypted or compressed data indicative of a packer
info One or more processes crashed
info The executable contains unknown PE section names indicative of a packer (could be a false positive)

Rules (7cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
110.40.45.163 Unknown 110.40.45.163 clean
106.52.15.123 CN Shenzhen Tencent Computer Systems Company Limited 106.52.15.123 malware

Suricata ids

PE API

IAT(Import Address Table) Library

KERNEL32.dll
 0x530165 GetProcAddress
MSVCRT.dll
 0x530171 strncpy
IPHLPAPI.DLL
 0x53017d GetInterfaceInfo
PSAPI.DLL
 0x530189 GetMappedFileNameW
USER32.dll
 0x530195 GetWindow
ADVAPI32.dll
 0x5301a1 RegDeleteKeyA
SHELL32.dll
 0x5301ad SHGetFolderPathW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure