Report - file.exe

Generic Malware Malicious Library Admin Tool (Sysinternals etc ...) UPX Antivirus PE File PE32 OS Processor Check PowerShell
ScreenShot
Created 2024.10.21 14:36 Machine s1_win7_x6403
Filename file.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
6
Behavior Score
10.0
ZERO API file : malware
VT API (file) 54 detected (AIDetectMalware, PsDownload, Malicious, score, Unsafe, Kryptik, V9gm, confidence, 100%, Attribute, HighConfidence, high confidence, HROL, PrivateLoader, CLASSIC, AGEN, high, Static AI, Malicious PE, Detected, Eldorado, BScope, TrojanPSW, Coins, Chgt, Gencirc, susgen)
md5 f7f61ffb8e1f1e272bdf4d326086e760
sha256 e98ae7f96f7cee07ef93b3c98ccae81c66b29e4ede046112e200bf7c152fa9af
ssdeep 3072:gScZKjx60GZBXexRmPuQ+RQH+GAL+fI1dzEBKARdYChZMuqoQjn5:3jxt39TQHIzfgdSu65
imphash 7e3d431a1dbc2f47cc054da5d0f48777
impfuzzy 24:+BOja3MUw/2Au92BYYklZOfXc+MeD/6X8/l39yJEcMSOovbOwZY9Qw3hIznKZc:+BOja0LKYU4Xc+R6X8/prH3nQuh0K2
  Network IP location

Signature (15cnts)

Level Description
danger File has been identified by 54 AntiVirus engines on VirusTotal as malicious
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Powershell script has download & invoke calls
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info Uses Windows APIs to generate a cryptographic key

Rules (11cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Admin_Tool_IN_Zero Admin Tool Sysinternals binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE32 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info PowerShell PowerShell script scripts
info PowershellDI Extract Download/Invoke calls from powershell script scripts

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
osecweb.ir IR Iran Telecommunication Company PJS 185.79.156.69 malware

Suricata ids

PE API

IAT(Import Address Table) Library

WININET.dll
 0x414160 InternetReadFile
 0x414164 InternetCloseHandle
 0x414168 InternetCrackUrlW
 0x41416c InternetOpenW
 0x414170 InternetOpenUrlW
 0x414174 InternetQueryDataAvailable
SHLWAPI.dll
 0x414148 wnsprintfW
 0x41414c StrStrW
KERNEL32.dll
 0x414014 SetFilePointerEx
 0x414018 GetConsoleMode
 0x41401c GetConsoleOutputCP
 0x414020 FlushFileBuffers
 0x414024 WriteFile
 0x414028 ExpandEnvironmentStringsW
 0x41402c TerminateProcess
 0x414030 GetModuleFileNameW
 0x414034 CreateJobObjectW
 0x414038 GetEnvironmentVariableW
 0x41403c CreateMutexW
 0x414040 CreateFileW
 0x414044 GetFileAttributesW
 0x414048 GetSystemWow64DirectoryW
 0x41404c GetLastError
 0x414050 lstrcatW
 0x414054 CloseHandle
 0x414058 ExitProcess
 0x41405c GetCurrentProcessId
 0x414060 GetModuleHandleW
 0x414064 lstrcpyW
 0x414068 GetTempFileNameW
 0x41406c HeapFree
 0x414070 HeapReAlloc
 0x414074 HeapAlloc
 0x414078 GetProcessHeap
 0x41407c WideCharToMultiByte
 0x414080 HeapSize
 0x414084 GetStringTypeW
 0x414088 SetStdHandle
 0x41408c WriteConsoleW
 0x414090 EncodePointer
 0x414094 UnhandledExceptionFilter
 0x414098 EnterCriticalSection
 0x41409c LeaveCriticalSection
 0x4140a0 DeleteCriticalSection
 0x4140a4 CreateEventW
 0x4140a8 GetProcAddress
 0x4140ac DecodePointer
 0x4140b0 SetUnhandledExceptionFilter
 0x4140b4 GetCurrentProcess
 0x4140b8 IsProcessorFeaturePresent
 0x4140bc IsDebuggerPresent
 0x4140c0 GetStartupInfoW
 0x4140c4 QueryPerformanceCounter
 0x4140c8 GetCurrentThreadId
 0x4140cc GetSystemTimeAsFileTime
 0x4140d0 InitializeSListHead
 0x4140d4 RaiseException
 0x4140d8 InitializeCriticalSectionAndSpinCount
 0x4140dc TlsAlloc
 0x4140e0 TlsGetValue
 0x4140e4 TlsSetValue
 0x4140e8 TlsFree
 0x4140ec FreeLibrary
 0x4140f0 LoadLibraryExW
 0x4140f4 SetLastError
 0x4140f8 RtlUnwind
 0x4140fc GetModuleHandleExW
 0x414100 GetStdHandle
 0x414104 FindClose
 0x414108 FindFirstFileExW
 0x41410c FindNextFileW
 0x414110 IsValidCodePage
 0x414114 GetACP
 0x414118 GetOEMCP
 0x41411c GetCPInfo
 0x414120 GetCommandLineA
 0x414124 GetCommandLineW
 0x414128 MultiByteToWideChar
 0x41412c GetEnvironmentStringsW
 0x414130 FreeEnvironmentStringsW
 0x414134 LCMapStringW
 0x414138 GetFileType
USER32.dll
 0x414154 MessageBoxA
 0x414158 wsprintfW
ADVAPI32.dll
 0x414000 GetSidSubAuthority
 0x414004 OpenProcessToken
 0x414008 GetTokenInformation
 0x41400c GetSidSubAuthorityCount
SHELL32.dll
 0x414140 ShellExecuteW

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure